Supercharge Your Innovation With Domain-Expert AI Agents!

Data security exchange method based on black list and white list

A data security, black and white list technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of single judgment function, inflexible and inconvenient power system isolation technology, etc., to ensure security, enhance flexibility, and strong flexibility Effect

Active Publication Date: 2017-01-11
JIANGSU ELECTRIC POWER CO +1
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is that the existing power system isolation technology is not flexible enough in the real operating environment, and the function of judging the information interaction behavior of the internal and external network is single. In some special environments, some information that the user wants to transmit is due to some reasons ( For example, if the keyword review fails), it is blocked by the isolation device and cannot be transmitted, but the user confirms that there is no problem with this information, so it can only be transmitted by offline copying, which is very inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security exchange method based on black list and white list

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0029] In the present invention, the external network is used as the network one, and the internal network is used as the network two. Assuming that the information is from the external network to the internal network, the "2+1" module structure design is adopted, that is, the external network host module, the internal network host module and the isolation switch module are included. The internal and external network host modules have independent computing units and storage units, which are respectively connected to the internal and external networks. The isolation switching module is implemented by a dedicated dual-channel isolation switching card, and the secure data exchange between the internal and external network host modules is completed through the embedded security chip. There is no network connection between the internal and external network host modules, so there is no data forwarding based on network protocols. The isolated switching module is the only channel for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security exchange method based on a black list and a white list, comprising the steps of reading data to be exchanged and matching the data with rules and strategies; conducting protocol stripping to successfully matched data to acquire pure data contents; matching the pure data contents with keywords in the white list; transmitting the data to be exchanged to the separated card of a first network upon successful matching of the data, writing the pure data contents into a single-way data transmission channel by the separated card of the first network; upon unsuccessful matching of the data, matching the pure data contents with keywords in the black list and pushing the pure data contents into users for selection configuration. In the data security exchange method, a problem that a traditional isolating device cannot meet special transmission requirements is solved by an intelligent white list technology, keywords in the data are extracted by main programs, the white list and the operator are automatically expanded, and the back list and the white list are manually added, so that data interaction security is ensured and data transmission flexibility is enhanced.

Description

technical field [0001] The invention relates to a data security exchange method, in particular to a data security exchange method based on black and white lists. Background technique [0002] With the maturity of network technology and continuous improvement of applications, the Internet is increasingly integrated into all aspects of society. On the one hand, a series of network applications such as enterprise Internet access, e-commerce, distance education, and telemedicine are booming, and people's daily life is increasingly closely related to the network; on the other hand, the composition of network users is becoming more and more diverse. Targeted network intrusions and attacks are becoming more and more frequent. While enjoying the rich and convenient information brought by the Internet, people are also increasingly troubled by frequent network attacks, virus floods, unauthorized access, information leaks and other problems. [0003] In many important fields such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0245
Inventor 高昇宇张滔王宏延陆忞娄征徐威郭靓章浩
Owner JIANGSU ELECTRIC POWER CO
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More