Cross-network data security exchange equipment
A technology for data security and exchange equipment, which is applied in the field of cross-network data security exchange equipment, can solve the problems of high data recovery costs, reduced transmission performance of one-way transmission devices, and no security protection measures, etc., to solve the problems of confidentiality and integrity , Improve data exchange performance, protect against damage and the effect of
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] This embodiment provides a cross-network data security exchange device. First, a brief introduction to the relevant terms is given.
[0035] Cross-network data exchange: data exchange between two isolated security domains.
[0036] Data anti-tampering: Technical protection measures to prevent data from being tampered with during storage or transmission.
[0037] Access control: the process of restricting authorized users, programs, processes or other systems in the computer network from accessing system resources according to access policies.
[0038] Whitelist control mechanism: Corresponding to the blacklist mechanism, only users, programs or processes in the whitelist are allowed to access resources.
[0039] Trustworthy Computing: Credibility means that when an entity achieves a given goal, its behavior is always as expected, emphasizing the predictability and controllability of behavioral results. Trusted computing means that the computing behavior provided by the...
Embodiment 2
[0054] This embodiment provides a working method of the cross-network data security exchange device as described in Embodiment 1, as figure 2 As shown, the specific process is as follows:
[0055] S1. The untrusted end transmission device executes the data collection process (a), and obtains data from the external network from the data storage device deployed in the untrusted end unit;
[0056] S2. After receiving the data, the transmission device at the untrusted end transmits the data to the trusted hardening device to realize trusted computing of data (b); after passing the trusted authentication of the trusted hardened device, the trusted hardened device will The data is transmitted to the non-trust computing device for computation (c);
[0057] S3. The untrusted computing device transmits the calculated data to the untrusted storage device for temporary storage (e); before the untrusted storage device reads and writes data, the trusted hardening device checks the data s...
Embodiment 3
[0068] This embodiment provides a cross-network data security exchange device, which is basically the same as Embodiment 1. The main difference is that in this embodiment, the trusted reinforcement device is installed in the trusted end unit. At this time, the trusted reinforcement device is set in the trusted Between the terminal isolated transmission device and the trusted terminal computing device, the trusted terminal isolated transmission device is connected to the trusted terminal computing device through the trusted reinforcement device, and the trusted reinforced device is also connected to the trusted terminal storage device.
[0069] When working, the trusted hardening device performs trusted calculation on the data received by the trusted end isolation transmission device, and the data after trusted calculation can be transmitted to the trusted end computing unit; when the trusted end storage device reads and writes data, the trusted hardened The device checks whethe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


