Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

High-reliability safety isolation and information exchange method

A security isolation and information exchange technology, applied in secure communication devices, data exchange networks, user identity/authority verification, etc., can solve the problems of endangering data security and not considering the identity of the data sender and receiver, etc., to achieve The effect of ensuring identity reliability, enhancing communication security and confidentiality, and preventing attacks by malicious users

Active Publication Date: 2012-06-13
INST OF NAT SECURITY SCI & TECH +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The existing security isolation and information exchange system framework does not consider the issue of confirming the identity of the data sender and receiver, and does not involve data security protection during data transmission. Once a malicious user or hacker can obtain information between two hosts or devices The transmission data will endanger the data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-reliability safety isolation and information exchange method
  • High-reliability safety isolation and information exchange method
  • High-reliability safety isolation and information exchange method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Further describe the present invention below in conjunction with accompanying drawing and embodiment:

[0037] This embodiment is a high-reliability security isolation and information exchange platform using this technical solution. The hosts of both communication parties for information exchange also include a program integrity verification module, a data encryption and decryption module, a transceiver module, and a transceiver authentication module. module, data acquisition and sending module, see attached figure 1 , the functions of each module are as follows:

[0038] Program integrity verification module: used to verify the integrity of each module in its own system, when it is found that the process data of one or more modules in each module has been modified, it will send an alarm message and stop the transceiver module and data acquisition module Run, the integrity check can be based on md5 algorithm or some Hash algorithm.

[0039] This module has two modes: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-reliability safety isolation and information exchange method which comprises the steps of: initializing authentication: generating a secret key according to hardware information by a sender, and storing the received secret key and opposite side information by a receiver; encrypting data by adopting the secret key by the sender after embedding the identity information into the data to be sent, carrying out data decryption by using the stored secret key of the sender after the receiver receives the data, extracting identity information of the sender, and comparingwith the stored opposite side identity information for ensuring the identity reliability of two communication parties, wherein once any one communication party in the communication process replaces equipment, the communication can not be completed; and carrying out characteristic extraction on programs of various processes by the receiver during the communication, comparing with the program characteristic stored in the authentication initialization in real time, and carrying out program integrity correction for preventing a spite user from attacking to cause that the programs are corrected, such as embedding unreliable operations and the like. The invention further enhances the communication safety and confidentiality by using encryption.

Description

field of invention [0001] The invention relates to a security-enhanced security isolation and information exchange platform, which is used to ensure reliable information isolation and interaction process, and belongs to the technical field of information security. Background technique [0002] Security isolation and information exchange equipment is a kind of network security equipment developed with e-government and paperless office. It is used to realize data communication between networks with different levels of security or between internal and external networks. The main differences from network firewalls are as follows What time is it: [0003] 1. The network firewall is a blacklist device, that is, the network firewall prohibits disallowed applications, and the non-prohibited applications are allowed to pass through the firewall. The security isolation and information exchange equipment belongs to the white list device, that is, only the allowed applications can pass ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/28H04L12/26H04L12/24H04L9/32
Inventor 杜虹孙德刚史林港杜华王海洋
Owner INST OF NAT SECURITY SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products