Security data interaction structure and method based on optical isolation technology

A security data, optical isolation technology, applied in the field of information security, can solve the problem of not achieving physical isolation, unable to guarantee absolute one-way data interaction, etc., to achieve automatic error correction, ensure absolute one-way, and ensure reliability. Effect

Inactive Publication Date: 2014-07-16
CHANGCHUN INST OF OPTICS FINE MECHANICS & PHYSICS CHINESE ACAD OF SCI
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are mainly two data interaction methods for this kind of attack, protocol isolation and logic isolation. Protocol isolation is to realize the read-only or write-only function of mobile storage media through software programming in the embedded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data interaction structure and method based on optical isolation technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0025] See attached figure 1 , a secure data interaction structure based on optical isolation technology of the present invention includes a sending end user interface 1, a parallel-to-serial conversion chip 3, an optical fiber integrated transceiver module 8, a serial-to-parallel conversion chip 12, and a receiving end user interface 14;

[0026] The optical fiber integrated transceiver module 8 includes an encapsulated electro-optical conversion module 5, a transmitting-end optical isolator 6, a receiving-end optical isolator 9 and a photoelectric conversion module 10; the electro-optical conversion module 5 is provided with a transmitting-end optical isolator 6. The photoelectric conversion module 10 is provided with a receiving-end optical isolator 9, and the sending-end optical isolator 6 is connected to the receiving-end optical isolator 9 through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security data interaction structure and method based on the optical isolation technology, and belongs to the technical field of information security. The security data interaction structure and method solve the problem of ferry attack existing in the prior art. The security data interaction structure comprises a transmitting end user interface, a parallel-serial conversion chip, an optical fiber integrated receiving and transmitting module, a serial-parallel conversion chip and a receiving end user interface. The optical fiber integrated receiving and transmitting module comprises an electro-optic conversion module, a transmitting end opto-isolator, a receiving end opto-isolator and a photoelectric conversion module, wherein the electro-optic conversion module, the transmitting end opto-isolator, the receiving end opto-isolator and the photoelectric conversion module are packaged inside the optical fiber integrated receiving and transmitting module. The transmitting end opto-isolator is arranged on the electro-optic conversion module. The receiving end opto-isolator is arranged on the photoelectric conversion module. The transmitting end opto-isolator is connected with the receiving end opto-isolator through single mode fibers. According to the security data interaction structure and method based on the optical isolation technology, the absolute unidirectionality of a communication link is ensured on the basis of the physical principle, safe and reliable data transmission between a networked computer and a non-networked computer can be achieved, and the ferry attack can be effectively resisted.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security data interaction method based on optical isolation technology. Background technique [0002] The ferry attack is the most common attack method on the Internet. Its attack principle is to hide the Trojan horse virus in the removable storage medium on the Internet-connected computer. Documents with characteristics, copy the relevant retrieval results to the mobile storage medium without the user's knowledge, and send them to illegal users on the Internet the next time they access the Internet, thereby realizing the theft of document data. At present, there are mainly two data interaction methods for this kind of attack, protocol isolation and logic isolation. Protocol isolation is to realize the read-only or write-only function of mobile storage media through software programming in the embedded system, and logic isolation is The method of use g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/70G06F21/56
Inventor 李佩玥石俊霞陈雪章明朝
Owner CHANGCHUN INST OF OPTICS FINE MECHANICS & PHYSICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products