Data cross-security domain reverse transmission method

A reverse transmission, cross-security domain technology, applied in digital data protection, electrical digital data processing, computer security devices, etc., can solve problems affecting data exchange efficiency, resource consumption and cost, etc.

Pending Publication Date: 2021-09-10
THE FIRST RES INST OF MIN OF PUBLIC SECURITY +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Some of the data in the forward transmission is non-sensitive. After the data enters the high-security domain, if it needs to be transmitted in the reverse direction, a series of security checks are still required, which will affect the efficiency of data exchange.
If the data is difficult to review, such as audio and video, it will consume more resources and costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data cross-security domain reverse transmission method
  • Data cross-security domain reverse transmission method
  • Data cross-security domain reverse transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment provides a method for reverse transmission of data across security domains, such as image 3 As shown, the specific process is:

[0037] The one-way shutter A performs identity calculation on the data packets transmitted in the forward direction, and the process of obtaining the unique identification is as follows:

[0038] 1) The one-way shutter A obtains the original data unit in the forward transmission data packet, that is, the original video data, and conducts a security review on it;

[0039] 2) After completing the security review of the original video data, the one-way shutter A uses the SHA3-224 function to perform a hash operation on the data to obtain the hash value X; as shown in Table 1.

[0040] Table 1 Cross-domain data information

[0041]

[0042] 3) The one-way shutter A stores X in the identification list (it should be noted that the one-way shutter A only has the right to append to the identification list), and synchronizes it to...

Embodiment 2

[0054] This embodiment provides a method for reverse transmission of data across security domains, such as image 3 As shown, the specific process is:

[0055] The one-way shutter A performs identity calculation on the data packets transmitted in the forward direction, and the process of obtaining the unique identification is as follows:

[0056] 1) The one-way shutter A obtains the original data unit in the forward transmission data packet, that is, the original txt text data, and performs a security review on it;

[0057] 2) After completing the security review of the original txt text data, the one-way shutter A uses the SHA3-224 function to perform a hash operation on the data to obtain the hash value X; as shown in Table 3;

[0058] table 3

[0059]

[0060] 3) The one-way shutter A stores X in the identification list (it should be noted that the one-way shutter A only has the right to append to the identification list), and synchronizes it to each node of the blockc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data across security domain reverse transmission method, which comprises the following specific steps: S1, acquiring an original data unit in a data packet which needs to be transmitted forwards, performing identity identification operation on the original data unit to obtain a unique identifier, and storing the unique identifier in an identifier list; s2, when a data packet needs to be reversely transmitted, firstly obtaining a to-be-checked data unit in the data packet which needs to be reversely transmitted; performing identity identification operation on the to-be-checked data unit to obtain a unique identification; reading the identifier list, comparing the obtained unique identifier with the unique identifier in the identifier list, and if the obtained unique identifier is in comparison with the unique identifier in the identifier list, releasing the data packet; otherwise, forbidding the release of the data packet. According to the invention, the data security examination step of the intranet processing unit can be simplified, and the cross-security domain communication efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method for reverse transmission of data across security domains. Background technique [0002] With the development of network technology, there is a need for cross-domain communication between the same organization in different network domains and different organizations for collaborative work. Cross-domain communication refers to information transmission between two or more networks / regions that implement different security policies. In cross-domain communication, data is mainly transmitted through isolated switching devices, such as figure 1 shown. [0003] The cross-domain transmission of data includes forward transmission and reverse transmission. Forward transmission refers to the generation or collection of raw data from low-security domains, and then the aggregation of these data to high-security domains, and vice versa, it is reverse transmission. In the proc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/606G06F21/64G06F21/6254
Inventor 朱振荣李子峥孙慧洋刘文静张月冬
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products