Unlock instant, AI-driven research and patent intelligence for your innovation.

Data interaction method and device applied to processing system and storage medium

A technology for processing systems and data interaction, applied in the system field, can solve problems such as no guarantee of flexibility, inability to guarantee multiple vertical layers of security isolation at the same time, uncontrollable software and hardware overhead, etc., and achieve the effect of high system security

Active Publication Date: 2022-04-22
北京翼辉信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Through software reinforcement and isolation, it is necessary to increase the overhead of software and hardware. All inflow and outflow data need to be analyzed by corresponding software. A large amount of software is used to filter and analyze data to judge security. At the same time, only by configuring corresponding rules can analysis and filter data be achieved. , so that the flexibility is not guaranteed, and at the same time, only through continuous patching and adding complex rules can analysis and judgment of new malicious data
[0007] None of the above methods can satisfy the coexistence of security domains and open domains, and there is no ability to divide and group multiple domains. As the amount of data increases, software and hardware overheads are uncontrollable, and only one or a certain layer of security isolation can be guaranteed, and multiple domains cannot be guaranteed simultaneously. A vertical level of security isolation, and can only guarantee some problems through additional software and hardware, and cannot reduce overhead and ensure security with high efficiency through native system capabilities.
[0008] And in the prior art, it is also a challenge for how to detect the system security in the above two ways, which is the defect of the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interaction method and device applied to processing system and storage medium
  • Data interaction method and device applied to processing system and storage medium
  • Data interaction method and device applied to processing system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0035] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0036] figure 1 A data interaction method applied to a processing system of the present invention is shown, such as figure 2 As shown, the processing system includes a vertically arranged N-layer structure, and each layer structure is horizontally separated into a security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data interaction method and device applied to a processing system and a storage medium, the processing system comprises N layers of structures which are longitudinally arranged, each layer of structure is transversely isolated into a security domain and an open domain, the security domain and the open domain at the highest layer are connected through a security agent, and N is greater than or equal to 2; the method comprises the following steps: a receiving step: receiving first data sent by a user from a lowest-layer structure of a security domain, and after configuration matching of each layer of security domain, reaching the highest-layer structure of the security domain to obtain second data; a forwarding step: forwarding the second data from the highest layer structure of the security domain to the highest layer structure of the open domain through the security agent to obtain third data; and a sending step: the highest layer structure of the open domain sends the third data to the lowest layer of the open domain. According to the invention, the safety of the system is greatly improved, and the detection speed of the safety of the system is improved.

Description

technical field [0001] The present invention relates to the field of system technology, in particular to a data interaction method, device and storage medium applied to a processing system. Background technique [0002] Definition: Security domain: confidential or secure system, network, application and other areas under the same system or multiple systems; open domain: non-confidential or non-secure system, network, application and other areas under the same system or multiple systems. [0003] In networks and systems involving information security, the security domain cannot directly communicate and exchange data with the open domain, and the data in the security domain is highly private. The open domain is prohibited from obtaining data from the security domain and from sending data to the security domain Domains must be isolated for security, ensuring security and credibility from the source of data. [0004] Currently, there are two mainstream solutions: physical hardw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06F21/53
CPCH04L63/02H04L63/18H04L63/20G06F21/53
Inventor 韩辉弓羽箭焦进星徐贵洲
Owner 北京翼辉信息技术有限公司