Safe intercommunication method and apparatus between two isolated networks

An inter-network, secure technology, applied in the field of secure intercommunication, can solve the problem of huge cost of server systems, and achieve the effects of communication security, complete functions, and convenient installation.

Inactive Publication Date: 2008-02-27
ASAT CHINA TECH
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above method, a special intermediate server system is needed to realize each operation request in the above method, and the server system includes a series of independent functions such as a World Wide Web server, a protocol processor, a content converter, a verification manager, and a data storage device. Information processing equipment, the server system is costly; and, in the above method, when the user's access authority is verified, the user can always allow it to perform specific operations on the private network without being limited by the length of access time, when other When the external device also needs to perform the same specific operation on the private network, it can only wait for the last user to complete the operation and exit the private network before being eligible for access operations. When the network performs a specific operation, this method will bring very unfavorable consequences to the operators and managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe intercommunication method and apparatus between two isolated networks
  • Safe intercommunication method and apparatus between two isolated networks
  • Safe intercommunication method and apparatus between two isolated networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0033] An aspect of the present invention provides an improved method of providing secure access to resources maintained on separate networks, and establishing secure communications between devices on two separate networks, which can be accessed by the subject through the use of a standard web browser via Interworking agent's intermediary to authorize the specific operation of the interviewed object. The intercommunication agent can be located in any of two independent networks——independent network 1 and independent network 2, or in a public network other than the two independent networks, but the interoperable network must maintain communication with the outside world through the public network ,see picture 1.

[0034] As shown in Figure 2, as long as the above-mentioned interworking agent receives the access request of the access object, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a safety intercommunicating method between two independent networks, in which, an access object and an accessed object transfer information by an intercommunication proxy, which first of all verifies specific operation required by the access object and then sets up a safety communication channel for them and sets a timer limitting access time, when the access operation time surpasses the interval of the timer, the safety channel is forced to cut off, besides, the channel is limited by access authorization level of acces objects, when an access user with advanced purview needs to access an accessed user immediately, the accessed object will cut off access to it by a lower level user, and when a user with advanced authority is visiting the accessed object, other access objects have no right to interfere it.

Description

technical field [0001] The invention relates to a method for safe intercommunication between two independent networks and a device for realizing the method. Background technique [0002] Usually, web browsers such as Netscape Navigator or Microsoft Explorer, etc. are used to access public networks such as the Internet, because these web browsers can display and reproduce hypertext markup language (HTML) documents provided by remote server equipment, allowing customers to Machine users request and retrieve resources from remote server devices via the Internet, and at the same time execute script programs embedded in HTML documents in order to provide users with some local functions. [0003] However, for some private networks, the internal resources and information are confidential, and the external network is not allowed to easily access and browse, let alone be modified. For safety reasons, private networks are usually protected by firewalls, so they are in the private Bro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L9/32
Inventor 梁俊林苑
Owner ASAT CHINA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products