Network data isolation system and data transmission method

A technology that isolates systems and network data, applied in the field of network security, and can solve problems such as attacking network systems

Inactive Publication Date: 2007-01-31
东方惠科防伪技术有限责任公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] According to the survey, more than 80% of the way hackers intrude into the system in the network is to use the system's public loopholes or backdoors. Avoid some loopholes or flaws, causing hackers to use these known loopholes or flaws to attack network systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data isolation system and data transmission method
  • Network data isolation system and data transmission method
  • Network data isolation system and data transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] A network data isolation system 100 includes an internal network host, an external network host, and a serial interface connector, wherein the serial interface connector is respectively connected to the serial interface of the internal network host and the serial interface of the external network host.

[0016] figure 1 is a schematic diagram of a network data isolation system 100 according to an embodiment of the present invention. Two hosts (i.e., an internal network host 10 and an external network host 20) are used to control data exchange between the internal network and the external network. The internal network host 10 and the external network host 20 can be desktop computers or servers. The internal and external network hosts do not share any data of each other, nor do they have the right to log in or control the other party's system, but only receive and send data through a specific serial interface connector (ie, a USB cable). The serial interface connector i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a network data isolating system, comprising intranet host machine, extranet host machine, and serial interface connector, where the serial interface connector connects with serial interfaces of the two host machines.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically relates to a network data isolation system and a data transmission method. Background technique [0002] How to realize security information exchange between external network and internal network has always been an important issue in the field of network security. The current network isolation and protection methods are mainly to install firewalls at the network borders, and monitor and control the traffic entering and leaving the network through the firewalls to ensure the security of exchanged information. However, the firewall can only control the network connection in a logically isolated manner, and its system is easy to be breached. [0003] Security isolation products can be divided into two categories in terms of application scope. One is host-based isolation cards. The typical method is to achieve isolation by switching the network port and hard disk interfa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/28
Inventor 蒋宗清陈汉林
Owner 东方惠科防伪技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products