Unlock instant, AI-driven research and patent intelligence for your innovation.

Security boundary management system and management method

A technology for managing systems and security boundaries, applied in transmission systems, electrical components, etc., can solve problems such as commercial secret disclosure, disclosure of events, ugly parties, etc.

Inactive Publication Date: 2017-06-23
SHANGHAI GOLDEN SECURITY NET TECH
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, people use mobile phones to share business meeting materials, and business meetings often involve some business secrets, and business secrets are maliciously leaked by participants from time to time. At present, one way to track down the leaker is the leaker’s own admission. The other one is disclosure by others. It is generally rare for the leaker to admit it himself. For the disclosure by others, it is easy to slander, and it is easy to make things public and make the parties look ugly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security boundary management system and management method
  • Security boundary management system and management method
  • Security boundary management system and management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The preferred embodiments of the present invention are given below in conjunction with the accompanying drawings to describe the technical solution of the present invention in detail.

[0038] Such as Figure 1 to Figure 9 As shown, the security boundary management system of the present invention includes an application agent sub-module, an information landing sub-module, an information encapsulation sub-module, a cross-domain access control sub-module, an audit sub-module, an information filtering sub-module, and an internal protocol transmission sub-module. One-way connection between the application agent sub-module and the information landing sub-module; one-way connection between the information landing sub-module and the cross-domain access control sub-module, audit sub-module, and information filtering sub-module; cross-domain access control sub-module, audit sub-module, information filtering The sub-module is unidirectionally connected to the information encapsul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security boundary management system and management method. The system includes an application proxy submodule, an information landing submodule, an information packaging submodule, a cross-domain access control submodule, an auditing submodule, an information filtering submodule and an internal protocol transmission submodule, wherein the application proxy submodule is unidirectionally connected with the information landing submodule; the information landing submodule is unidirectionally connected with the cross-domain access control submodule, the auditing submodule and the information filtering submodule; the cross-domain access control submodule, the auditing submodule and the information filtering submodule are unidirectionally connected with the information packaging submodule; and the information packaging submodule is unidirectionally connected with the application proxy submodule. The security boundary management system provided by the invention performs effective security access control of information of all cross-boundary access according to an access configuration strategy given by a security management platform. Internetwork information exchange is guaranteed to be performed in a secure and controllable environment, authentication of an accessor is performed, and audit information that can be used for looking into the person in charge is kept.

Description

technical field [0001] The present invention relates to a management system and its management method, in particular to a security boundary management system and its management method. Background technique [0002] At present, the mobile market has drastically changed the pattern of the IT industry. Mobile devices such as smartphones, tablets and lightweight laptops are playing an increasingly important role in our lives and work. important tool for data sharing. For example, people use mobile phones to share business meeting materials, and business meetings often involve some business secrets, and business secrets are maliciously leaked by participants from time to time. At present, one way to track down the leaker is the leaker’s own admission. The other one is disclosure by others. It is generally rare for the leaker to admit it himself. In the case of disclosure by others, it is easy to slander, and it is easy to make things public and make the parties look ugly. Cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/08H04L63/10
Inventor 丁中卫何丞栩樊少杰沈民杨娜朱星
Owner SHANGHAI GOLDEN SECURITY NET TECH