CN101340275A - Data card, data processing and transmitting method - Google Patents

Data card, data processing and transmitting method Download PDF

Info

Publication number
CN101340275A
CN101340275A CNA2008101189871A CN200810118987A CN101340275A CN 101340275 A CN101340275 A CN 101340275A CN A2008101189871 A CNA2008101189871 A CN A2008101189871A CN 200810118987 A CN200810118987 A CN 200810118987A CN 101340275 A CN101340275 A CN 101340275A
Authority
CN
China
Prior art keywords
data message
data
module
list item
successful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101189871A
Other languages
Chinese (zh)
Other versions
CN101340275B (en
Inventor
李苏阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Shenzhen Huawei Communication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huawei Communication Technologies Co Ltd filed Critical Shenzhen Huawei Communication Technologies Co Ltd
Priority to CN2008101189871A priority Critical patent/CN101340275B/en
Publication of CN101340275A publication Critical patent/CN101340275A/en
Application granted granted Critical
Publication of CN101340275B publication Critical patent/CN101340275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides a data card and a data processing and transmission method thereof; wherein, the data card comprises a receiving module, a signal transforming module, a network processing module and a sending module; the receiving module is used for receiving a first data message sent by a terminal device; the signal transforming module is used for generating a second data message after the format conversion of the first data message, sending the second data message to an external network, receiving a third data message sent by the external network according to the second data message and generating a fourth data message after the format conversion of the third data message; the network processing module is used for filtering and matching the fourth data message, and if the matching is successful, a fifth data message is generated; the sending module is used for sending the fifth data message to the terminal device. The scheme causes the data message which passes through the data card to be filtered, thus ensuring the security of the data that flows into the terminal device.

Description

Data card and data processing thereof and transmission method
Technical field
The present invention relates to the communications applications field, be meant a kind of data card and data processing thereof and transmission method especially.
Background technology
Along with development of internet technology, increasing potential safety hazard has appearred in the Internet network, in open network, there are the many computers that can not trust, these computers are being connected with the Internet network, and transmission is during data, and unsafe factors such as the virus of network, wooden horse or hacker all can be invaded this computer, and the privately owned sensitive information that is stored in this computer has been caused very big threat.
The present safety prevention measure of data firewall technology normally in the computer, installation fire compartment wall or installation antivirus software guarantee to be stored in the safety of data in the computer in computer, yet, these measures lag behind the transfer of data between computer and network usually, that is to say, found often to go killing virus again after computer is by poisoning intrusion, perhaps pass through analysis to hacker's attack means, find out some mean of defenses at assault, but for the privately owned sensitive information of storing in the computer, in case stolen by the hacker, then have irretrievable property.
The inventor finds that there are the following problems at least in the prior art in realizing process of the present invention:
Transmission between computer and external network can not be real obtain safety guarantee, press for and between personal computer and outer net, construct defence line together, in order to resist attack from external network.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of data card and data processing and transmission method, make communicating by letter between computer and the external network obtain fail safe control, prevent illegal access and visit, guarantee the safety of computer system important information resource in the computer.
For solving the problems of the technologies described above, embodiments of the invention provide technical scheme as follows:
On the one hand, provide a kind of data card, comprising:
Data card comprises:
Receiver module is used for first data message that receiving terminal apparatus sends;
Signal conversion module after being used for described first data message carried out format conversion, generates second data message, and sends described second data message to external network; And receive the 3rd data message that described external network sends according to described second data message, and after described the 3rd data message carried out format conversion, generate the 4th data message;
Network process module is used for described the 4th data message is filtered coupling, if the match is successful, generates the 5th data message;
Sending module is used for sending described the 5th data message to described terminal equipment.
On the other hand, also provide a kind of data processing and transmission method of data card, comprising:
First data message that reception sends from terminal equipment, and after described first data message carried out format conversion, generate second data message, and send described second data message to external network;
Receive the 3rd data message that described external network sends according to described second data message, and after described the 3rd data message carried out format conversion, generate the 4th data message;
Described the 4th data message is filtered coupling,, generate the 5th data message if the match is successful;
Send described the 5th data message to described terminal equipment.
Embodiments of the invention have following beneficial effect:
Such scheme is by disposing prevention policies on data card, make data message all be filtered detection by data card, thereby externally data have added last one firm safety curtain before flowing into computer, communicating by letter between computer and the external network filtered control, by putting teeth in unified security strategy, prevent illegal access and visit, ensure that individual's important, sensitive data do not encroached on important information resources.
Description of drawings
Fig. 1 is the structural representation of embodiments of the invention data card;
Fig. 2 is a concrete structure schematic diagram of data card shown in Figure 1;
Fig. 3 is the another concrete structure schematic diagram of data card shown in Figure 1;
Fig. 4 is installed in the computer for data card shown in Figure 3, carries out the scene schematic diagram of transfer of data with external network;
Fig. 5 is the data processing and the transmission method schematic flow sheet of embodiments of the invention data card.
Embodiment
For technical problem, technical scheme and advantage that embodiments of the invention will be solved is clearer, be described in detail below in conjunction with the accompanying drawings and the specific embodiments.
Embodiments of the invention at the transmission between computer in the prior art and external network can not be real the problem that obtains safety guarantee, a kind of installation data card on computers and the data processing and the transmission method of data card are provided.
As shown in Figure 1, embodiments of the invention data card 1 comprises:
Receiver module 10 is used for first data message that receiving terminal apparatus sends; The terminal equipment of terminal equipment here such as computer or other network service;
Signal conversion module 11 after being used for first data message carried out format conversion, generates second data message, and sends second data message to external network; And receive the 3rd data message that external network sends according to second data message, and after the 3rd data message carried out format conversion, generate the 4th data message; Wherein, the 3rd data message can be the message of promising of second data message; This signal conversion module 11 mainly is that the message through data card 1 is carried out modulation, as converting network signal to from the data-signal message that computer receives, perhaps converts the network signal message to data-signal that computer can receive;
Network process module 12 is used for the 4th data message is filtered coupling, if the match is successful, generates the 5th data message;
Sending module 13, be used for sending the 5th data message to terminal equipment, wherein, when specific implementation, this sending module 13 can be a module with above-mentioned receiver module 10, and as the interface module of data card, this data card can be connected with terminal equipment by this interface module, the data institute literary composition that sends to data card from terminal equipment can pass through from this interface module so, and the data message that sends to terminal equipment from data card also can pass through from this interface module.
This embodiment is by filtering the data that enter terminal equipments such as computer on data card 1; communicating by letter between computer and the external network carried out security control; by putting teeth in unified security strategy; prevent illegal access and the visit of external network, reach the purpose of safety of protection system for computer and stored resource thereof important information resource in the computer.
As shown in Figure 2, be a concrete structure schematic diagram of data card shown in Figure 1, above-mentioned network process module 12 comprises:
Forwarding module 120, be used to receive first data message that receiver module 10 is received, and be transmitted to signal conversion module 11, this first data message is transmitted to signal conversion module 11 by this forwarding module 120, purpose is to allow network process module 12 can monitor this first data message in advance, and set up being connected at data card 1 and external network based on application layer protocol for this first data message, certainly this first data message also can directly be transmitted to external network by signal conversion module 11, at this moment, because signal conversion module 11 also is the part of data card, equally also can set up being connected between data card 1 and the external network for this first data message based on application layer protocol.
Memory module 121, be used to store prevention policies configuration information by the default application layer protocol of terminal equipment, and according to update instruction, configuration as the prevention policies configuration information of default application layer protocol, prevention policies configuration information to storage upgrades, this prevention policies configuration information such as packet filtering, viral detection, blacklist, attack-defending, IP-MAC address binding etc., can dispose different prevention policies at different application layer protocols, can be single channel agreement, binary channels agreement or other application layer protocol as application layer protocol.
Monitoring module 122, be used for prevention policies configuration information according to the application layer protocol of above-mentioned memory module 121 storages, monitoring is based on the state of the application layer protocol of above-mentioned first data message place connection, as when a connection is set up, source IP, purpose IP, source port, destination interface, protocol number and message data feature etc. based on the application layer protocol of this connection, the state of different application layer protocols is different, enumerates no longer one by one here.
Filtering module 123, be used for according to above-mentioned application layer protocol and state thereof, create a filtering rule, and above-mentioned the 4th data message after signal conversion module 11 conversion is filtered coupling according to this filtering rule, if the match is successful, generate the 5th data message, and the 5th data message is sent to terminal equipment by sending module 13.The filtering module 123 here can adopt ASPF (the Application Specific Packet Filter that adopts usually as in the firewall technology, the packet filtering of application layer) realizes, this ASPF is based on the state that connects, and dynamically whether the determination data bag is allowed to by fire compartment wall or abandons.
As shown in Figure 3, according to the different application layer protocols and the state of this application layer protocol, can create different filtering rules, therefore, based on the single channel agreement that connects the time, above-mentioned filtering module 123 is specifically as follows:
First filtering module 1231, be used for detecting when being the single channel agreement based on the application layer protocol that connects, create the first five-tuple list item, this first five-tuple list item is the Session list item of five-tuple, comprise source IP, purpose IP, source port, destination interface, protocol number, when the 4th data message after signal conversion module 11 receives conversion, according to this first five-tuple Session list item the 4th data message is filtered coupling, if the match is successful, then allow the 4th data message to pass through, generate the 5th data message, and the 5th data message is sent to terminal equipment, otherwise block the 4th data message by sending module 13.
Same, when application layer protocol is during based on the binary channels agreement that connects, adopted the servermap list item mode of combining of the session list item+tlv triple of five-tuple to realize, guaranteed the fail safe of internal network so to a great extent, above-mentioned filtering module 123 also can be specially:
Second filtering module 1232, be used for detecting when being the binary channels agreement based on the application layer protocol that connects, create the second five-tuple list item and tlv triple list item, this second five-tuple list item is the session list item of five-tuple, the tlv triple list item is the servermap list item of tlv triple, when the 4th data message comes, at first can carry out legitimacy to the interface channel that transmits described the 4th data message according to the servermap list item of this tlv triple judges, if it is legal, after data channel has been set up, then according to the session list item of this second five-tuple the 4th data message is filtered coupling again, if the match is successful, then allow the 4th data message to pass through, generate the 5th data message, and the 5th data message is sent to described terminal equipment, otherwise block the 4th data message by sending module 13.Therefore the tlv triple servermap list item here is " interim inlet " list item, after real data message has come, can carry out complete judgement according to this data message+servermap, and this connection is a legal data channel.After data channel had been set up, the servermap list item had just been deleted, and can set up a session passage based on five-tuple this moment for this data channel.So just avoided, because the characteristics of multichannel agreement, and produce a permanent passage, the potential safety hazard that internal network exposes.Certainly, above-mentioned filtering module 123 is except being first filtering module 1231 or being second filtering module 1232, at different application layer protocol the time, can also create at other application layer protocols and create filtering rule, according to this filtering rule the 4th data message is carried out filter operation.
After above-mentioned first filtering module 1231 or 1232 pairs the 4th data messages of second filtering module carry out filter operation, be current connection when finishing, need the filtering rule of interim foundation be upgraded as five-tuple list item or tlv triple list item, therefore, network filtering module 12 also comprises:
Filter update module 124, be used for after detecting 1231 pairs the 4th data messages of first filtering module the match is successful, upgrade this first five-tuple list item, specifically, can revise or delete this five-tuple list item,, rebulid the five-tuple list item again to connect when setting up next time, so that the filtering rule that the connection of passage is each time adopted is all different, reduction external network hacker's etc. risk of attacks;
This filtration update module 124 is judged as when legal at the interface channel that detects 1232 pairs of second filtering modules transmission the 4th data message, delete this tlv triple immediately, to avoid internal network to expose, after detecting 1232 pairs the 4th data messages of second filtering module the match is successful, revise or delete this second five-tuple list item immediately, relevant information with the transmission channel of avoiding transmitting the 4th data message is exposed, and causes potential safety hazard.
Describe in conjunction with of the concrete application of concrete application scenarios more below above-mentioned data card:
As shown in Figure 4, this application scenarios comprises terminal equipment 2, as computer, be installed in the data card 1 in the network interface of this terminal equipment 2, this data card 1 is such as wireless Internet card, modulator-demodulator (Modem) etc., and the external network (as Internet etc.) of communicating by letter with this data card with wireless mode;
Wherein, receiver module 10 that data card 1 has or sending module 13 can be USB interface, pcmcia interface or Express interface etc., and this data card 1 can be connected with computer by these interfaces.
When the data message in the computer 2 sends to external network by data card 1, data card 1 can carry out two-way filtration and detection to this data message, during concrete the filtration, can monitor based on the application layer protocol state that connects, and according to the interim filtering rule of creating of these application layer protocol states, and according to this filtering rule to filtering coupling through the message of this data card 1, if the match is successful, then allow to pass through, otherwise block, so guaranteed fundamentally that the security protection that terminal equipment 2 and all messages of communicating by letter between the external network all pass through this data card 1 filters, guaranteed the high safety of terminal equipment 2 interior resources.
In conjunction with Fig. 4, introduce a concrete application example flow process of above-mentioned data card 1 again;
1) telnet session of user A initialization sends to external network with this conversation request by data card 1;
2) in data card 1, network process module 12 can be finished to connect and set up according to concrete application layer protocol, create corresponding filtering rule, as when finishing TCP three-way handshake, connect and set up, and create filtering rules such as corresponding five-tuple list item or tlv triple list item according to concrete application layer protocol, and safeguard these five-tuple list items or tlv triple list item;
When 3) response message that sends to user A when external network is by data card, after at first can being carried out format conversion by signal conversion module 11, send to network process module 12, this network process module 12 is according to the filtering rule of having created, to its data message that receives, as the 4th above-mentioned data message, filter, the message that can mate filtering rule can pass through, otherwise blocks, message as other users' telnet process gets clogged, and can not pass through;
4) when this telnet session finishes, this filtering rule, deleted immediately as above-mentioned five-tuple list item or tlv triple list item, the invalid packet of forging telnet again also can't pass through, to connect when setting up next time, fire compartment wall can rebulid a new Session list item again.Guaranteed the fail safe of embedded computer system so to a great extent.
In sum, the above embodiment of the present invention data card 1, increased the network protection function, its driver and configuration (as prevention policies, virus base etc.) can be upgraded by CD or special website, at current network security present situation the security protection strategy of data card are upgraded configuration timely.The user also can be on PC carries out the flexible configuration change by special software interface to the security protection strategy of data card, for example the user can cross rate, viral detection, blacklist, attack-defending, IP-MAC binding etc. by the software interface configuration packet of computer, thereby externally data have added last one firm safety curtain before flowing into computer, are not encroached on important, the sensitive data that ensure the individual.
As shown in Figure 5, embodiments of the invention also provide a kind of data processing and transmission method of data card, comprise the steps:
First data message that step S51, receiving terminal apparatus send, and after described first data message carried out format conversion, generate second data message, and send described second data message to external network;
Step S52 receives the 3rd data message that described external network sends according to described second data message, and after described the 3rd data message carried out format conversion, generates the 4th data message; Wherein, described the 3rd data message can be the message of promising of described second data message;
Step S53 filters coupling to described the 4th data message, if the match is successful, generates the 5th data message;
Step S54 sends described the 5th data message to described terminal equipment.
This embodiment before entering computer, carries out filtration treatment by data message that external network is sent earlier, has guaranteed the safety of computer.
Specifically, the method for this embodiment can have following specific implementation process:
First data message that step S61, receiving terminal apparatus send, and this first data message carried out format conversion, generate second data message, and send out this second data message of pound to external network; Wherein, this first data message can be the access request of terminal equipment to external network, and this second data message is the network signal that the first data message format conversion becomes to generate;
Step S62 receives the 3rd data message that external network sends according to second data message, and after the 3rd data message carried out format conversion, generates the 4th data message; Wherein, the 3rd data message can be the message of promising of second data message, and the 4th data message can be the data-signal that generates after the 3rd data message format conversion;
Step S63 according to application layer protocol and the state thereof based on the connection at the above-mentioned first data message place, creates a filtering rule, and according to described filtering rule described the 4th data message is filtered coupling, if the match is successful, generates the 5th data message;
Specifically, detecting when being the single channel agreement based on the application layer protocol that connects, create the first five-tuple Session list item, according to this first five-tuple Session list item above-mentioned the 4th data message is filtered coupling, if the match is successful, then generate the 5th data message, otherwise block the 4th data message.
Perhaps detecting when being the binary channels agreement based on the application layer protocol that connects, create the second five-tuple list item and tlv triple Servermap list item, according to this tlv triple Servermap list item the interface channel that transmits described the 4th data message being carried out legitimacy judges, if it is legal, then described the 4th data message is filtered coupling according to this second five-tuple list item, if the match is successful, then generate the 5th data message, otherwise block described the 4th data message.
Detect based on other application layer protocols that connect, go out to create equally a corresponding filtering rule, and the 4th data message is filtered coupling according to this filtering rule.
Step S64 sends the 5th data message to terminal equipment.
In above-mentioned step S63, after the match is successful to the 4th data message according to filtering rule, when promptly finishing based on the current connection of this application protocol, the filtering rule that deletion or modification have been set up, promptly revise or delete the above-mentioned first five-tuple list item or upgrade the above-mentioned second five-tuple list item, when next connection is set up, can create new filtering rule again, the data message is filtered, guaranteed that so to a greater extent the data channel that connects is not exposed, connect each time and all use different filtering rules that the data message through data card is filtered, guaranteed the high safety of the data in the computer system.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to finish by program, described program can be stored in the computer read/write memory medium, this program is when carrying out, comprise step as above-mentioned method embodiment, described storage medium, as: ROM/RAM, magnetic disc, CD etc.
The above is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from principle of the present invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (12)

1. data card comprises:
Receiver module is used for first data message that receiving terminal apparatus sends;
Signal conversion module after being used for described first data message carried out format conversion, generates second data message, and sends described second data message to external network; And receive the 3rd data message that described external network sends according to described second data message, and after described the 3rd data message carried out format conversion, generate the 4th data message;
Network process module is used for described the 4th data message is filtered coupling, if the match is successful, generates the 5th data message;
Sending module is used for sending described the 5th data message to described terminal equipment.
2. data card according to claim 1 is characterized in that, described network process module comprises:
Forwarding module is used to receive first data message that described receiver module receives, and transmits to described signal conversion module.
3. data card according to claim 2 is characterized in that, described network process module also comprises:
Memory module is used to store the prevention policies configuration information of default application layer protocol, and according to update instruction, the described prevention policies configuration information of storing is upgraded.
4. data card according to claim 3 is characterized in that, described network process module also comprises:
Monitoring module is used for according to described prevention policies configuration information, and monitoring is based on the state of the described application layer protocol of described first data message place connection;
Filtering module is used for creating a filtering rule according to described application layer protocol and state thereof, and according to described filtering rule described the 4th data message is filtered coupling, if the match is successful, generates the 5th data message.
5. data card according to claim 4 is characterized in that, described filtering module is:
First filtering module, be used for detecting when being the single channel agreement based on the application layer protocol that connects, create the first five-tuple list item, according to the described first five-tuple list item described the 4th data message is filtered coupling, if the match is successful, generate the 5th data message, otherwise block described the 4th data message.
6. data card according to claim 4 is characterized in that, described filtering module is:
Second filtering module, be used for detecting when being the binary channels agreement based on the application layer protocol that connects, create the second five-tuple list item and tlv triple list item, according to described tlv triple list item the interface channel that transmits described the 4th data message being carried out legitimacy judges, if legal, then described the 4th data message is filtered coupling, if the match is successful according to the described second five-tuple list item, generate the 5th data message, otherwise block described the 4th data message.
7. according to claim 5 or 6 described data cards, it is characterized in that described network process module also comprises:
Filter update module, be used for after detecting described first filtering module the match is successful to described the 4th data message, upgrading the described first five-tuple list item;
Perhaps the interface channel that transmits described the 4th data message is judged as when legal detecting described second filtering module, delete described tlv triple, after detecting described second filtering module the match is successful to described the 4th data message, upgrade the described second five-tuple list item.
8. the data processing of a data card and transmission method is characterized in that, comprising:
First data message that reception sends from terminal equipment, and after described first data message carried out format conversion, generate second data message, and send described second data message to external network;
Receive the 3rd data message that described external network sends according to described second data message, and after described the 3rd data message carried out format conversion, generate the 4th data message;
Described the 4th data message is filtered coupling,, generate the 5th data message if the match is successful;
Send described the 5th data message to described terminal equipment.
9. method according to claim 8 is characterized in that, described described the 4th data message is filtered, and generates the 5th data message and is specially:
According to application layer protocol and state thereof, create a filtering rule, and described the 4th data message is filtered coupling according to described filtering rule, if the match is successful, generate the 5th data message.
10. method according to claim 9 is characterized in that, and is described according to application layer protocol and state thereof, create a filtering rule, and described the 4th data message is filtered coupling according to described filtering rule, if the match is successful, generate the 5th data message and be specially:
Detecting when being the single channel agreement based on the application layer protocol that connects, create the first five-tuple list item, described the 4th data message is filtered coupling, if the match is successful according to the described first five-tuple list item, generate the 5th data message, otherwise block described the 4th data message.
11. method according to claim 9 is characterized in that, and is described according to application layer protocol and state thereof, creates a filtering rule, and according to described filtering rule described the 4th data message filtered, and generates the 5th data message and is specially:
Detecting when being the binary channels agreement based on the application layer protocol that connects, create the second five-tuple list item and tlv triple list item, according to described tlv triple list item the interface channel that transmits described the 4th data message being carried out legitimacy judges, if it is legal, then described the 4th data message is filtered coupling according to the described second five-tuple list item, if the match is successful, generate the 5th data message, otherwise block described the 4th data message.
12. according to claim 10 or 11 described methods, it is characterized in that, after described generation the 5th data message or block after described the 4th data message, also comprise:
Upgrade the described first five-tuple list item or upgrade the described second five-tuple list item.
CN2008101189871A 2008-08-27 2008-08-27 Data card, data processing and transmitting method Active CN101340275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101189871A CN101340275B (en) 2008-08-27 2008-08-27 Data card, data processing and transmitting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101189871A CN101340275B (en) 2008-08-27 2008-08-27 Data card, data processing and transmitting method

Publications (2)

Publication Number Publication Date
CN101340275A true CN101340275A (en) 2009-01-07
CN101340275B CN101340275B (en) 2010-10-20

Family

ID=40214242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101189871A Active CN101340275B (en) 2008-08-27 2008-08-27 Data card, data processing and transmitting method

Country Status (1)

Country Link
CN (1) CN101340275B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778117A (en) * 2010-03-12 2010-07-14 华为终端有限公司 Network storing and processing method, device and wireless terminal
CN102045361A (en) * 2010-12-30 2011-05-04 中兴通讯股份有限公司 Network security processing method and wireless communications device
CN102195887A (en) * 2011-05-31 2011-09-21 北京星网锐捷网络技术有限公司 Message processing method, device and network security equipment
CN102263773A (en) * 2010-05-25 2011-11-30 腾讯科技(深圳)有限公司 Real-time protection method and apparatus thereof
CN102750193A (en) * 2012-06-19 2012-10-24 株洲南车时代电气股份有限公司 Data reloading method for LKJ monitoring device
CN101697521B (en) * 2009-09-25 2013-08-07 曙光信息产业(北京)有限公司 Automated testing method and system for filter network card
CN107181605A (en) * 2016-03-09 2017-09-19 阿里巴巴集团控股有限公司 Message detecting method and system, contents extraction device, flow matches device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101116052A (en) * 2004-12-21 2008-01-30 米斯特科技有限公司 Network interface and firewall device
CN2922301Y (en) * 2006-03-30 2007-07-11 汤长风 Network safe network card
CN101227361B (en) * 2008-01-29 2010-12-29 中兴通讯股份有限公司 System and method for accessing client end to next network

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697521B (en) * 2009-09-25 2013-08-07 曙光信息产业(北京)有限公司 Automated testing method and system for filter network card
CN101778117A (en) * 2010-03-12 2010-07-14 华为终端有限公司 Network storing and processing method, device and wireless terminal
CN101778117B (en) * 2010-03-12 2013-03-20 华为终端有限公司 Network storing and processing method, device and wireless terminal
CN102263773A (en) * 2010-05-25 2011-11-30 腾讯科技(深圳)有限公司 Real-time protection method and apparatus thereof
CN102263773B (en) * 2010-05-25 2014-06-11 腾讯科技(深圳)有限公司 Real-time protection method and apparatus thereof
CN102045361A (en) * 2010-12-30 2011-05-04 中兴通讯股份有限公司 Network security processing method and wireless communications device
CN102195887A (en) * 2011-05-31 2011-09-21 北京星网锐捷网络技术有限公司 Message processing method, device and network security equipment
CN102195887B (en) * 2011-05-31 2014-03-12 北京星网锐捷网络技术有限公司 Message processing method, device and network security equipment
CN102750193A (en) * 2012-06-19 2012-10-24 株洲南车时代电气股份有限公司 Data reloading method for LKJ monitoring device
CN102750193B (en) * 2012-06-19 2015-05-06 株洲南车时代电气股份有限公司 Data reloading method for LKJ monitoring device
CN107181605A (en) * 2016-03-09 2017-09-19 阿里巴巴集团控股有限公司 Message detecting method and system, contents extraction device, flow matches device
CN107181605B (en) * 2016-03-09 2020-06-23 阿里巴巴集团控股有限公司 Message detection method and system, content extraction device and flow matching device

Also Published As

Publication number Publication date
CN101340275B (en) 2010-10-20

Similar Documents

Publication Publication Date Title
CN101340275B (en) Data card, data processing and transmitting method
JP4174392B2 (en) Network unauthorized connection prevention system and network unauthorized connection prevention device
JP4499161B2 (en) Method, system and apparatus for realizing data service security in a mobile communication system
US9325725B2 (en) Automated deployment of protection agents to devices connected to a distributed computer network
US6721890B1 (en) Application specific distributed firewall
US20100100959A1 (en) System and method for monitoring and analyzing multiple interfaces and multiple protocols
EP2161898B1 (en) Method and system for defending DDoS attack
CN101257678A (en) Method, terminal and system for realizing mobile terminal software safe detection
CA2496939A1 (en) Network security method and apparatus
CN101969413A (en) Home gateway
CN104660593A (en) Method for filtering OPC security gateway data packets
TW202429853A (en) Data transmission method, system, first end, intermediate network device and control device
JP4437043B2 (en) Method and apparatus for automatically controlling access between a computer and a communication network
CN102790773A (en) Method for realizing firewall in household gateway
CN101820414A (en) Host access control system and method
US20200213355A1 (en) Security Network Interface Controller (SNIC) Preprocessor with Cyber Data Threat Detection and Response Capability that Provides Security Protection for a Network Device with Memory or Client Device with Memory or Telecommunication Device with Memory
JP2006094258A (en) Terminal device, its policy forcing method, and its program
KR101881061B1 (en) 2-way communication apparatus capable of changing communication mode and method thereof
CN102882728B (en) Traffic Anomaly cause notifying method, device and the network equipment
WO2015018200A1 (en) Method and apparatus for upgrading detection engine in firewall device
CN101582880A (en) Method and system for filtering messages based on audited object
JP2000163283A (en) Remote site computer monitor system
JP2008141352A (en) Network security system
US20130104233A1 (en) Network data control device and network data control method for controling network data that generates malicious code in mobile equipment
KR101059698B1 (en) Portable memory unit having a module of api hooking and method for driving personal firewall using thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518129 Huawei Technology Co., Ltd. of Bantian Huawei Base, Longgang District, Shenzhen City, Guangdong Province

Patentee after: Huawei terminal (Shenzhen) Co.,Ltd.

Address before: 518129 Huawei Technology Co., Ltd. of Bantian Huawei Base, Longgang District, Shenzhen City, Guangdong Province

Patentee before: HUAWEI DEVICE Co.,Ltd.

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20190102

Address after: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after: HUAWEI DEVICE Co.,Ltd.

Address before: 518129 Huawei Technology Co., Ltd. of Bantian Huawei Base, Longgang District, Shenzhen City, Guangdong Province

Patentee before: Huawei terminal (Shenzhen) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210423

Address after: Unit 3401, unit a, building 6, Shenye Zhongcheng, No. 8089, Hongli West Road, Donghai community, Xiangmihu street, Futian District, Shenzhen, Guangdong 518040

Patentee after: Honor Device Co.,Ltd.

Address before: Metro Songshan Lake high tech Industrial Development Zone, Guangdong Province, Dongguan City Road 523808 No. 2 South Factory (1) project B2 -5 production workshop

Patentee before: HUAWEI DEVICE Co.,Ltd.

TR01 Transfer of patent right