Security isolation file transmission control method

A file transmission and security isolation technology, applied in transmission systems, electrical components, etc., can solve problems such as the inability to meet efficient and reliable two-way communication, lack of data two-way communication, and security isolation devices that cannot deploy application layer protocols, and improve work efficiency. , improve the quality of user experience, improve the effect of controllability

Inactive Publication Date: 2014-08-20
PLA UNIV OF SCI & TECH
View PDF7 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It is precisely because of the above security mechanism that the security isolation device cannot deploy application layer protocols (such as FTP, HTTP, SNMP, etc.). At the same time, the w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security isolation file transmission control method
  • Security isolation file transmission control method
  • Security isolation file transmission control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention is described in further detail below in conjunction with accompanying drawing:

[0043] figure 1 It is a schematic diagram of a unidirectional network security isolation device in the prior art, which consists of four parts: a console unit, an internal unit, an external unit and a data exchange unit. Among them: the internal unit and the external unit are composed of an identity authentication unit and a protocol stripping unit, which are responsible for the interaction with the internal network and the external network; the data exchange unit is an intermediary unit not based on network transmission, and is responsible for the data exchange between the internal unit and the external unit; The console controls the configuration information of the internal unit and the external unit, and determines the security policy of the network isolation device. The one-way network security isolation device ensures that it is connected to one of the internal n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security isolation file transmission control method. Security internal and external network file transmission is achieved through one-way transmission network architecture of a protocol control module and a security guarantee module. The method mainly comprises the steps that the security guarantee module is configured, all units of a system are started, a request end host initiates data connection with a target host, the target host responds to a data connection request of the request end host, a file transmission order of the request end host is packaged, a transmission file is detached, files are transmitted and merged, and connection is withdrawn. The request end host can send the files to the target host and can download the files from the target host, and concurrent file sending and file downloading of multiple tasks and multiple users can be achieved. According to the security isolation file transmission control method, internal and external data based on one-way network isolation equipment can be transparently transmitted, and the internal and external data transmission efficiency can be improved through a soft exchange protocol.

Description

technical field [0001] The invention relates to a security isolation control method, in particular to a security isolation file transmission control method. It is especially suitable for transferring data between networks with different confidentiality levels. While ensuring the security of the intranet, it can realize the efficient transmission of files between the intranet and the intranet. Background technique [0002] In terms of network security, the fifth-generation isolation technology is currently used to ensure network security, and its main product is the network security isolation device. Most mainstream manufacturers adopt the method of protocol stripping and identity verification for the core principle of network security isolation devices. The main domestic companies represented by Shandong Sirui and Beijing Digital Star are currently adopting this technology in large quantities. product. The key point for this technology to ensure the security of the intrane...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 冯径马玮骏沈晔张珅吴阳
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products