Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-network data security exchange equipment

A technology for data security and exchange equipment, which is applied in the field of cross-network data security exchange equipment, can solve the problems of high data recovery costs, reduced transmission performance of one-way transmission devices, and no security protection measures, etc., to solve the problems of confidentiality and integrity , Improve data exchange performance, protect against damage and the effect of

Pending Publication Date: 2020-11-10
THE FIRST RES INST OF MIN OF PUBLIC SECURITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technical solutions also show some shortcomings and deficiencies in practice, and in serious cases cannot meet the normal operation of the business system
Specifically, such as: (1) low transmission performance
To avoid data loss during transmission, it can only reduce the transmission performance of one-way transmission devices
Since the one-way transmission device has no feedback mechanism, once the data is lost or damaged, manual intervention is required, and the cost of data recovery is high; (3) Insufficient security
The computing unit and storage unit of the untrusted device have no security protection measures. In the event of unknown threats (such as zero-day vulnerabilities) attacking the system, the system may be damaged and malicious code implanted, resulting in the failure of the business system to operate normally and data leakage. risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-network data security exchange equipment
  • Cross-network data security exchange equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] This embodiment provides a cross-network data security exchange device. First, a brief introduction to the relevant terms is given.

[0035] Cross-network data exchange: data exchange between two isolated security domains.

[0036] Data anti-tampering: Technical protection measures to prevent data from being tampered with during storage or transmission.

[0037] Access control: the process of restricting authorized users, programs, processes or other systems in the computer network from accessing system resources according to access policies.

[0038] Whitelist control mechanism: Corresponding to the blacklist mechanism, only users, programs or processes in the whitelist are allowed to access resources.

[0039] Trustworthy Computing: Credibility means that when an entity achieves a given goal, its behavior is always as expected, emphasizing the predictability and controllability of behavioral results. Trusted computing means that the computing behavior provided by the...

Embodiment 2

[0054] This embodiment provides a working method of the cross-network data security exchange device as described in Embodiment 1, as figure 2 As shown, the specific process is as follows:

[0055] S1. The untrusted end transmission device executes the data collection process (a), and obtains data from the external network from the data storage device deployed in the untrusted end unit;

[0056] S2. After receiving the data, the transmission device at the untrusted end transmits the data to the trusted hardening device to realize trusted computing of data (b); after passing the trusted authentication of the trusted hardened device, the trusted hardened device will The data is transmitted to the non-trust computing device for computation (c);

[0057] S3. The untrusted computing device transmits the calculated data to the untrusted storage device for temporary storage (e); before the untrusted storage device reads and writes data, the trusted hardening device checks the data s...

Embodiment 3

[0068] This embodiment provides a cross-network data security exchange device, which is basically the same as Embodiment 1. The main difference is that in this embodiment, the trusted reinforcement device is installed in the trusted end unit. At this time, the trusted reinforcement device is set in the trusted Between the terminal isolated transmission device and the trusted terminal computing device, the trusted terminal isolated transmission device is connected to the trusted terminal computing device through the trusted reinforcement device, and the trusted reinforced device is also connected to the trusted terminal storage device.

[0069] When working, the trusted hardening device performs trusted calculation on the data received by the trusted end isolation transmission device, and the data after trusted calculation can be transmitted to the trusted end computing unit; when the trusted end storage device reads and writes data, the trusted hardened The device checks whethe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses cross-network data security exchange equipment. The cross-network data security exchange equipment comprises a trusted end unit and a non-trusted end unit, wherein the non-trusted end unit comprises a non-trusted end transmission device, a non-trusted end operation device, a non-trusted end storage device and a non-trusted end isolation transmission device, and the trustedend unit comprises a trusted end transmission device, a trusted end operation device, a trusted end storage device and a trusted end isolation transmission device. The non-trusted end isolation transmission device further comprises a non-trusted end receiving device, the trusted end isolation transmission device comprises a trusted end sending device, and the non-trusted end receiving device is incommunication connection with the trusted end sending device. According to the equipment, the receiving device is added to the untrusted end unit, the sending device is added to the trusted end unitto construct two independent data transmission channels, and the two channels work cooperatively, so that the problems of confidentiality and integrity in data transmission are solved, and the data exchange performance is improved.

Description

technical field [0001] The invention relates to the technical field of data exchange equipment, in particular to a cross-network data security exchange equipment. Background technique [0002] With the continuous development of electronic information construction, users have built a large number of private networks, and the demand for cross-network information exchange and sharing is becoming more and more intense. In order to meet the needs of information interaction while ensuring security, a large number of isolation technologies are currently used, and network security isolation equipment is deployed. Between different security domain networks, use isolation technology to realize data security exchange, isolate low security level network and high security level network, not only can resist various network protocol-based attacks, but also can realize different security level networks Safe and controllable data exchange. Deploying network security isolation hardware devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/02H04L63/123H04L63/10H04L9/0877H04L9/0897
Inventor 李超赵利杨卫军温万造尹丹李隐虬柴智
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY