Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An external terminal protection device and protection system for data flow control

A technology of protective equipment and data flow, applied in transmission systems, electrical digital data processing, internal/peripheral computer component protection, etc., can solve problems such as irregularities, damage to external equipment, and impact on enterprises and institutions

Active Publication Date: 2020-07-07
BEIJING BEYONDINFO TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to statistics, 70% of computer crimes are caused by the illegal use of key resources such as hosts by insiders, and only 30% of the real threats come from outside. Irregular external equipment, implanted Trojan horse back door, resulting in abnormal data flow or even network paralysis, as well as system misoperation or deliberate destruction, will cause adverse effects or even major losses on agencies, enterprises and institutions.
[0004] At the same time, for some special equipment, such as the host equipped with special software control, the equipment of the engineer station / worker station in some industrial fields, these hosts / equipment are often not suitable for such systems on the market due to the particularity of the system. Network flow control software and security protection software, or the installation of flow control software or security software may easily cause compatibility problems with the original software of the host, or even affect performance
In addition, the hosts of these engineer stations / worker stations will basically not upgrade the operating system after they go online. Even after installing traffic monitoring and security software, they often do not update the anti-malicious code software version and malicious code library in time, which cannot achieve comprehensive protection. Flow control, network data filtering / auditing and security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An external terminal protection device and protection system for data flow control
  • An external terminal protection device and protection system for data flow control
  • An external terminal protection device and protection system for data flow control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] figure 1 Shown is an application scenario of an embodiment of the protection system for data flow control involved in the present invention.

[0037] like figure 1 As shown, in order to control each data flow of the protected host, it is necessary to take over each interface of the protected host. Therefore, the external terminal protection device of the present invention is provided with an internal interface corresponding to each interface type of the protected host , at the same time, it also provides corresponding types of external interfaces, each internal interface is used to connect to the protected host, and the external interface is used to connect external devices that need to exchange data with the protected host. The terminal protection device is externally connected to the protected host, and each interface (such as UC1 and UC2 of the USB port, CC0 of the COM port, and EC0 of the network port) on the protected host that needs to be protected is connected to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an external terminal protection device for data flow control and a corresponding protection system, wherein the external terminal protection device includes: an interface control module, which is used to provide multiple data interfaces, respectively connected to a protected host and one or A plurality of external devices; a system control module, which is used to monitor the data transmission status of each data interface in the interface control module in real time, and control the data flow of each data interface. The present invention can achieve the functions of protocol filtering and auditing of various types of data traffic without installing traffic monitoring and security protection software on the protected host, and then realize the effects of low-latency network auditing and high-reliability protocol filtering, and comprehensively solve the problem of Potential safety hazards such as virus Trojan implantation and traffic anomalies that may arise from each interface.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an external terminal protection device for data flow control and a corresponding protection system. Background technique [0002] In recent years, the rapid development of computer and network technology has greatly promoted the popularization of the network. While people are increasingly enjoying the convenience brought by the network traffic, it also provides security for the data traffic in the computers used by people in production / life. It brings new threats, such as common traffic attacks, hacker theft, unauthorized access, posing as legitimate users, destroying data integrity, interfering with the normal operation of the system, using the network to spread viruses, and man-in-the-middle eavesdropping, etc. [0003] There are many technical means to solve the problems of intranet computer network traffic control and information security, such as instal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/85
CPCH04L63/0236H04L63/1425G06F21/85H04L63/145G06F13/4282H04L63/20H04L63/0254H04L63/102G06F21/10G06F2221/2141
Inventor 杜华艾伟蔡镇河张昊
Owner BEIJING BEYONDINFO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products