Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security isolation method and device based on data stripping and building method of network security isolation device based on data stripping

A network security and isolation device technology, applied in the field of network security, can solve the problems of inability to effectively integrate multiple business scenarios, low throughput of isolation equipment, and low communication efficiency, and achieve reliable design principles, protection authenticity, and simple structure. Effect

Inactive Publication Date: 2021-04-16
SHANDONG LUNENG SOFTWARE TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing isolation devices have problems such as low throughput, inability to effectively integrate multiple business scenarios, high damage rate, and low communication efficiency. There are security issues such as third-party illegal personnel stealing data, infiltrating the power intranet, and illegal deployment and access of illegal equipment. Hidden danger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security isolation method and device based on data stripping and building method of network security isolation device based on data stripping
  • Network security isolation method and device based on data stripping and building method of network security isolation device based on data stripping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0029] figure 1 is a schematic flowchart of a method in one embodiment of the present invention. in, figure 1 The execution subject may be a network security isolation device based on data stripping.

[0030] Such as figure 1 As shown, the method includes:

[0031] Step 110, authenticate the identity of the database server on the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security isolation method and device based on data stripping and a building method of the network security isolation device based on data stripping, and the method comprises the steps: authenticating the identity of an external network side database server in an IP or MAC address binding mode; collecting data in an external network database, and performing format checking and virus searching and killing on data contents; packaging the antivirus data into a format file in a specific file format required by isolation, and sending the encrypted format file to isolation equipment; and ferrying the file with the specific format, decrypting and carrying out format conversion, and then loading the file into a target database of the intranet end. The technology for realizing information network security isolation and data stripping in a specific application environment is used for isolating network boundaries and protecting authenticity, integrity and reliability of internal and external network data.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network security isolation method, device and construction method based on data stripping. Background technique [0002] In recent years, with the development of informatization and the application of the Internet in all walks of life, data security has become more and more prominent in network applications in different business environments and different security domains. In the power system, user data security and security Protection has become a key concern. The process of reporting information flow from the user terminal area through the intermediate network to the power application master station needs to meet the relevant regulations of "safety partition, network dedicated, horizontal isolation, and vertical authentication". Therefore, it is urgent to solve the risks of network border security and transmission channels through relevant technical means...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 卢立生邓昊尹朋张俊岭张云鹏武传奇刘波牛爱梅杨勇宋天航
Owner SHANDONG LUNENG SOFTWARE TECH