Unlock instant, AI-driven research and patent intelligence for your innovation.

Web-proxy-based gatekeeper penetration method and system

A netgate and one-way gatekeeper technology, which is applied in the netgate penetration method and system field based on web proxy, can solve the problems of little guiding significance and complicated implementation, and achieve reliable and accurate documents, high practicability, and easy implementation Effect

Active Publication Date: 2018-07-03
北京明朝万达科技股份有限公司
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned schemes all refer to the general TCP data cross-gateway communication, which is complicated to implement, and has little guiding significance for the convenient cross-gateway access of web data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web-proxy-based gatekeeper penetration method and system
  • Web-proxy-based gatekeeper penetration method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Glossary:

[0033] Web proxy (Web Proxy): It is a server that acts as a proxy for network users to obtain network information. To put it vividly: it is a transfer station for network information.

[0034] Gatekeeper (GAP): The full name of the security isolation gatekeeper is a kind of special hardware with various control functions that cuts off the link layer connection between the networks on the circuit, and can perform safe and moderate application data exchange between the networks. Network Security Appliance. Because there is no physical connection, logical connection, information transmission command, and information transmission protocol for communication between the two independent host systems connected by the gatekeeper, there is no forwarding of information packets according to the protocol, only the non-protocol "ferry" of data files , and there are only two commands of "read" and "write" for solid-state storage media. Therefore, the gatekeeper physical...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a web-proxy-based gatekeeper penetration method and system. The method comprises: a terminal user of a first network initiates an http request to a target server of a second network; the http request is sent to a first web proxy server; the first web proxy server sends an http data packet of the http request to a first icap server through an icap protocol; the first icap server stores the content of the http data packet as a file; the file is sent to a second network by a one-way gatekeeper mechanism; and a second web proxy server sends the http request to the target server and the target server returns an http response data packet to the terminal user based on the icap protocol. Therefore, web data transmission between two ends of a separation net of a gatekeeper can be realized quickly; and the practicability is high and the operation is reliable and stable.

Description

technical field [0001] The invention relates to the field of data security, in particular to a network gateway penetration method and system based on a web proxy. Background technique [0002] According to the technical requirements of information confidentiality, classified networks cannot be directly connected to the Internet; when a classified network is connected to a non-classified network, if the classified network is not physically isolated from the Internet, a gatekeeper is used to isolate the classified network from the non-classified network network. Therefore, the gatekeeper is widely used in state agencies or enterprises and institutions with confidential networks, ensuring security isolation, kernel protection, protocol conversion, virus killing, access control, security audit, identity authentication, and preventing unknown and known Trojan horses attack. [0003] However, in practical applications, the gatekeeper also restricts the legal data interaction tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/029H04L67/02
Inventor 魏效征王志海张静龚剑徐军帅牛立伟
Owner 北京明朝万达科技股份有限公司