Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for securing a bi-directional communication channel and device for implementing said method

A two-way communication and channel technology, applied in data exchange details, electrical components, transmission systems, etc., can solve problems such as information leakage

Inactive Publication Date: 2010-12-08
THALES SA
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution is risky as an attacker can exploit this channel to cause information leakage from the protected network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securing a bi-directional communication channel and device for implementing said method
  • Method for securing a bi-directional communication channel and device for implementing said method
  • Method for securing a bi-directional communication channel and device for implementing said method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] figure 1 A schematic diagram showing the steps of transferring data from a first network 111 to a second network 112 by applying the method according to the invention, wherein the second network 112 has a lower security level than the first network.

[0033] First, data 101 originating from a first network 111 is received by a routing module 102 which directs said data 101 to an encryption step 103 or a filtering step 104 . According to the type of the data 101 , the routing module 102 decides which of the two steps 103 , 104 to transfer the data to. The type of data 101 is determined by analyzing metadata associated with the data by the transport protocol. For example, the metadata of the IP protocol associated with layer 3 of the OSI (Open System Interconnection "Open System Interconnection") model, such as the IP address of the sender and / or receiver or the communication port used, is checked to determine the routing module 102 to which of the steps 103 and 104 the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for securing a bidirectional communication channel between at least a network N1 and a network N2 having a security level lower than N1, and to a device for implementing said method. The method comprises at least the following steps: defining one or more types of data authorised to pass from N1 to N2; directing a datum towards a ciphering / deciphering module or a filtration module depending on the type of the piece of data. The invention can particularly be used for establishing communications among a plurality of networks having different security levels.

Description

technical field [0001] The invention relates to a method for protecting a two-way communication channel and a device for realizing the method. The present invention notably enables the establishment of communication between multiple networks with different levels of security. Background technique [0002] Security standards regarding communication between networks with different levels of security often result in constraints that conflict with the need for interoperability between said networks and the required performance in terms of data transmission. [0003] For example, a company's internal network is authorized to receive certain data from the external network, but data from the internal network cannot be transmitted to the external network in unencrypted form. So, for example, if two corporate networks communicating through an intermediate public network, such as the Internet, want to exchange confidential information, an encryption / decryption device is placed at eac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/22
CPCH04L63/105H04L63/0209H04L63/0428
Inventor S·贝尔东D·卡佩J-Y·厄泽纳
Owner THALES SA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More