Network isolation method based on transparent computing, system, network card and application

A transparent computing and network isolation technology, applied in transmission systems, electrical components, etc., can solve problems such as no additional protection, and achieve the effect of simple structure, high security, and guaranteed security

Active Publication Date: 2017-06-16
HUNAN NEW CLOUDNET TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the transparent computing terminal of the prior art, no additional protection is performed during the loading process of the instance operating system, during the process of booting into the instance operating system, and during the running process of the instance operating system, only based on the characteristics of transparent computing , when the network is interrupted and connected to a different network, when the transparent computing terminal cannot obtain resources from the transparent server, an error alarm is issued to guide the operator to restore the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network isolation method based on transparent computing, system, network card and application
  • Network isolation method based on transparent computing, system, network card and application
  • Network isolation method based on transparent computing, system, network card and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Such as figure 1 As shown, the network isolation method based on transparent computing in this embodiment includes: S1. Obtaining first information in the first operation stage of the transparent computing terminal, the first information is the transparent server in the network where the transparent computing terminal is located in the first operation stage information; S2. Obtain the second information in the second operation stage of the transparent computing terminal, the second information is the information of the transparent server in the network where the transparent computing terminal is in the second operation stage; S3. When the first information is inconsistent with the second information , reset the transparent computing terminal.

[0041] In this embodiment, the first operation phase and the second operation phase are the operation phases of the transparent computing terminal before the split node event occurs and after the event ends, which are determined ...

Embodiment 2

[0052] The isolation method of this embodiment is basically the same as that of Embodiment 1, except that steps S1, S2 and S3 are executed by a processor independent of the operating system of the transparent computing terminal. After step S1, when the preset split node event starts, isolate the connection between the transparent computing terminal and the network; after the preset split node event ends, execute step S2; in step S3, when the first information and the second information When consistent, restore the connection between the transparent computing terminal and the network.

[0053] In this embodiment, since steps S1, S2 and S3 do not depend on the operating system of the transparent computing terminal, including the super operating system and the instance operating system, an independent processor obtains the information of the transparent server from the network, including the IP address and UUID code. Therefore, when a preset split node event is triggered, the co...

Embodiment 3

[0064] The isolation method of this embodiment is the same as that of Embodiment 2, and the isolation system of this embodiment is the same as that of Embodiment 2. The isolated network card of this embodiment is basically different from that of Embodiment 2, the difference is that: Figure 4 As shown, the isolation network card also includes an isolation controller, the processor is connected to the network interface module through the isolation controller, and the bus interface module is connected to the network interface module through the isolation controller; the isolation controller is used to disconnect or restore the network according to the control of the processor Connection between the interface module and the bus interface module.

[0065]In this embodiment, through the isolation controller, the connection between the transparent computing terminal and the network can be disconnected in time after the preset split node event is triggered, and until the network is r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network isolation method based on transparent computing, a system, a network card and application. The network isolation method comprises the following steps: S1, acquiring first information in a first operation stage of a transparent computing terminal, wherein the first information is information of a transparent server in a network of the transparent computing terminal in the first operation stage; S2, acquiring second information in a second operation stage of the transparent computing terminal, wherein the second information is information of the transparent server in the network of the transparent computing terminal in the second operation stage; S3, when the first information is not accordant with the second information, resetting the transparent computing terminal. The network isolation method has the advantages that the security is high, the risk of confidence breakage caused when the transparent computing terminal is connected with different networks can be effectively reduced, and operation security of the transparent computing terminal is ensured.

Description

technical field [0001] The invention relates to the field of computer network control, in particular to a transparent computing-based network isolation method, system, network card and application. Background technique [0002] With the maturity and rapid development of Internet technology, Internet technology has been integrated into all aspects of production and life. While the Internet brings people the convenience of quickly obtaining information, its threat to the user's network security has increasingly become a hot and worrying issue. Especially for governments and public institutions, once their confidential data is leaked, the impact on them will be unimaginable. Transparent computing terminals have the advantages of good openness, strong applicability, and high security, and are more and more widely used. However, because transparent computing is naturally dependent on the network, it must rely on the network to load resources (including instance operating system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 陈娅芳李政军
Owner HUNAN NEW CLOUDNET TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products