Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for security control

A security control and control command technology, applied in the field of Internet security, can solve problems such as system damage, potential safety hazards, inaccessible external network hosts or internal network host authority restrictions, and achieve the effect of authority limitation and safe remote control

Active Publication Date: 2017-08-25
BEIJING TOPWALK INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In this way, although the one-way import system has increased security protection and audit capabilities, the security of the entire system needs to be further improved. Intranet hosts need to control the import server
[0006] In the prior art, remote login is usually used for control. Specifically, the external network host directly logs in to the import front-end processor to remotely control the import front-end processor, and the intranet host directly logs in to the import server to remotely control the import server. Although the remote control has been realized, there are great potential safety hazards in the way of direct login: firstly, it is easy to cause damage to the system imported into the front-end processor or server after direct login; secondly, the imported front-end The computer or import server cannot restrict the permissions of the logged-in external network host or internal network host; finally, the import front-end processor or import server does not verify the control instructions, and cannot guarantee that the execution file will not be tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for security control
  • Method, device and system for security control
  • Method, device and system for security control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0060] The present invention provides a method for security control, such as figure 1 shown, including:

[0061] Step 1: The peer device receives the control command request sent by the host on the corresponding side;

[0062] In this step, the host on the corresponding side sends a control command request to the peer device, and the control command request can be a single control command, or multiple consecutive control commands in the form of a command line;

[0063] Step 2: The peer device conducts a whitelist check on the control command in the received control command request to verify whether the authority of the corresponding side host supports the control command;

[0064] In this step, the peer device may pre-store the authority information of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety control method, device and system and belongs to the technical field of Internet security. The safety control method comprises the steps that 1, an opposite terminal device receives a control command request; 2, the opposite terminal device conducts white list check on a control command in the control command request; 3, the opposite terminal device verifies an executive program corresponding to the control command; 4, the opposite terminal device executes the executive program corresponding to the control command and returns an execution result to a host on the corresponding side. Compared with the prior art, the safety control method has the advantages that the host on the corresponding side is prevented from damaging the system of the opposite terminal device; the authority of the host on the corresponding side is limited; it is guaranteed that an executable file is not tampered; and safe remote control over an imported front-end processor by an extranet host and safe remote control over an imported server by an intranet host can be achieved.

Description

technical field [0001] The present invention relates to the field of Internet security, in particular to a method, device and system for security control. Background technique [0002] With the continuous development of networked e-government, government departments at all levels have built a large number of networks and application systems, which are physically or logically separated due to different application scenarios, different users, and different data security requirements. Multiple divisions were made. [0003] In these networking applications, there are often cases where data content needs to be exchanged between multiple networks with different security levels, and even some high-security networks are themselves classified networks. Faced with this situation, in accordance with the requirements of the State Security Bureau for physical isolation, and at the same time to meet the data transmission between different networks, a one-way physical isolation transmissi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0428H04L63/08
Inventor 王洪波李志鹏张彦星崔卓张习雨
Owner BEIJING TOPWALK INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products