A network isolation device and method

A network isolation and equipment technology, applied in the field of network security, can solve problems such as breaking the isolation state of dual networks and increasing network security risks of rail transit control signal data network, and achieve the effect of improving network security

Inactive Publication Date: 2022-04-15
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, after the acquisition device in one network is maliciously hijacked, the malicious code is uploaded to the central device through the out-of-band network, and the central device forwards the malicious code to the other network in the dual network, thereby threatening the other network and breaking The isolation between the two networks has been eliminated, which has greatly increased the network security risk of the rail transit control signal data network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network isolation device and method
  • A network isolation device and method
  • A network isolation device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] In order to solve the above-mentioned problems in the prior art, the embodiment of the present invention discloses a network isolation device and method, which will be described in detail below.

[0038] Such as figure 1 as shown, figure 1 A structural diagram of a network isolation device provided for an embodiment of the present invention, including a processor 101, an output interface 102, and a plurality of input interfaces 103; It is connected wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention provides a network isolation device and method, including a processor, an output interface, and multiple input interfaces; the network isolation device is connected to the collection device through the input interface, and the network isolation device is connected to the central device through the output interface; multiple The incoming interfaces are isolated from each other; the first incoming interface among the multiple incoming interfaces is used to receive data packets and send the data packets to the processor; the processor is used to detect whether the data packets match the preset filtering rules; if , the data packet is discarded; if not, the data packet is sent to the outbound interface; the outbound interface is used to send the data packet to the central device. It can be seen that the embodiment of the present invention realizes the data isolation of the redundant dual network at the physical level and the logical level, and improves network security.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network isolation device and method. Background technique [0002] In the rail transit safety data network, a redundant dual-network architecture is adopted, and the business networks between the two networks are isolated from each other. When one of the networks fails or is attacked, the business communication between the user and the rail transit safety data network can be automatically switched to another network to complete the work independently, ensuring the normal operation of the signal safety data network and the normal operation of the rail transit. The acquisition equipment collects the data in the redundant dual network separately, and the obtained data needs to be uploaded to the central equipment through the out-of-band network for data analysis and processing. During this process, if the central device is attacked, the central device will become a relay...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0209H04L63/0263H04L63/0227
Inventor 王进何跃鹰李强侯斯尧罗冰李亚红缪亚男孙中豪郭涛陈少鹏
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products