Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing network virtual security domain

A technology of network virtualization and security domain, applied in the direction of electrical components, transmission systems, etc., can solve the problems of unit information leakage and inconvenient physical isolation

Active Publication Date: 2012-10-17
中电科(北京)网络信息安全有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the above-mentioned technical problems of unit information leakage and inconvenient physical isolation, the present invention discloses a method for realizing network virtual security domain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network virtual security domain
  • Method for realizing network virtual security domain
  • Method for realizing network virtual security domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The invention discloses a method for realizing a network virtual security domain, such as figure 1 The flow chart of the method for realizing the network virtual security domain is shown, which specifically includes the following steps: the terminal device uses the network driver interface specification (abbreviated as NDIS) intermediate driver to intercept all data packets sent and received through the network driver interface specification (abbreviated as NDIS) , if the intercepted data packet is a sending data packet, label the data packet and then forward it; if the intercepted data packet is a receiving data packet, then judge whether the data packet has a label, if the data packet has no label, Then determine that the sending end device of the data packet is an untrusted terminal device, block the data packet and give an alarm; if the data packet has a label, analyze the content of the data packet label, and judge whether to release or block the data packet accordi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing network virtual security domain, and belongs to the technical field of network information security. The method specifically comprises the following steps of: utilizing a network drive interface specification intermediate layer drive to intercept all data packets transmitted and received through a network drive interface specification by terminal equipment; if the intercepted data packets are transmitted data packets, labeling and transmitting the data packets; and if the intercepted data packets are received data packets, judging whether the data packets are labeled, if not, judging the transmission end equipment of the data packets to be unauthorized terminal equipment, then blocking up the data packets and giving an alarm, and otherwise, analyzing the labeled content of the data packets, and releasing or blocking up the data packets according to a strategy. By the virtual security domain technology, a flexible, safe, reliable and efficient internal network environment can be constructed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for realizing a network virtual security domain. Background technique [0002] With the rapid advancement of network informatization, the behavior and activities of human society have been closely linked with the network system. The network information system "maps" the traditional work and management mode of human beings to the network environment, which greatly improves the efficiency of research, work and management. For the internal network system, people once assumed that "the internal environment is safe", but since the network system adopts the open and interconnected TCP / IP protocol, this assumption can no longer be fully established in fact. In order to ensure that employees leak sensitive information intentionally or unintentionally, various units (especially secret-related units) have adopted corresponding administrative means to carry out mandat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 付强邓鸿许勇
Owner 中电科(北京)网络信息安全有限公司