Security boundary management system and management method
A technology for managing systems and security boundaries, applied in transmission systems, electrical components, etc., can solve problems such as commercial secret disclosure, disclosure of events, ugly parties, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The preferred embodiments of the present invention are given below in conjunction with the accompanying drawings to describe the technical solution of the present invention in detail.
[0038] Such as Figure 1 to Figure 9 As shown, the security boundary management system of the present invention includes an application agent sub-module, an information landing sub-module, an information encapsulation sub-module, a cross-domain access control sub-module, an audit sub-module, an information filtering sub-module, and an internal protocol transmission sub-module. One-way connection between the application agent sub-module and the information landing sub-module; one-way connection between the information landing sub-module and the cross-domain access control sub-module, audit sub-module, and information filtering sub-module; cross-domain access control sub-module, audit sub-module, information filtering The sub-module is unidirectionally connected to the information encapsul...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


