Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for realizing secure cross-network access under network partition

An access system and security technology, applied in the field of secure cross-network access systems, can solve problems such as security hazards, internal information leakage, and lack of a good solution, and achieve the effect of ensuring data security, ensuring network security, and preserving convenience.

Pending Publication Date: 2022-03-08
成都普沛科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] So far, there is still no good solution on how to prevent internal information leakage while operating remotely on the network
Especially in recent years, incidents of data theft or network attacks through remote networking operations have continued to occur, causing great security hazards to the country and society

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing secure cross-network access under network partition
  • System and method for realizing secure cross-network access under network partition
  • System and method for realizing secure cross-network access under network partition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] The secure cross-network access system provided by this embodiment to realize network isolation, such as figure 1 shown. It includes remote terminal equipment, internal and external network security access equipment and operated terminal equipment.

[0046] The above-mentioned internal and external network security access equipment includes an external machine and an internal machine connected through a minimum signal set channel. The external unit communicates with the remote terminal equipment through the Internet. The internal unit communicates with the operated terminal equipment through the switch.

[0047] The above-mentioned remote terminal equipment, external machine and internal machine all refer to computers, and its operating system can be Windows or UNIX. The operated terminal equipment can be computers, production equipment, monitoring equipment, etc.

[0048] The remote terminal equipment communicates with the external machine through VPN, P2P or other...

Embodiment 2

[0055] This embodiment provides a method for implementing secure cross-network access under network isolation, using the safe cross-network access system given in Embodiment 1 to operate according to the following steps:

[0056] S1 The remote terminal device sends the login request of the external machine to the external machine that securely accesses the device via the Internet; after the login is successful, the external machine sends the corresponding desktop video signal to the remote terminal device of the external machine, and starts the internal and external machine cooperation module.

[0057] The login request here includes the user name and password of the external machine. When the user name and password received by the external machine are valid, the external machine operating system login is successful, and the external machine sends the corresponding desktop video signal to the remote terminal device of the external machine, and starts the internal and external m...

Embodiment 3

[0068] The secure cross-network access system provided by this embodiment to realize network isolation, such as image 3 shown. It includes remote terminal equipment, internal and external network security access equipment and operated terminal equipment.

[0069] Such as Figure 4 The security access equipment for the internal and external network shown above includes an external unit and an internal unit connected via a minimal signal set channel. The external unit communicates with the remote terminal equipment through the Internet. The internal unit communicates with the operated terminal equipment through the switch.

[0070] The above-mentioned remote terminal equipment, external machine and internal machine all refer to computers, and its operating system can be Windows or UNIX. The operated terminal equipment can be computers, production equipment, monitoring equipment, etc.

[0071] The remote terminal equipment communicates with the external machine through VPN,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for realizing secure cross-network access under network partition. The system comprises remote terminal equipment, internal and external network secure access equipment and operated terminal equipment, the internal and external network security access device comprises an external unit and an internal unit which are connected through a minimum signal set channel, and an internal and external unit cooperation module and a channel management module which are arranged in the external unit. An external network and an internal network are separated through an internal and external network security access device, an external unit is in communication connection with a remote terminal device through the Internet, an internal unit is in communication connection with an operated terminal device through the internal network, and the external unit and the internal unit are connected through a minimum signal set channel. And other signals except a keyboard signal, a mouse signal or a desktop video signal are filtered through the arranged signal filtering unit, so that only desktop video signal transmission in a single direction and mouse and keyboard signal transmission in an opposite direction are ensured between the indoor unit and the outdoor unit, and on the premise of network isolation, the signal transmission efficiency is improved. And safe cross-network remote operation can be realized.

Description

technical field [0001] The invention belongs to the technical field of network security, relates to the communication security of an internal network and an external network, and in particular relates to a system and method for realizing safe cross-network access under network isolation. Background technique [0002] Remote operation and control of computers or digital devices is an important tool for business collaboration and system maintenance in the information age. [0003] With the comprehensive application and development of information technology in social and economic activities, the operation and operation of enterprise units all depend on an internal information network system. In order to quickly and economically maintain the equipment and systems they provide to the owners, equipment manufacturers and system manufacturers will directly access the business network through the Internet to operate their equipment and systems. In this internal network information s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/08G06F9/451
CPCH04L63/02H04L67/08H04L63/0428G06F9/452
Inventor 刘小明
Owner 成都普沛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products