Supercharge Your Innovation With Domain-Expert AI Agents!

A data forwarding control method and system based on hardware control logic

A technology of hardware control and control method, applied in the direction of transmission system, digital data authentication, electronic digital data processing, etc., can solve problems such as lack of data flow control and security protection, system misoperation, host compatibility issues, etc., to achieve Solve the effect of virus Trojan implantation and malicious code injection, reduce network security risks, and achieve physical isolation

Active Publication Date: 2020-08-14
BEIJING BEYONDINFO TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to statistics, 70% of computer crimes are caused by the illegal use of key resources such as hosts by insiders, and only 30% of the real threats come from outside. The external equipment is not standardized, and it is implanted with virus or Trojan horse back door, which will lead to data leakage, virus infection, system crash and even network paralysis. impact or even major loss
[0004] At the same time, for some special equipment, such as the host equipped with special software control, the equipment of the engineer station / worker station in some industrial fields, these hosts / equipment are often not suitable for such systems on the market due to the particularity of the system. Data control software and security protection software, or due to data control software or security software, it is easy to cause compatibility problems with the original software of the host, and even performance is affected
In addition, the hosts of these engineer stations / worker stations will basically not upgrade the operating system after they go online. Even after installing traffic monitoring and security software, they often do not update the anti-malicious code software version and malicious code library in time, which cannot achieve comprehensive protection. Data flow control and security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data forwarding control method and system based on hardware control logic
  • A data forwarding control method and system based on hardware control logic
  • A data forwarding control method and system based on hardware control logic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] figure 1 Shown is an application scenario of an application scenario for a data forwarding control system related to the present invention.

[0036] Such as figure 1 As shown, in order to control each data forwarding of the protected host, it is necessary to take over each interface of the protected host. Therefore, the method proposed by the present invention sets internal At the same time, it also provides corresponding external interfaces. Each internal interface is used to connect to the protected host, and the external interface is used to connect external devices that need to exchange data with the protected host. The terminal protection device is externally connected to the protected host, and each interface (such as UC1 and UC2 of the USB port, CC0 of the COM port, and EC0 of the network port) on the protected host that needs to be protected is connected to itself through various types of connecting wires. Corresponding types of internal interfaces, for exampl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data forwarding control method based on hardware control logic and a corresponding data forwarding control system. The method includes: connecting a terminal protection device externally to a protected host, and taking over all data interfaces of the protected host; When an external device exchanges data with the protected host through the terminal protection device, the hardware control logic inside the terminal protection device controls the connection and / or disconnection of the physical line corresponding to the data forwarding, so as to control the transfer of data between the external device and the protected host interact. The present invention can achieve the functions of controlling and protecting various types of data without installing data monitoring and safety protection software on the protected host, realizes the isolation of physical lines through hardware control logic, and better realizes the safety control of data forwarding Effect, and then comprehensively solve the security risks such as virus Trojan implantation and malicious code injection that may be generated by each interface.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a data forwarding control method based on hardware control logic and a corresponding data forwarding control system. Background technique [0002] In recent years, the rapid development of computer and network technology has greatly promoted the popularization of the network. While people are increasingly enjoying the convenience brought by the network, it has also brought new challenges to the data security in the computers used by people in production / life. New threats, such as common malicious code intrusion, virus / trojan horse infection, traffic attack, hacker theft, unauthorized access, posing as a legitimate user, destroying data integrity, interfering with the normal operation of the system, using the network to spread viruses and man-in-the-middle eavesdropping, etc. . [0003] There are many technical means to solve the problem of computer network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/85
CPCG06F21/85G06F21/74G06F21/44H04L63/08H04L63/0227H04L63/0853H04L63/145G06F21/53G06F2221/033H04L63/029
Inventor 杜华艾伟蔡镇河张昊
Owner BEIJING BEYONDINFO TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More