CN1276573A - System for ensuring computer network information safety and corresponding method thereof - Google Patents

System for ensuring computer network information safety and corresponding method thereof Download PDF

Info

Publication number
CN1276573A
CN1276573A CN 99107920 CN99107920A CN1276573A CN 1276573 A CN1276573 A CN 1276573A CN 99107920 CN99107920 CN 99107920 CN 99107920 A CN99107920 A CN 99107920A CN 1276573 A CN1276573 A CN 1276573A
Authority
CN
China
Prior art keywords
network
user
computer
computer network
confidentiality
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 99107920
Other languages
Chinese (zh)
Other versions
CN1152331C (en
Inventor
余鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB991079205A priority Critical patent/CN1152331C/en
Priority to CNB008084297A priority patent/CN1174579C/en
Priority to AU45332/00A priority patent/AU4533200A/en
Priority to PCT/CN2000/000100 priority patent/WO2000076128A1/en
Publication of CN1276573A publication Critical patent/CN1276573A/en
Application granted granted Critical
Publication of CN1152331C publication Critical patent/CN1152331C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5691Access to open networks; Ingress point selection, e.g. ISP selection
    • H04L12/5692Selection among different networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A system and method for ensuring information security of computer network includes setting number of computer network to be connected on network selector by user, checking inserted user ID card by network selector to obtain user ID, network security level using authority and network number as well as to send it to security concentrator through T1 and T2 of RJ45 Plus as request to security concentrator, setting network number to be 0 automatically if user ID card is not checked by network selector, checking whether user is legal or not and has right to access network to be accessed by security concentrator after request is received by security concentrator through T1 and T2 of RJ4 Plus and connecting computer network to be accessed by user after it is confirmed.

Description

A kind of system and corresponding method thereof that guarantees information security of computer network
The present invention relates to the information security of computer network, on Ethernet, add network selector and safe hub specifically and just can use a computer access to a plurality of different security levels and mutual computer network of isolating physically.
The internet is computer local network is linked together and to move the computer network of IP agreement.For guaranteeing the information security of computer network, usual way is to add fire wall or acting server between LAN and internet, controls from the internet the visit of LAN by software approach.But this does not make that the computing machine that is connected into the internet exempts from the attack from interconnection network.Therefore those information valuable, that maintain secrecy can not get safety assurance.
In order to ensure information security, the method that adopts physical network to separate usually guarantees that just the internet is not connected on physical circuit with internal computer network valuable, that maintain secrecy now.The cable wiring manufacture of two networks will be carried out in office inside like this, will put two computing machines on the desk, not only increase the cost of office information system, make troubles also for the use of infosystem.Increase the computer network of several different security levels if desired again, just need increase some computing machines again in office, effect can be not desirable yet.
Purpose of the present invention aims to provide a kind of method of information security of computer network and based on the network system of the realization information security of computer network of this scheme, contradiction with between the availability of the Information Security that solves computer network and computer network overcomes the unsafe shortcoming of present computer network information.
A scheme of the present invention has provided a kind of computer network system that guarantees information security of computer network, comprise: router, computing machine, LAN (Local Area Network), and level of confidentiality is different and computer network that isolate physically each other, it is characterized in that it also comprises:
Network selector links to each other with described computing machine, is used to receive customer parameter, receives the request of the computer network of connecting certain level of confidentiality, and the hard disk of described computing machine is controlled;
Safe hub, be connected between the hub of described network selector and described LAN (Local Area Network), be used for the request of response to network selector switch, according to customer parameter and request from network selector, legitimacy to computed user is judged, and according to judged result, agreement or refusing user's are visited the request of the computer network of certain level of confidentiality.
Alternative plan of the present invention provides a kind of method that is used to guarantee information security of computer network, may further comprise the steps;
(1) receives customer parameter, and propose the request of the computer network of certain level of confidentiality of connection;
(2) request of the computer network of described certain level of confidentiality of connection of response is judged user's legitimacy according to described customer parameter;
(3) according to judged result, agreement or refusing user's are visited the request of the computer network of certain level of confidentiality.
The present invention realizes that the method for information security of computer network is transformed the transmission end of existing tree type computer network, need not to change the wiring system of existing network, the physics change of whole computer network is less, and cost is low, time is short, easily success.
To build safe Computer information network in the past and must just will build two parallel fully computer network systems to internal computer network and internet physical isolation.The present invention realizes that the method for information security of computer network only needs a cover Ethernet, has reduced the complexity and the construction cost of network.
The user can have access to a plurality of computer networks on a computing machine, convenient and swift, helps increasing work efficiency.Because diskless computer is simple relatively, the user to the maintenance of computer system save time, laborsaving.
Because the present invention realizes the technical scheme of information security of computer network and implementation method and allows the classification number of level of confidentiality arbitrarily to increase and decrease, therefore it is little that it is not only applicable to size of the organization, security requirements is not high, only need two physically-isolated computer networks with regard to mechanism much of that, also be applicable to trans-regional, transnational, headcount is many, operation flow is complicated, the security sensitive of computer network information is strong, level of confidentiality is got thin mechanism, especially government bodies, transregional company etc.
Computing machine is in the network calculations stage at present through the development course of centralized calculation, Distribution calculation and network calculations.Centralized calculation is exactly that the user is by the information on the terminal use mainframe computer; Distribution calculation is exactly large, medium and small computing machine preservation data separately, and each calculates each computing machine separately, networking share information, the status of the main frame that weakened; Network calculations is exactly that uniform data is stored on the mainframe computer, but data processing can be carried out i.e. DATA DISTRIBUTION calculating, information centralized management on the network computer of networking.The present invention realizes the method for information security of computer network and meets this trend just based on the network system of the realization information security of computer network of the method, helps the user's computer network and use for a long time.
Fig. 1 is the configuration figure according to network selector of the present invention;
Fig. 2 is the configuration figure according to safe hub of the present invention;
Fig. 3 is the configuration figure according to RJ45 Plus plug of the present invention;
Fig. 4 is traditional physically-isolated computer network synoptic diagram;
Fig. 5 is the computer network pie graph according to a plurality of levels of confidentiality of first embodiment of the invention;
Fig. 6 is classical fail-safe computer network pie graph;
Fig. 7 is to the improved fail-safe computer network of Fig. 6 pie graph according to the present invention;
Fig. 8 is the network system process flow diagram according to assurance information security of computer network of the present invention;
Fig. 9 is according to the software flow pattern in the network selector in the system of the present invention;
Figure 10 is according to the software flow pattern in the safe hub in the system of the present invention.
Describe the present invention below in conjunction with accompanying drawing.
To prolong with traditional tree type wiring system with the designed computer local network of technical scheme of the present invention, computing machine is on the leaf position, its network interface standard is RJ45,4 pairs of twisted-pair feeders of drawing thus insert the other network selector (Fig. 1) of computing machine, 4 pairs of twisted-pair feeders that this network selector is drawn by the RJ45 interface again insert far-ends more near the safe hub (Fig. 2) of tree root, opposite side at the safety hub has eight RJ45 interfaces, is respectively to insert internet (Internet), domestic network, outreach network (Extranet), Intranet (Intranet), internal network (Innernet), secret network, secret network and top-secret network.These eight computer networks have all been installed and have been the file server of diskless computer work, there are the start-up routine of each diskless computer and each user's system data and operational data in the file server, also are separately installed with name server, www server, ftp server etc. on these eight computer networks in addition.
So-called diskless computer is meant the system disk that this computing machine itself had not both had guiding device to start, and does not also have the hard disk of store data, but internal memory and central processing unit (CPU) are arranged, and also has motherboard, mainframe box, display, keyboard etc. in addition.The boot that diskless computer can only read relevant this computing machine in the file server by Ethernet with aforesaid internetwork connection mode is to local internal memory, and then from local internal memory with this program start relevant devices.After starting successfully, diskless computer will read operational data from file server and process to local internal memory, and then store on the webserver.
With internet (Internet), domestic network, outreach network (Extranet), Intranet (Intranet), internal network (Innernet), secret network, secret network and top-secret network in advance number consecutively be 0~7, network selector is learnt the network that the user will connect according to the numbering that the user is provided with.Network selector contains card reader, and therefore, network selector has the function that reads the information on the user's ID card that inserts in the card reader, and when not inserting user's ID card, network selector is made as 0 automatically, shows that Any user all can the access internet network.Every computing machine all will be furnished with a network selector.
Safe hub inserts computer network by its network selector appointment to a plurality of computing machines respectively, and safe hub guarantees that these eight computer networks are to isolate mutually.Safe hub also contains card reader, has only the system manager just can hold the control card of safe hub, has only system manager's maintenance safe hub of just having the right.The system manager is provided with each user's information such as level of confidentiality authority on the safety hub, and generates user's ID card for each user.
The special case of safe hub is a layer connection hub, and the interface of the network side of layer connection hub has only one, and that the interface of its computer-side has is a plurality of, is not with IC-card, and the effect of layer connection hub is the access number that extends one's service.
Because two pairs of twisted-pair feeders that RJ45 has defined are used for the variety of protocol of Ethernet and the transmission of network data, so the present invention uses a pair of twisted-pair feeder (Fig. 3) of other two centerings to transmit user identity and uses the information such as authority of network level of confidentiality.T1, T2 represent among the RJ45 a pair of arbitrarily in undefined two pairs of twisted-pair feeders to be marked on the 4th core and the 5th core just schematically among Fig. 3.Like this, the definition of each core is respectively:
The 1--data send "+"
The 2--data send "-"
3--Data Receiving "+"
4--level of confidentiality, proof of identification etc. send "+"
5--level of confidentiality, proof of identification etc. send "-"
6--Data Receiving "-"
7--wouldn't use
8--wouldn't use
The present invention calls RJ45 Plus to the RJ45 of definition like this.Therefore, the computer-side interface of network selector is RJ45, and the network side interface of network selector is RJ45 Plus, and the computer-side of safe hub is RJ45 Plus, the network side interface of safe hub is RJ45, and two side interfaces of layer connection hub all are RJ45 Plus.
Traditional computer network physical isolation method (see figure 4), making on the desk must not two computing machine of dead beat, and one is inserted the internet, and another inserts internal network.Though high safety is wanted two cover computer networks, the cost height, it is too big to take working top, uses inconvenient.
Fig. 4 is transformed later network (see figure 7), because the acting in conjunction of safe hub and network selector makes the user can select on one's own initiative computing machine is connected into any one computer network.Because safe hub is with two computer network physical isolation, so Fig. 5 is the safing characteristic of physical isolation of network loss neither, has reduced cost again, has saved the space.
Classical fail-safe computer network almost can't be maintained secrecy.At present protect networks measure great majority are still adopted the technology mode (see figure 6) of firewall/proxy server, but network hacker can pass firewall/proxy server with multiple means such as personation validated users, enters user's internal computer network.And the present invention is the physical network isolation, does not come so the hacker advances.
Fig. 5 is the information security of computer network system pie graph according to a plurality of levels of confidentiality of the present invention, referring to Fig. 5
In figure five, computer local network prolongs with tree type wiring system, being in leaf locational is computing machine, its network interface standard is RJ45,4 pairs of twisted-pair feeders of drawing thus insert the other network selector 5,6 of computing machine, and network selector 5,6 is again by RJ45 Plus Access Layer connection hub 2,3,4, and this layer connection hub inserts another layer connection hub by RJ45 Plus interface again, like this through the several times relay, at last by RJ45 Plus interface access security hub 1.In other words, be exactly between network selector 5,6 and safe hub 1, to insert multilayer layer connection hub, form the tower shape, can certainly not use by a layer connection hub.Opposite side at safety hub 1 has eight RJ45 interfaces, inserts internet (Internet), domestic network respectively, outreaches network (Extranet), Intranet (Internet), internal network (Internet), secret network, secret network and top-secret network.These eight networks have all been installed and have been the file server of diskless computer work, there are the start-up routine of each diskless computer and each user's system data and operational data in the file server, on each network name server, www server, ftp server etc. are installed also in addition.
With internet (Internet), domestic network, outreach network (Extranet), Intranet (Intranet), internal network (Internet), secret network, secret network and top-secret network in advance number consecutively be 0~7, network selector 5,6 is learnt the network that the user will visit according to the numbering that the user is provided with.The hereinafter alleged computer network that level of confidentiality arranged is meant and is numbered 1~7 network.Network selector 5,6 contains card reader, and when not inserting user's ID card, network selector 5,6 is made as 0 automatically, shows that Any user can the access internet network.Every computing machine all will be furnished with a network selector.
In Fig. 5, from 8 permission accesses of computing machine internet of this machine hard disk startup.If the user will have access to the computer network of level of confidentiality, it has the file server of the computer network of level of confidentiality to start from this to network selector by force so, and between access periods, hard disk will be stopped power supply.This moment it with system in the annexation of other parts and the course of work and diskless computer 7 identical, no longer repeat at this.
Safe hub 1 inserts computer network by its network selector 5,6 appointments to a plurality of computing machines respectively, and safe hub 1 guarantees that these eight computer networks are to isolate mutually.Safe hub 1 also contains card reader, has only the system manager just can hold the control card of safe hub 1, has only system manager's maintenance safe hub of just having the right.The system manager is provided with each user's information such as level of confidentiality authority on safety hub 1, and generates user's ID card for each user.
Fig. 7 is the information safety computer network figure according to second embodiment of the present invention, referring to Fig. 7.
Computing machine 7,8 is received the computer-side interface of network selector 5,6 by RJ45, network selector 5,6 is received the computer-side interface of safe hub 1 again by RJ45 Plus, safe hub 1 is connected with external lan with internal lan respectively again, external lan is connected (seeing among Fig. 7 that external lan and router are reduced among the Internet) through router with the internet.The internal lan here comprises name server, e-mail server, WWW service, file server etc., and they insert Internet service for this tissue.
System flow: after device power-on, if user's setting network selector switch is a non-zero, then diskless computer starts on the file server of LAN (Local Area Network) internally, otherwise, be connected startup with the file server of external lan.
Network selector can also place computer-internal, integrate with CD drive or floppy disk, its network number demonstration, network number selector button, network number ACK button also can be incorporated on the panel of CD drive or floppy disk, and draw two information lines to the T1 of the RJ45 interface of Ethernet card with T2 goes up or on the T1 and T2 of the RJ45 interface on the mainboard, like this, the user just can be with direct Access Layer connection hub of computing machine or safe hub.The benefit of this design is to save the energy, and the aspect is used, and reduces and takes up an area of the space.
Each LAN can insert eight domestic networks in the computer network, and domestic network is connected to each other by WAN communication network, has just constituted national information borderland.Domestic network is the domestic public's a network, and the talent who only has Chinese nationality has the right to use this network.
The present invention realizes that the method for information security of computer network and process are: after computing machine, network selector and safe hub powered up respectively, the user set the numbering of the computer network that will connect on network selector; The user's ID card that the network selector inspection is inserted is known parameters such as user identity, network level of confidentiality rights of using and network numbering, and these parameters is sent to safe hub by T1, the T2 of RJ45 Plus in the lump as the request to the safety hub; If network selector is not found user's ID card, then network numbering is made as 0 automatically, mean this user access internet; After T1, the T2 of safe hub by RJ45 Plus receives request, check whether the user is validated user, whether have the right to visit it and want the computer network of visiting, after confirming, connect the computer network that to visit for the user; After file server is confirmed user's request, send the boot of diskless computer, diskless computer starts in view of the above, after the user keys in the user name and password, enters normal operating conditions.
Fig. 8 is the network system process flow diagram according to assurance information security of computer network of the present invention, below this flow process is described further.
Steps A 1 is obtained user identity, key, the authority of user capture computer network level of confidentiality, the current network number that will visit of user, whether require from the network startup local computer, whether parameters such as data disks are arranged, enter steps A 2 then, if it is diskless computer that A2 judges, then enter A3, otherwise be exactly the dish computing machine, enter B1, might as well ask the internet if at this moment the dish computing machine is arranged, then (B2) network selector makes hard disc of computer must not work during the visit, mean that this has the dish computing machine also will equally start and move with diskless computer, change A3 over to, if steps A 3 judges that the user is illegal, then (C1) alarm stops user's use, and reminding user to replace parameter, in case the user has changed parameter (C2) and just turned back to A1,, then connect circuit and normal operation (A4) for the user if steps A 3 judges that the user is legal, change (A5) until customer parameter, return steps A 1.
The function of Fig. 8 is to be cooperatively interacted by the software in network selector 5,6 and the safe hub 1 to realize.The major function of network selector is exactly the related parameter that has that the user is provided for the safety hub, and prepares to stop disabled user's network that uses a computer at any time.The major function of safe hub is to judge user's legitimacy, for validated user is connected computer network.Be further described below in conjunction with Fig. 9 and Figure 10.
In Fig. 9, step 11 is that network selector judges whether the computing machine that is connected starts from this machine.Step 12 is that network selector assert that computing machine has system disk, and for ensuring information security, network selector will not allow computer access that the computer network of level of confidentiality is arranged, but allow its access internet network, thus step 14 by force setting network be numbered 0.Step 13 shows that this computing machine is a diskless computer, it has the right to visit each computer network, but require the user to insert identification card, so that network selector obtains subscriber identity information, the network numbering selected of integrating step 15 users again, T1, the T2 by RJ45 Plus sends to safe hub in the lump in step 17.If step 16 judges that the network number that the user selects is 1~7, and local hard drive is arranged, then during this computer network of visit, cut off the power supply of hard disk.Can prevent that like this computer network information that will level of confidentiality be arranged is unloaded on the hard disk of this computing machine, because just might divulge a secret during the access internet network once more when this computing machine.If network selector does not have user's ID card, then network numbering is made as 0 automatically, mean this user access internet, step 14 that Here it is.Step 18 is waited for the legitimacy that safe hub is answered this user, if conclusion is illegally just to enter into step 19, and stops this time and connects and network.Step 20 is that network selector is watched the user quietly and whether changed identity or network number, promptly whether changed the user, if do not use the family instead, whether the active user will change the computer network that is connected, there is any one change just to arrive 21 and 17, loops back.
In Figure 10, step 41 is that safe hub passes through the request of T1, the T2 wait of RJ45 Plus from network selector, when not asking, circular wait, when request is arranged, entering step 42, at this moment must be that network number or user identity change, if user identity changes, but have the right to visit the current computer network, then withdraw from a user's network, connect the computer network that to visit for the active user, step 43 that Here it is, 46,47 is got back to 41 then and is waited for; If user identity changes, but have no right to visit the current computer network, then enter step 45, stop connecting and reporting an error to network selector.If user identity does not change, that is to have changed network number certainly, if 44 users have authority to visit this computer network, step 48 notice current file server keeps the working site, be connected to the file server of corresponding new computer network according to user identity, network number etc., get back to 41 again.
Because eight computer networks are isolated mutually, the data between them can not read mutually, especially, can't attack remaining seven network from the internet.Because certain in eight computer networks of diskless computer access just becomes the part of this computer network automatically, because no hard disk, can't be at this organizational security deposit data, and when the computer network of dish computer access band level of confidentiality is arranged, hard disk is not worked, so computing machine can not revealed the information of legacy network when inserting another network again because of it exits network, thereby ensures the information security of computer network.
When switching between the computer network of user at different security level, the webserver automatically keeps user's operation scene, so that continue operation when switching back once more.
We might as well examine the process of this method of realization more intuitively closely.When this process was equivalent to have in face of the user several not connected computer network, the user inserted the Network plug of a computing machine to insert to go as required between each computer network.
Why will be with the computing machine of no dish, be exactly for reveal information on the user's computer not.Why using network selector and safe hub, is the length for the hand of the slotting plug that extends, and reduces the cost of wiring and construction simultaneously.

Claims (10)

1, a kind of computer network system that guarantees information security of computer network comprises: router, and computing machine, LAN (Local Area Network), and level of confidentiality is different and computer network that isolate physically each other, it is characterized in that it also comprises:
Network selector links to each other with described computing machine, is used to receive customer parameter, receives the request of the computer network of connecting certain level of confidentiality, and the hard disk of described computing machine is controlled;
Safe hub, be connected between the hub of described network selector and described LAN (Local Area Network), be used for the request of response to network selector switch, according to customer parameter and request from network selector, legitimacy to computed user is judged, and according to judged result, agreement or refusing user's are visited the request of the computer network of certain level of confidentiality;
2, computer network system as claimed in claim 1, it is characterized in that: adopt the RJ45 interface to link to each other between described network selector and the described safe hub, and transmit described customer parameter, request and control information with a pair of twisted-pair feeder in the undefined twisted-pair feeder of two couple among the RJ45 by twisted-pair feeder.
3, the computer network system described in claim 1 is characterized in that: described computing machine is no hard disk computing machine or the hard disk computing machine is arranged.
4, computer network system as claimed in claim 2 is characterized in that: described network selector has the driver of IC-card, is used for reading the user profile that IC-card stores.
5, computer network system as claimed in claim 2 is characterized in that: described safe hub has the driver of reading IC-card, and safe hub recognition system keeper's ID (identity number) card generates user's ID card.
6, as claim 1,2,3,4,5 one of any described computer network systems, it is characterized in that: described network selector places computer-internal, and the panel of network selector becomes the ingredient of register face.
7, computer network system as claimed in claim 1, it is characterized in that: it also comprises:
Layer connection hub, described layer connection hub bilateral adopts the RJ45 interface, be connected between described network selector and the described safe hub, and transmit described customer parameter, request and control information with a pair of twisted-pair feeder in the undefined twisted-pair feeder of two couple among the RJ45, be used for more computing machine and network selector access security hub.
8, a kind of method that is used to guarantee information security of computer network may further comprise the steps:
(1) receives customer parameter, and propose the request of the computer network of certain level of confidentiality of connection;
(2) request of the network of described certain level of confidentiality of connection of response is judged user validation according to described customer parameter;
(3) according to judged result, the request that agreement or refusing user's are connected the computer network of certain level of confidentiality.
9, method as claimed in claim 8 is characterized in that the step that receives customer parameter may further comprise the steps:
Obtain user identity, key, the authority of customer access network level of confidentiality, whether the number of the current computer network that will visit of user requires from the network startup local computer whether parameters such as system disk are arranged.
10, method as claimed in claim 8 is characterized in that the step of request of the network of described certain level of confidentiality of connection of described response also comprises the following steps:
(1) judges whether this user visits the network of level of confidentiality;
(2) if described user does not visit the network of level of confidentiality, then connect the internet for the user;
(3) if described user capture has the network of level of confidentiality, judge then whether this user has the right to use this network.
CNB991079205A 1999-06-02 1999-06-02 System for ensuring computer network information safety and corresponding method thereof Expired - Fee Related CN1152331C (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CNB991079205A CN1152331C (en) 1999-06-02 1999-06-02 System for ensuring computer network information safety and corresponding method thereof
CNB008084297A CN1174579C (en) 1999-06-02 2000-04-30 System enabling user to select information networks and method thereof
AU45332/00A AU4533200A (en) 1999-06-02 2000-04-30 A system enabling a user to select information networks and a method thereof
PCT/CN2000/000100 WO2000076128A1 (en) 1999-06-02 2000-04-30 A system enabling a user to select information networks and a method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB991079205A CN1152331C (en) 1999-06-02 1999-06-02 System for ensuring computer network information safety and corresponding method thereof

Publications (2)

Publication Number Publication Date
CN1276573A true CN1276573A (en) 2000-12-13
CN1152331C CN1152331C (en) 2004-06-02

Family

ID=5273031

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB991079205A Expired - Fee Related CN1152331C (en) 1999-06-02 1999-06-02 System for ensuring computer network information safety and corresponding method thereof

Country Status (3)

Country Link
CN (1) CN1152331C (en)
AU (1) AU4533200A (en)
WO (1) WO2000076128A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1737719B (en) * 2004-07-29 2010-10-06 洛克威尔自动控制技术股份有限公司 Security system and method for an industrial automation system
US7925697B2 (en) 2002-09-27 2011-04-12 Panasonic Corporation Group judgment device
CN101083659B (en) * 2006-05-30 2012-05-02 凹凸科技国际股份有限公司 Security policy and environment for portable equipment
CN101820438B (en) * 2010-01-27 2013-11-27 戴一奇 Computer starting method in local area network (LAN) and LAN
CN106209871A (en) * 2016-07-18 2016-12-07 四川君逸数码科技股份有限公司 The Wired Security access control apparatus of financial circles network and cut-in method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003058886A1 (en) * 2002-01-08 2003-07-17 Telefonaktiebolaget Lm Ericsson (Publ) Network selection for connectivity
CN104301924B (en) * 2013-07-19 2019-07-23 中兴通讯股份有限公司 Call processing method, device and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2985940B2 (en) * 1996-11-08 1999-12-06 日本電気株式会社 Failure recovery device
AU7118298A (en) * 1997-04-17 1998-11-11 Ericsson Inc. Network interface with adaptive bridge for efficient mapping of ethernets over an atm-based broadband access network
JP2001507916A (en) * 1997-11-04 2001-06-12 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Communication system with improved access network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7925697B2 (en) 2002-09-27 2011-04-12 Panasonic Corporation Group judgment device
US7958240B2 (en) 2002-09-27 2011-06-07 Panasonic Corporation Group judgment device
CN1737719B (en) * 2004-07-29 2010-10-06 洛克威尔自动控制技术股份有限公司 Security system and method for an industrial automation system
CN101083659B (en) * 2006-05-30 2012-05-02 凹凸科技国际股份有限公司 Security policy and environment for portable equipment
US8732789B2 (en) 2006-05-30 2014-05-20 Iyuko Services L.L.C. Portable security policy and environment
CN101820438B (en) * 2010-01-27 2013-11-27 戴一奇 Computer starting method in local area network (LAN) and LAN
CN106209871A (en) * 2016-07-18 2016-12-07 四川君逸数码科技股份有限公司 The Wired Security access control apparatus of financial circles network and cut-in method

Also Published As

Publication number Publication date
AU4533200A (en) 2000-12-28
CN1152331C (en) 2004-06-02
WO2000076128A1 (en) 2000-12-14

Similar Documents

Publication Publication Date Title
CN110545260B (en) Cloud management platform construction method based on mimicry structure
CN105247529B (en) The synchronous voucher hash between directory service
US6366951B1 (en) Distributed processing system where a management computer automatically connects remote reduced-capability workstations with centralized computing modules
CN100535808C (en) System and method for secure remote access
US6886038B1 (en) System and method for restricting data transfers and managing software components of distributed computers
CN1578215B (en) System and method for automatic negotiation of a security protocol
US6993556B1 (en) Context administrator
CN108549580A (en) Methods and terminal device of the automatic deployment Kubernetes from node
US20030041085A1 (en) Management system and method for network devices using information recordable medium
CN101061454A (en) Systems and methods for managing a network
CN1514653A (en) Information route method and system based on secret strategy
CA2527501A1 (en) Multilayer access control security system
EP1643370A4 (en) Image database system
CN1666477A (en) Method, system and apparatus for monitoring and controlling data transfer in communication networks
CN100539499C (en) A kind of safe star-shape local network computer system
CN1453959A (en) Remote control system and method for domestic network
CN106470184A (en) Safety certifying method, apparatus and system
CN1152331C (en) System for ensuring computer network information safety and corresponding method thereof
CN1509560A (en) Device for accessing speech and data network
CN1731743A (en) Method for managing network device
CN1452081A (en) Server, local server access system and access control method
CN1622519A (en) Information synchronous management system and method
CN1172495C (en) Method for realizing interconnection between devices by using door gateway and its realizing equipment
CN101283540A (en) Method and device for sharing rights object in digital rights management and system thereof
CN1180359C (en) Control method of network connection and separation

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee