Electronic separation wall method, device and system for protecting network space security

A technology of cyberspace, wall, applied in the field of computer network

Inactive Publication Date: 2019-03-29
BEIJING JIAOTONG UNIV
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides an electronic separation wall method, device and system for protecting cyberspace security, so as to solve the problems of user identity, location, behavior privacy and security in cyberspace

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic separation wall method, device and system for protecting network space security
  • Electronic separation wall method, device and system for protecting network space security
  • Electronic separation wall method, device and system for protecting network space security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] figure 1 It is a flow chart of an electronic separation wall method for protecting cyberspace security in Embodiment 1 of the present invention, including:

[0070] S1 establishes a trusted authentication and secure connection between the first cyberspace and the second cyberspace separated by the electronic wall.

[0071] Establishing a trusted authentication and secure connection between the first cyberspace and the second cyberspace separated by an electronic wall, including:

[0072] The first network space and the second network space respectively notify the other party of information, and both parties verify the received information respectively. After the two parties verify successfully, they respectively save the connection relationship and send it to the mapping server device of their respective network space, and send a negotiation signaling After the signaling negotiation is successful, establish and save the secure virtual dedicated channel, save the mappin...

Embodiment 2

[0122] Embodiment 2 of the present invention provides a user electronic wall isolation method for the future Internet, image 3 It is a schematic diagram of the user electronic wall isolation system of the future Internet of the present embodiment 2, as image 3 As shown, two cyberspaces (cyberspace 1 and cyberspace 2) are separated by an electronic wall. According to the division of the topology diagram in Figure 13, each network space is divided into two layers, the management layer and the switching and routing layer. At the management level, the network space is provided with an authentication center device, a mapping server device and a channel server device, which are collectively referred to as the network space manager AM. At the switching and routing level, the main deployment includes multiple access routers (Multiple Access Router, MAR), generalized switching routers (General Switch Router, GSR), edge access routers (Edge Access Router, EAR) and user terminals and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an electronic separation wall method, device and system for protecting network space security. The electronic separation wall method for protecting the network space security comprises the steps that: trusted authentication and security connection are established between a first network space and a second network space, which are separated through an electronic wall; a userterminal performs network space registration on a network space initially requested for access, and performs security authentication and identity and network separation mapping on the network space; and, when a user applies for access to the currently accessed second network space, except the first network space, the user terminal performs network space registration on the second network space, and executes cross-network space security authentication and identity and network separation mapping according to the identity symbol registered in the second network space. By means of the method, thesecurity problem of the identity, position and behaviour privacy of the user in the network space is solved.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an electronic separation wall method, device and system for protecting network space security. Background technique [0002] With the development of information technology, people use the Internet to obtain and manufacture information all the time. However, the massive amount of information widely disseminated in the Internet has also brought great security risks to it, threatening the healthy development of the Internet. For example, counterfeiters can capture the identity information of ordinary users, and then replay and forge the user's data stream to attack others. Attackers can also use the user's identity and location information to conduct DDoS (Distributed Denial of Service, distributed denial of service) service) attacks, and what's more, spy on the privacy of user behavior by tracking and monitoring the user's data flow. Therefore, the protection of user id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/08H04L63/0869
Inventor 张宏科郑涛董平杨冬周华春刘颖王洪超冯博昊权伟严晓云王宗政
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products