Method for realizing network virtual security domain
A technology of network virtualization and security domain, applied in the direction of electrical components, transmission systems, etc., can solve the problems of unit information leakage and inconvenient physical isolation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The invention discloses a method for realizing a network virtual security domain, such as figure 1 The flow chart of the method for realizing the network virtual security domain is shown, which specifically includes the following steps: the terminal device uses the network driver interface specification (abbreviated as NDIS) intermediate driver to intercept all data packets sent and received through the network driver interface specification (abbreviated as NDIS) , if the intercepted data packet is a sending data packet, label the data packet and then forward it; if the intercepted data packet is a receiving data packet, then judge whether the data packet has a label, if the data packet has no label, Then determine that the sending end device of the data packet is an untrusted terminal device, block the data packet and give an alarm; if the data packet has a label, analyze the content of the data packet label, and judge whether to release or block the data packet accordi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 