Secure communication control method
A technology of secure communication and control method, which is applied in the field of trusted computing and network communication, and can solve problems such as inability to communicate security control.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] see figure 1 , the embodiment of the present invention provides a secure communication control method. The method specifically includes the following steps:
[0055] Step 101: the management center sends the terminal security policy file to the trusted terminal, and sends the gateway security policy file to the trusted gateway;
[0056] The above-mentioned terminal security policy file includes a label configuration table, a multicast key table, an access control table and a security domain related table. The above-mentioned gateway security policy file includes an exception device list, a signature verification policy table and a security domain multicast key table.
[0057] Step 102: the trusted terminal receives the terminal security policy file sent by the management center, and performs security control on the data packets passing through the trusted terminal according to the terminal security policy file;
[0058] The trusted terminal intercepts the data packet...
Embodiment 2
[0063] see Figure 2A , the embodiment of the present invention provides a secure communication control method. In the embodiment of the present invention, the trusted terminals and trusted gateways in the network are uniformly managed by the management center, and different network domains can be formed by multiple trusted terminals and multiple trusted gateways. The secure communication between different network domains can be realized through the secure communication control method provided by the embodiment of the present invention. The method specifically includes the following steps:
[0064] Wherein, before performing security control on communications between network domains, the initial configuration of trusted terminals and trusted gateways is firstly completed through the following steps 201-204.
[0065] Step 201: The management center generates a terminal security policy file, and sends the terminal security policy file to the trusted terminal. The terminal secu...
Embodiment 3
[0148] see image 3 , the embodiment of the present invention provides a secure communication control system, the system specifically includes: a management center 301, a trusted terminal 302 and a trusted gateway 303; since the trusted terminal 302 and the trusted terminal 303 also perform data communication, image 3 The communication link between the two is marked with a dotted line.
[0149] The management center 301 is configured to send the terminal security policy file to the trusted terminal 302, and send the gateway security policy file to the trusted gateway 303; receive the terminal security log sent by the trusted terminal 302, and receive the gateway security log sent by the trusted gateway 303; The log is to perform security monitoring on the trusted terminal 302 and the trusted gateway 303 respectively according to the terminal security log and the gateway security log.
[0150]The trusted terminal 302 is used to receive the terminal security policy file sent b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 