Network security isolation method and apparatus

A network security and secure access technology, applied in the field of network security isolation methods and devices, can solve the problems of unsatisfactory security protection effect, complicated maintenance work, and single function of encryption equipment, and achieve rich functions, wide application range, and reliable effect Effect

Inactive Publication Date: 2018-04-20
宝牧科技(天津)有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In some networks with relatively high security requirements, when different levels of networks need to be interconnected, it is usually required to isolate the network. The traditional solution is to install a communication encryp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security isolation method and apparatus
  • Network security isolation method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0028] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element referred to must have a particular orientation, be constructed and operate in a particular orientation, and thus should not be construed as limiting the invention. In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security isolation method and apparatus. The apparatus comprises an outer end machine, an isolation card and an inner end machine; the outer end machine, the isolationcard and the inner end machine are connected in sequence; an external network interface module, an access control module, a file content filtering module, a virus scanning module and an outer end protocol stripping conversion module connected in sequence are arranged in the outer end machine; an electronic isolation component module is arranged in the isolation card; and an inner end protocol stripping conversion module, an IPSec/ HIP/SSL module and an inner network interface module connected in sequence are arranged in the inner end machine. According to the network security isolation methodand apparatus, DDoS defense, access control, file content filtering, virus scanning, protocol stripping conversion and IPSec/HIP/SSL decryption are cooperatively used; and security isolation data transmission of different levels of networks can be achieved, and the network security isolation method and apparatus have the advantages of wide application range, rich functions and reliable effect.

Description

technical field [0001] The invention belongs to the field of network security transmission, and in particular relates to a network security isolation method and device. Background technique [0002] In some networks with relatively high security requirements, when different levels of networks need to be interconnected, it is usually required to isolate the network. The traditional solution is to install a communication encryption device on the network to encrypt the communication content. However, the existing The function of the encryption device is single, the security protection effect is not ideal, and the maintenance work is also relatively complicated. Contents of the invention [0003] In view of this, the present invention aims to propose a network security isolation method and device, which can be used in conjunction with DDoS defense, access control, file content filtering, virus scanning, protocol stripping conversion, and IPSec / HIP / SSL decryption; Safe isolati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0209H04L63/0227H04L63/0236H04L63/0428H04L63/08H04L63/1441H04L63/145H04L63/1458H04L69/08
Inventor 滕建桓
Owner 宝牧科技(天津)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products