A working method of trusted network and trusted network

A credible and network technology, applied in the field of network security, can solve the problems of prone to false positives, false negatives, too many devices, inaccurate security events, etc., to avoid theft and meet the effect of network-level protection

Inactive Publication Date: 2018-02-06
中铁信(北京)网络技术研究院有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. There are many devices, the network structure is becoming more and more complex, and the management difficulty is increasing;
[0005] 2. The internal devices of the network cannot work together;
[0006] 3. The security incidents reported by network security equipment are inaccurate, prone to misreporting and omission, and cannot be handled in a timely manner;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A working method of trusted network and trusted network
  • A working method of trusted network and trusted network
  • A working method of trusted network and trusted network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0060] A trusted network of the present invention, such as figure 1 As shown, it includes trusted applications, trusted tokens, trusted agents, trusted management platforms, and trusted routers; among them, trusted applications are IT services deployed in the network to support services, and are composed of identifiable subjects and Composed of objects, where the subject is a process representing user behavior, and the object is one or more of files, directories, device files, and symbolic links; trusted applications have given specific security levels and categories for read / write; The trusted mark exists in the IP messag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted network which comprises a trusted application, a trusted tag, a trusted agent, a trusted management platform and a trusted router. An active offensive method is adopted by the trusted network so that safety certification can be conducted on source terminals (such as identity, application programs and procedures) of the network and safe tagging can be conducted according to a set rule. A trusted network device and a tagging management platform are combined so that safety admittance of a user terminal according to role authority can be achieved, and therefore network layer authority is achieved; according to the class of services and the service authority, a safety access route is proposed, so that an object and a subject only and logically exist in the network, and therefore data are prevented from being stolen and tampered. Through management platform tagging and CIPSO message control, the shortage of a traditional safety protection means is offset, integrated linkage safety protection is conducted on the network according to the aspects of data transmission, a network perimeter and a master terminal, and the requirement for network grade protection is satisfied in the true sense.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a trusted network architecture and a working method of the trusted network. Background technique [0002] Most of the commonly used security methods in existing networks are passive defenses to eliminate existing problems in the network; with the complexity of network structure and the diversification of network equipment, security management efficiency and capabilities have become the bottleneck of network security development. [0003] Traditional networks have the following problems: [0004] 1. There are many devices, the network structure is becoming more and more complex, and the management difficulty is increasing; [0005] 2. The internal devices of the network cannot work together; [0006] 3. The security incidents reported by network security equipment are inaccurate, prone to misreporting and omission, and cannot be handled in a timely manner; [0007] 4. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 卢永忠罗晴马超刘刚李毓才刘丰董鹏
Owner 中铁信(北京)网络技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products