Supercharge Your Innovation With Domain-Expert AI Agents!

A Data Security Exchange Method Based on Black and White List

A data security, black and white list technology, applied in the transmission system, electrical components, etc., can solve the problems of single judgment function, inflexible and inconvenient power system isolation technology, to ensure security, enhance flexibility, and strong flexibility Effect

Active Publication Date: 2021-09-24
JIANGSU ELECTRIC POWER CO +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is that the existing power system isolation technology is not flexible enough in the real operating environment, and the function of judging the information interaction behavior of the internal and external network is single. In some special environments, some information that the user wants to transmit is due to some reasons ( For example, if the keyword review fails), it is blocked by the isolation device and cannot be transmitted, but the user confirms that there is no problem with this information, so it can only be transmitted by offline copying, which is very inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Security Exchange Method Based on Black and White List

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0029] In the present invention, the external network is used as the network one, and the internal network is used as the network two. Assuming that the information is from the external network to the internal network, the "2+1" module structure design is adopted, that is, the external network host module, the internal network host module and the isolation switch module are included. The internal and external network host modules have independent computing units and storage units, which are respectively connected to the internal and external networks. The isolation switch module is implemented by a dedicated dual-channel isolation switch card, and the secure data exchange between the internal and external network host modules is completed through the embedded security chip. There is no network connection between the internal and external network host modules, so there is no data forwarding based on network protocols. The isolated switching module is the only channel for data e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security exchange method based on a black and white list, the steps include: reading the data to be exchanged and matching it with a rule policy, performing protocol stripping on the successfully matched data to be exchanged to obtain pure data content, and combining the pure data content with The keywords in the whitelist are matched. If the match is successful, the data to be exchanged will be sent to the isolation card of network 1, and then the isolation card of network 1 will write the pure data content into the one-way data transmission channel. The data content is matched with the keywords in the blacklist, and after the matching fails, the pure data content is pushed to the user for selection and configuration. The invention adopts the intelligent white list technology, which solves the problem that the traditional isolation device cannot meet the special transmission requirements, and combines the automatic expansion of the white list with the keywords in the data extracted by the main program and the manual addition of the black list and white list by the operator, which not only ensures It not only improves the security of data interaction, but also enhances the flexibility of data transmission.

Description

technical field [0001] The invention relates to a data security exchange method, in particular to a data security exchange method based on black and white lists. Background technique [0002] With the maturity of network technology and continuous improvement of applications, the Internet is increasingly integrated into all aspects of society. On the one hand, a series of network applications such as enterprise Internet access, e-commerce, distance education, and telemedicine are booming, and people's daily life is increasingly closely related to the network; on the other hand, the composition of network users is becoming more and more diverse. Targeted network intrusions and attacks are becoming more and more frequent. While enjoying the rich and convenient information brought by the Internet, people are also increasingly troubled by frequent network attacks, virus floods, unauthorized access, information leaks and other problems. [0003] In many important fields such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0245
Inventor 高昇宇张滔王宏延陆忞娄征徐威郭靓章浩
Owner JIANGSU ELECTRIC POWER CO
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More