Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security isolation management and control system

A technology of safety isolation and management and control system, applied in the field of safety isolation management and control system, it can solve problems such as hidden dangers of equipment failure, influence of existing network, inability of emergency communication network application scenarios and business needs to meet requirements, etc., and achieve the effect of satisfying users without feeling.

Inactive Publication Date: 2014-04-02
大连环宇移动科技有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. The existing system mainly isolates the physical path of data between the internal and external networks, and is based on general-purpose hardware equipment entities. Although the isolation effect can be achieved, it cannot meet the requirements for the application scenarios and business requirements of the emergency communication network;
[0009] 2. The existing system only protects a single network topology layer, such as: application layer call flow protection; data link layer DDOS, viruses, Trojan horses, etc., which cannot achieve a comprehensive and comprehensive protection effect;
[0010] 3. The access device needs to change the network topology and increase the network delay, which will have a great impact on the existing network; at the same time, the failure of its own equipment is also a big security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security isolation management and control system
  • Security isolation management and control system
  • Security isolation management and control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention:

[0046] Such as Figure 1-Figure 12 Shown: below in conjunction with accompanying drawing, the present invention is described in detail: the comprehensive security isolation management and control platform of the present invention is divided into front-end equipment and back-end equipment according to physical entities, and its system composition and configuration are as follows: figure 2 .

[0047] The front-end equipment is an independent hardware equipment, including the management and control operation subsystem and the intelligent identification subsystem. The front-end equipment is deployed in series on the private network link to perform line-speed identif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security isolation management and control system. The security isolation management and control system is provided with an identification subsystem, a management and control operation subsystem and a comprehensive processing subsystem, wherein the identification subsystem and the management and control operation subsystem are used for carrying out data protection on a network data layer and a high-layer protocol layer and management and control on a business and a behavior of a user, and the comprehensive processing subsystem is used for carrying out further comprehensive processing on a data package screened out by a front end device and completing the configuration and the management of strategies. Due to the adoption of the technical scheme, according to the security isolation management and control system disclosed by the invention, security protection can be comprehensively carried out on an emergency communication system device and the user, user non-inductivity and device non-inductivity can be met on the premise that the carrier-grade stability of a whole emergency communication system is ensured, and the stereoscopic protection on a private network can be realized through technical means such as network layer data protection, SIP (System In Package) protocol protection, business data protocol protection and user business management and control.

Description

technical field [0001] The invention relates to a security isolation control system, in particular to a system deployed between an emergency communication network and a gateway of a public network to realize comprehensive security protection of IP-based signaling and data. [0002] Involving patent classification number H04 Electric communication technology H04L Transmission of digital information, such as telegraphic communication H04L29 / 00H04L1 / 00 to H04L27 / 00 Apparatus, equipment, circuits and systems not included in a single group H04L29 / 02 Communication control; communication processing H04L29 / 06 Characterized by agreement. Background technique [0003] The emergency communication network and the public network are connected by IP, which will inevitably bring security threats to the original closed private network system. At the same time, the session control protocol of the system itself also has a security loophole to be attacked. The current emergency communication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 袁林马洪彬邸学锋王健窦静张醒范学云范博奚东志刘军政何磊贾立军宋继武许波
Owner 大连环宇移动科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products