CN105282157B - A kind of secure communication control method - Google Patents

A kind of secure communication control method Download PDF

Info

Publication number
CN105282157B
CN105282157B CN201510696503.1A CN201510696503A CN105282157B CN 105282157 B CN105282157 B CN 105282157B CN 201510696503 A CN201510696503 A CN 201510696503A CN 105282157 B CN105282157 B CN 105282157B
Authority
CN
China
Prior art keywords
data packet
terminal
trusted
security
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510696503.1A
Other languages
Chinese (zh)
Other versions
CN105282157A (en
Inventor
王宇
王飞
孙鸿鹏
吴忠望
韩伟杰
李晋丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhong'an Xinkong Technology Co Ltd
PLA Equipment College
Original Assignee
Beijing Zhong'an Xinkong Technology Co Ltd
PLA Equipment College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhong'an Xinkong Technology Co Ltd, PLA Equipment College filed Critical Beijing Zhong'an Xinkong Technology Co Ltd
Priority to CN201510696503.1A priority Critical patent/CN105282157B/en
Publication of CN105282157A publication Critical patent/CN105282157A/en
Application granted granted Critical
Publication of CN105282157B publication Critical patent/CN105282157B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention provides a kind of secure communication control methods.Wherein, administrative center sends terminal security strategy file to trusted terminal and sends gateway security strategy file to trusted gateway;Trusted terminal carries out security control according to terminal security strategy file to the data packet for flowing in and out trusted terminal;Trusted gateway carries out security control according to gateway security strategy file to the data packet for flowing in and out trusted gateway.Since trusted terminal and trusted gateway carry out corresponding safety verification and processing to the data packet flowed in and out, data packet is avoided to be maliciously tampered and avoid the unauthorized access in network between domain, realizes the secure communication between different network domains.

Description

A kind of secure communication control method
Technical field
The present invention relates to trust computing and network communication field, in particular to a kind of secure communication control method.
Background technology
With the development of information technology, Network Communicate Security has become the major issue of constraint information development.How to ensure Network interconnection safety, realizes each safety communication between devices in network, it has also become urgent problem at present.
Currently, itself is received by technologies such as intrusion detections and antivirus protection mainly by the terminal in network Information carry out safety detection, investigate the invalid information of malicious attack, the safety to communicate with Logistics networks.
But it can only detect whether included in the information that terminal receives by technologies such as intrusion detection and antivirus protections Virus or wooden horse, and security control can not be carried out to the communication between different network domains, terminal may be to its net without access rights Domain sends information, it is also possible to receive the information that the terminal of the domain from no access rights is sent.
Invention content
In view of this, the embodiment of the present invention is designed to provide a kind of secure communication control method, realizes different network domains Between secure communication.
In a first aspect, an embodiment of the present invention provides a kind of secure communication control method, the method includes:
Trusted terminal is by networks filter driver intercepted data packet, according to the source address and destination address of the data packet, Judge the type of the data packet, the type of the data packet includes outflow type and inflow type;
When the type for judging the data packet is outflow type, the trusted terminal is according to the destination address and terminal Java.policy carries out safe handling to the data packet;
When the type for judging the data packet is inflow type, the trusted terminal is according to the source address and the end Java.policy is held to carry out safety verification to the data packet.
With reference to first aspect, an embodiment of the present invention provides the first possible realization method of above-mentioned first aspect, In, the trusted terminal carries out the data packet safe handling, packet according to the destination address and terminal security strategy file It includes:
The trusted terminal according to the destination address, judge to receive terminal whether with the trusted terminal be located at it is same can Believe in the corresponding range of gateway;
If it is, the data packet is sent to the reception terminal;If it is not, then according to the destination address and terminal The access control list that Java.policy includes, judges whether the reception terminal belongs to exception equipment;
If belonging to exception equipment, the data packet is sent to the reception terminal;If being not belonging to exception equipment, Stream label is generated for the data packet, by stream label addition in the data packet, will be added described in the stream label Data packet is sent to the reception terminal.
The possible realization method of with reference to first aspect the first, an embodiment of the present invention provides the of above-mentioned first aspect Two kinds of possible realization methods, wherein, it is described to generate stream label for the data packet, the stream label is added in the data Bao Zhong, including:
The trusted terminal obtains the safe class of the security domain belonging to itself;
According to the port numbers of the data packet institute is obtained from the label allocation list that the terminal security strategy file includes State the corresponding priority level of port numbers;
The security domain belonging to the trusted terminal is obtained in the multicast key table included from the terminal security strategy file Mark and the corresponding multicast key of the security domain;
By the multicast key to the identifying of the security domain, the safe class, the priority level, the data Source address, destination address, virtual machine mark, reserved field and the data segment of packet carry out Hash operation, obtain check value;
By the identifying of the security domain, the priority level, the virtual machine mark, the reserved field and the verification Value forms the stream label of the data packet, the stream label is added in the data packet head of the data packet.
With reference to first aspect, an embodiment of the present invention provides the third possible realization method of above-mentioned first aspect, In, the trusted terminal carries out safety verification according to the source address and the terminal security strategy file to the data packet, Including:
The trusted terminal judges whether include stream label in the data packet head of the data packet;
If judge not including stream label, according to the source address of the data packet and the terminal security strategy file packet The access control list included, judge send terminal whether for external equipment, if it is, the data packet is received, if it is not, then losing Abandon the data packet;
If judge, comprising stream label, to test to the stream label, if upchecking, receive the data Packet, if the test fails, abandons the data packet.
The third possible realization method with reference to first aspect, an embodiment of the present invention provides the of above-mentioned first aspect Four kinds of possible realization methods, wherein, it is described to test to the stream label, including:
Obtain mark, priority level, virtual machine mark, reserved field and the verification for the security domain that the stream label includes Value and acquisition source address, destination address and data segment from the data packet;
According to the mark of the security domain, the multicast key and safe class of the security domain are obtained;
By the multicast key to the identifying of the security domain, virtual machine mark, the reserved field, the peace Congruent grade, the priority level, the source address of the data packet, destination address and data segment carry out Hash operation, and Hash is transported The value of calculation is compared with the check value, if the two is identical, is upchecked, if the two differs, the test fails.
With reference to first aspect, an embodiment of the present invention provides the 5th kind of possible realization method of above-mentioned first aspect, In, the method further includes:
The trusted terminal receives the terminal security strategy file that administrative center sends, the terminal security strategy file packet Include label allocation list, multicast key table, access control list and security domain correlation table;
The trusted terminal record access behavioural information, by the access behavioural information compositing terminal security log, and often The terminal security daily record is sent to the administrative center every the first preset time period.
Second aspect, an embodiment of the present invention provides a kind of secure communication control method, the method includes:
Whether trusted gateway receives the data packet that terminal is sent, judge the data packet comprising stream label;
If judging not including stream label, included according to the source address of the data packet and gateway security strategy file Make an exception list of devices, judge the terminal whether for external equipment, if it is, forward the data packet, if it is not, then abandoning The data packet;
If judging, comprising stream label, to test to the stream label according to the gateway security strategy file, if It upchecks, then forwards the data packet, if the test fails, abandon the data packet.
With reference to second aspect, an embodiment of the present invention provides the first possible realization method of above-mentioned second aspect, In, before the trusted gateway receives the data packet that terminal is sent, further include:
The trusted gateway receives the gateway security strategy file that administrative center sends, the gateway security strategy file packet Include exception list of devices, sign test Policy Table and security domain multicast key table.
With reference to second aspect, an embodiment of the present invention provides second of possible realization method of above-mentioned second aspect, In, the method further includes:
The trusted gateway records data packet exception information, and the data packet exception information is formed gateway security daily record, And the gateway security daily record is sent to administrative center every the second preset time period.
The third aspect, an embodiment of the present invention provides a kind of secure communication control method, the method includes:
Administrative center sends terminal security strategy file to trusted terminal and sends gateway security strategy file to credible Gateway makes the trusted terminal securely communicate control according to the terminal security strategy file and make the trusted networks It closes and control is securely communicated according to the gateway security strategy file;
The administrative center receives terminal security daily record and the reception trusted gateway hair that the trusted terminal is sent The gateway security daily record sent, according to the terminal security daily record and the gateway security daily record respectively to the trusted terminal and institute It states trusted gateway and carries out security monitoring.
In method provided in an embodiment of the present invention, administrative center is trusted terminal configurating terminal Java.policy, with And gateway security strategy file is configured for trusted gateway.Trusted terminal is credible to flowing in or out according to terminal security strategy file The data packet of terminal carries out security control.Trusted gateway according to gateway security strategy file to by trusted gateway data packet into Row security control.It can so realize the secure communication between different network domains, avoid the malice between the domain of no access rights It accesses.
For the above objects, features and advantages of the present invention is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It in order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range, for those of ordinary skill in the art, without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the method flow diagram of a kind of secure communication control that the embodiment of the present invention 1 is provided;
Fig. 2A shows the signaling interaction diagram of a kind of secure communication control that the embodiment of the present invention 2 is provided;
Fig. 2 B show the schematic diagram of a kind of trusted terminal processing data packet that the embodiment of the present invention 2 is provided;
Fig. 2 C show a kind of sign test strategy schematic diagram that the embodiment of the present invention 2 is provided;
Fig. 2 D show a kind of communication network schematic diagram that the embodiment of the present invention 2 is provided;
Fig. 3 shows the system structure diagram of a kind of secure communication control that the embodiment of the present invention 3 is provided.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be configured to arrange and design with a variety of different herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing Go out all other embodiments obtained under the premise of creative work, shall fall within the protection scope of the present invention.
In view of that can not carry out security control to the communication between different network domains in the relevant technologies, terminal may be to it without visit Ask that the domain of permission sends information, it is also possible to receive the information that the terminal of the domain from no access rights is sent.Based on this, An embodiment of the present invention provides a kind of secure communication control methods.It is described below by embodiment.
Embodiment 1
Referring to Fig. 1, an embodiment of the present invention provides a kind of secure communication control methods.This method specifically includes following step Suddenly:
Step 101:Administrative center sends terminal security strategy file to trusted terminal and sends gateway security strategy text Part is to trusted gateway;
It is related that above-mentioned terminal security strategy file includes label allocation list, multicast key table, access control list and security domain Table.Above-mentioned gateway security strategy file includes exception list of devices, sign test Policy Table and security domain multicast key table.
Step 102:Trusted terminal receives the terminal security strategy file that administrative center sends, according to the terminal security strategy File carries out security control to the data packet Jing Guo trusted terminal;
Trusted terminal, according to the source address and destination address of data packet, is judged by networks filter driver intercepted data packet The type of data packet, the type of data packet include outflow type and inflow type;When the type for judging data packet is outflow type, root Safe handling is carried out to data packet according to destination address and terminal security strategy file;When the type for judging data packet is inflow type When, safety verification is carried out to data packet according to source address and terminal security strategy file.
Step 103:Trusted gateway receives the gateway security strategy file that administrative center sends, according to the gateway security strategy File by the data packet of trusted gateway to carrying out security control.
Whether trusted gateway receives the data packet that terminal is sent, judge data packet comprising stream label;If judge not including Whether stream label, the then exception list of devices included according to the source address of data packet and gateway security strategy file, judge terminal For external equipment, if it is, forwarding data packet, if it is not, then packet discard;If judge comprising stream label, basis Gateway security strategy file convection tags are tested, if upchecking, forward data packet, if the test fails, are abandoned Data packet.
In embodiments of the present invention, administrative center is trusted terminal configurating terminal Java.policy and is trusted networks Close configuration gateway security strategy file.Trusted terminal is according to terminal security strategy file to flowing in or out the data of trusted terminal Packet carries out security control.Trusted gateway is according to gateway security strategy file to carrying out safe control by the data packet of trusted gateway System.It can so realize the secure communication between different network domains, data packet is avoided to be maliciously tampered and avoid no access rights Domain between malicious access.
Embodiment 2
Referring to Fig. 2A, an embodiment of the present invention provides a kind of secure communication control methods.In embodiments of the present invention, pass through Administrative center is managed collectively the trusted terminal in network and trusted gateway, passes through multiple trusted terminals and multiple trusted networks Pass can form different domains.The secure communication control method provided through the embodiment of the present invention can realize different domains Between secure communication.This method specifically includes following steps:
Wherein, before communication between the network domains carries out security control, the operation of 201-204 is completed as follows first To the initial configuration of trusted terminal and trusted gateway.
Step 201:Administrative center generates terminal security strategy file, which is sent to credible end End, the terminal security strategy file include label allocation list, multicast key table, access control list and security domain correlation table;
In embodiments of the present invention, trusted terminal and trusted gateway can be enhanced by credible enhancing technology, be increased Add trusted terminal and the credibility of trusted gateway.Can multiple virtual machines be installed according to user demand in trusted terminal.Exception is set The standby equipment for credible enhancing can not be carried out.Making an exception in the communication networks of compositions such as equipment, trusted terminal and trusted gateway can be with Including multiple and different domains, a domain covers one section of IP (Internet Protocol Address, internet protocol address) Address field can include multiple trusted terminals or exception equipment in each domain, can be by credible between different domains Gateway is attached.
For each domain, administrative center is provided with security domain ID (Identity, mark), safe class and the group of domain Key is broadcast, security domain ID is the mark of domain, and the safe class of domain is divided according to the IP address section of domain, can be divided into The different brackets such as top-secret, secret, secret and disclosure, since domain is provided with safe class, domain can be described as again in the present invention Security domain.Each domain has its corresponding multicast key, and the safety between domain can be realized according to the multicast key of domain Communication.For each domain, administrative center is also provided with the domain that domain is allowed to access and forbids the net of domain access Domain.Wherein, all terminals in a security domain can free communication, can communicate between the security domain of same security level, Can set as needed cannot communicate between some domains.
When administrative center is a trusted terminal configurating terminal Java.policy, administrative center is first according to the trusted terminal IP address determine domain belonging to the trusted terminal, the multicast key of the security domain ID of the domain and the domain are formed this can Believe the multicast key table of terminal.
Domain of the administrative center according to belonging to the trusted terminal determines to allow domain that the trusted terminal accesses and really Surely the mark of exception equipment that the domain accessed is allowed to include will allow security domain ID, IP address section, the multicast of the domain accessed Key and the mark of exception equipment that the domain accessed is allowed to include form the access control list of the trusted terminal.Make an exception equipment Mark can for external equipment IP address.
Domain of the administrative center according to belonging to the trusted terminal determines the domain that the trusted terminal is forbidden to access, will forbid The security domain ID for the domain that the trusted terminal accesses forms the security domain mutual exclusion table of the trusted terminal.
Additionally, it is sometimes desirable to change the domain belonging to trusted terminal, need to record the variation of the affiliated domain of the trusted terminal Situation, administrative center record the security domain history table for having trusted terminal, which includes credible end The security domain ID of virtual machine mark, the affiliated domain of virtual machine on end and the beginning and ending time for belonging to the domain.When by the credible end It holds after marking off to come from the domain belonging to it, due to that can not communicate between the affiliated domain of original and certain specific domains, that This trusted terminal cannot be subdivided in these specific domains.Therefore, administrative center should be every time trusted terminal or can Virtual machine in letter terminal is when reassigning domain, need to first check for this domain whether with the domain in security domain history table Mutual exclusion.The security domain mutual exclusion table of trusted terminal and security domain history table are formed security domain correlation table by administrative center.
Trusted terminal has multiple ports, and administrative center can set the priority level of each port, the priority of port Can be the different stages such as low, high or real-time.Administrative center is by the port numbers of each port of the trusted terminal and each port Priority level form the label allocation list of the trusted terminal.
Administrative center is by above-mentioned multicast key table, access control list, security domain correlation table and label allocation list compositing terminal Java.policy, and the terminal security strategy file is sent to the trusted terminal.
For other each trusted terminals in network, administrative center is other each trusted terminals all in accordance with aforesaid way Configurating terminal Java.policy.
In embodiments of the present invention, when changing the security domain belonging to trusted terminal, being selected by way of list will The security domain of distribution.Check whether the security level of the security domain is higher than the security level of trusted terminal.Check trusted terminal Security domain history table and security domain mutual exclusion table check what whether currently selected security domain was recorded with its historical record Security domain mutual exclusion if mutual exclusion need to reselect, if not mutual exclusion, prompts chosen successfully, and the safety belonging to by this trusted terminal It is revised as selected security domain in domain.Then new record is added into security domain history table, adds in current trusted terminal ID and current security domain ID.
When terminal security strategy file updates, administrative center needs in time to be sent to updated terminal security strategy file Trusted terminal.
In addition, in embodiments of the present invention, before terminal security strategy file is sent to trusted terminal by administrative center, also First the identity of trusted terminal can be authenticated.Authentication can be initiated by trusted terminal, using pair based on public key system Wait identity authentication protocols, certification by and trusted terminal obtain terminal security strategy file after, trusted terminal can pacify terminal Multicast key table in full strategy file is stored in Ukey (small memory device).
Step 202:Trusted terminal receives and stores the terminal security strategy file of administrative center's transmission;
While administrative center completes the initial configuration to the trusted terminal in network, it is also desirable to as follows The initial configuration to trusted gateway is completed in 203 and 204 operation.
Step 203:Administrative center generates gateway security strategy file, which is sent to trusted networks It closes, which includes exception list of devices, sign test Policy Table and security domain multicast key table;
The security domain ID and multicast key of all domains are formed security domain multicast key table by administrative center.Administrator is by institute Exception list of devices is formed by the ID and the exception equipment of exception the equipment IP address section of security domain that can be accessed.
In embodiments of the present invention, the sign test mode of trusted gateway is by two factor controllings, first, the priority of port, high The data packet of priority, sign test ratio is relatively low, otherwise higher.Second is that the security level of trusted terminal or virtual machine, safety Rank is higher, then the ratio of sign test is higher.Administrative center considers above-mentioned two factor, specifies sign test Policy Table.Sign test plan Sketch form can be that administrative center is based on the bivariate table that " risk Metrics " are formulated, as shown in table 1.
Table 1
It is low It is high In real time
It is top-secret 100% 50% 20%
Secret 50% 30% 10%
It is secret 30% 20% 5%
It is open 20% 10% 0%
Percent data in above-mentioned table 1 represents sign test ratio, as safe class is top-secret and priority level be low when test Label ratio is 100%, that is, it is that low data packet carries out sign test to need to be top-secret and priority level to each safe class.Above-mentioned hundred Divide and can be pre-configured with than data by administrator.It first has to load stream label to data packet before trusted terminal transmission data packet, Security domain ID and priority level field are contained in stream label.When data packet is sent to trusted gateway, trusted gateway is according to above-mentioned The sampling proportion in bivariate table shown in table 1 carries out sign test to the stream label of data packet.
Above-mentioned exception list of devices, sign test Policy Table and security domain multicast key table are formed gateway security plan by administrative center Slightly file, trusted gateway is sent to by the gateway security strategy file.For each trusted gateway in network, administrative center is all Gateway security strategy file is sent to each trusted gateway in the manner described above.When gateway security strategy file updates, pipe Reason center needs that updated gateway security strategy file is sent to trusted gateway in time.
It in embodiments of the present invention, can be with before gateway security strategy file is sent to trusted gateway by administrative center Authentication first is carried out to trusted gateway.Trusted gateway carries out bidirectional identity authentication, body when starting first time with administrative center Part certification is that administrative center is initiated by trusted gateway, is recognized using the peer-to-peer authentication agreement based on public key system Card, by rear, trusted gateway could obtain gateway security strategy file for certification.
The verification process of the above-mentioned peer-to-peer authentication agreement based on public key system is as follows:
Trusted gateway initiates session to administrative center, utilizes the ID and trusted networks of the public key encryption trusted gateway of administrative center The public key digital certificate of pass, and administrative center is sent to, administrative center obtains after receiving the public key digital certificate of trusted gateway The public key of trusted gateway;Administrative center utilizes the public key of trusted gateway, by the public key digital certificate, identity ID and production of administrative center The first raw random number encryption, and it is sent to trusted gateway;After trusted gateway receives above- mentioned information, the public affairs of administrative center are utilized Key digital certificate obtains the public key of administrative center, then using the public key of administrative center by the ID of trusted gateway, generate second Random number and above-mentioned first random number encryption, and it is sent to administrative center;Administrative center is confirmed after being decrypted using the private key of oneself The identity of trusted gateway, last administrative center are close using the multicast of security domain that the public key of trusted gateway is administered trusted gateway Trusted gateway is transferred to after key and security domain ID encryptions, both sides carry out peer-to-peer authentication and terminate.
Step 204:Trusted gateway receives and stores the Java.policy of administrative center's transmission;
In embodiments of the present invention, be trusted terminal configurating terminal Java.policy and be trusted gateway configuration net Strategy file is closed, Java.policy collectively referred to as is configured for terminal, which there can be following two modes:
1. terminal actively initiates certification.
Connection request is sent out by terminal, administrative center pre-sets server-side watcher thread, and real-time reception carrys out self terminal Connection request.TCP (Transmission Control Protocol, transmission control protocol) between terminal and administrative center After the completion of connection is established, administrative center will need the Java.policy pushed, is digitally signed using administrative center's private key, It is subsequently sent to terminal.After terminal receives Java.policy, digital signature is verified, and add using the public key certificate of administrative center Enter the current timestamp of administrative center, ensure the safety of Java.policy, if authentication failed, need request management center Retransmit Java.policy.
2. administrative center actively initiates certification.
When the Java.policy update of administrative center, request is sent to terminal from administrative center and establish TCP connection.Eventually End needs open listening port in advance, after whether real time inspection has the request from administrative center, TCP connection to establish, using with Newer Java.policy is sent to terminal by the same method of digital signature authentication in first way.
By being completed the step of above-mentioned steps 201-204 to the trusted terminal and the initial configuration of trusted gateway in network Afterwards, trusted terminal and trusted gateway the operation of 205-212 can to carry out the data communication in network as follows Security control.
Step 205:Trusted terminal is by networks filter driver intercepted data packet, according to the source address of data packet and destination Location judges the type of data packet, and step 206 is performed when the type of data packet is outflow type, when the type of data packet is flows into Step 207 is performed during type;
Due to being equipped with multiple virtual machines in trusted terminal, may there is virtual machine transmission data packet or reception outward simultaneously The data packet sent to miscellaneous equipment, is divided into inflow type and outflow type two in the embodiment of the present invention by the type of data packet accordingly Kind.The data packet of inflow type is the data packet that miscellaneous equipment sends over, and the data packet of outflow type is the virtual machine of trusted terminal The data packet sent outward.
Trusted terminal intercepts and captures the data packet Jing Guo trusted terminal by networks filter driver, and the number is obtained from the data packet According to the source address and destination address of packet, the IP address of the source address of the data packet and destination address and trusted terminal is carried out respectively Compare, if the source address of data packet is identical with the IP address of trusted terminal, the type for judging the data packet is outflow type.If The destination address of data packet is identical with the IP address of trusted terminal, then the type for judging the data packet is inflow type.
Step 206:Trusted terminal carries out safe handling according to destination address and terminal security strategy file to data packet;
When the type for judging data packet is outflow type, trusted terminal judges the number according to the destination address of data packet Whether it is located in the corresponding range of same trusted gateway with trusted terminal according to the reception terminal of packet, the corresponding model of same trusted gateway The domain for referring to receive belonging to the domain and the trusted terminal belonging to terminal in enclosing is connect with same trusted gateway, same credible Trusted terminal in the corresponding range of gateway can be accessed mutually.Wherein, the destination address of data packet is exactly to receive terminal IP address, according to the IP address for receiving terminal, the IP for the domain that the access control list checked in terminal security strategy file includes Address field determines the domain belonging to the reception terminal, judge the domain belonging to the domain and trusted terminal whether be located at it is same can In the range of letter gateway.If it is, trusted terminal, which sends the data packet, gives reception terminal.If it is not, then according to data packet Destination address checks in the exception list of devices that terminal security strategy file includes whether include the destination address, if comprising, Judge that receiving terminal belongs to exception equipment, delivers a packet to reception terminal.If not including, judge to receive terminal not Belong to exception equipment, then generate stream label for data packet, by stream label addition in the packet, the data packet of stream label will be added It is sent to reception terminal.
It is above-mentioned for data packet generation stream label and the process of stream label addition in the packet is as follows:
Trusted terminal obtains the safe class of the security domain belonging to itself;According to the port numbers of data packet from terminal security plan The corresponding priority level of port numbers is obtained in the label allocation list that slightly file includes;The multicast included from terminal security strategy file The mark of security domain and the corresponding multicast key of security domain belonging to trusted terminal are obtained in key list;Trusted terminal is from data packet The middle source address for obtaining the data packet, destination address, virtual machine mark, reserved field and data segment;By multicast key to peace Mark, safe class, priority level, the source address of data packet, destination address, virtual machine mark, reserved field and the number of universe Hash operation is carried out according to section, obtains check value;By mark, priority level, virtual machine mark, reserved field and the verification of security domain It is worth the stream label of composition data packet, stream label is added in the data packet head of data packet.
Above-mentioned virtual machine mark is the mark that administrative center is configured by each virtual machine, and once after the completion of configuration not It can be modified again, be mainly used for audit function.Reserved field is mainly used for extending tagged content stream;Check value is to ensure The authenticity for the IP address that data packet includes, prevents IP address to be tampered, and uses source IP address of the multicast key to data packet, mesh IP address, priority level, the mark of security domain, virtual machine mark, reserved field and data packet data segment calculated, obtain Go out the check value of stream label.
Above-mentioned stream label is mainly used for access control, ensures the authenticity of data, identity is prevented to be forged, IP address is usurped Change.In addition, stream label can be used for controlling flow, do not allow to exist in the communications and be not belonging to make an exception again without stream label The data flow of equipment, i.e., do not allow communication in there are abnormal flows.
In embodiments of the present invention, trusted terminal is according to terminal security strategy file inspection first to transmission data It is no to communicate with recipient, after verification, stream label is added for data packet, then normal transmission data.For outflow type Data packet, trusted terminal in the manner described above judges the reception terminal of the data packet, and is carried out according to judging result Safe handling, to prevent the virtual machine in trusted terminal from carrying out unauthorized access to the domain for forbidding accessing.
Step 207:Trusted terminal carries out safety verification according to source address and terminal security strategy file to data packet;
When trusted terminal judges that the data packet bit stream that networks filter driver is intercepted and captured enters type, trusted terminal is needed to sending The terminal of the data packet is judged, and carries out security control according to judging result, to prevent other terminal-pair trusted terminals Unauthorized access.
The process of above-mentioned safety verification is as follows:
Trusted terminal judges whether include stream label in the data packet head of data packet;If judging not including stream label, According to the source address of data packet, the exception list of devices that terminal security strategy file includes is checked, if checking out, exception equipment arranges Comprising the source address in table, then external equipment for transmission terminal is judged, then received data packet, if checking out exception list of devices In do not include the source address, then abandon the data packet;
If trusted terminal is judged to include stream label in the data packet head of data packet, test to the stream label, if It upchecks, then received data packet, if the test fails, packet discard.
It can carry out convection tags in the following way in embodiments of the present invention to test, specifically include:
Trusted terminal obtains the mark of security domain, priority level, virtual machine mark, reserved field and the school that stream label includes It tests value and source address, destination address and data segment is obtained from data packet;According to the mark of security domain, security domain is obtained Safe class and corresponding group is obtained from the multicast key table that terminal security strategy file includes according to the mark of security domain Broadcast key;By multicast key to the mark of security domain, virtual machine mark, reserved field, safe class, priority level, data Source address, destination address and the data segment of packet carry out Hash operation, the value of Hash operation are compared with check value, if the two It is identical, then it upchecks, if the two differs, the test fails.
Trusted terminal receives the malice that untrusted terminal administered from same gateway and unauthorized is sent in order to prevent Data, and in order to improve terminal even the sign test efficiency of whole network, for carrying the data packet of stream label, trusted terminal can be with First judge this data packet whether from same security domain according to the source address of data packet;If being not belonging to same security domain, check Security domain mutual exclusion table if the security domain is present in security domain mutual exclusion table, does not allow this data packet to flow into upper strata, if being not present In security domain mutual exclusion table, then allow flow into.If belonging to same security domain, according to above-mentioned sign test operate to the data packet into Row sign test.
In embodiments of the present invention, trusted terminal is to receive data, according to terminal security strategy file to the number of reception Sign test is carried out according to the stream label in packet, ensures the integrality of stream label.
As shown in Figure 2 B, the networks filter driver intercepted data packet of trusted terminal judges the type of data packet for inflow type Or outflow type, if outflow type, then adds stream label for data packet, if inflow type, then to the stream label that data packet includes into Row sign test.All data packets Jing Guo the trusted terminal are carried out by the operation of above-mentioned steps 205-207 safe handling and Shi Faxian and the data packet for abandoning unauthorized access, while the virtual machine in trusted terminal is avoided to visit the domain for forbidding accessing It asks, improves safety and the credibility of network communication.
It, can also as follows 208 and 209 after the communication security control that trusted terminal is carried out by aforesaid operations Operation comes to trusted terminal further security control.
Step 208:Trusted terminal record access behavioural information will access behavioural information compositing terminal security log, and every Terminal security daily record is sent to administrative center every the first preset time period;
Above-mentioned first preset time period can be one day or one week etc..Access behavioural information can include virtual machine ID or can Believe gateway ID, source IP, source port, destination IP, destination interface, security level, event and date etc..
Step 209:Administrative center receives the terminal security daily record that trusted terminal is sent, according to terminal security daily record to credible Terminal carries out security monitoring;
The terminal security daily record is sent to the terminal of audit administrator by administrative center, and the terminal of audit administrator receives simultaneously Display terminal security log so that audit administrator to carrying out security audit in terminal security daily record, check attempt to carry out it is non- The user that method accesses.
Ukey is authorized to log in trusted terminal in addition, audit administrator can also use, trusted terminal of directly auditing generation Terminal security daily record.
In embodiments of the present invention, trusted gateway can be according to gateway security strategy file, 210-212 as follows Operation come to by the trusted gateway data packet carry out safe handling.
Step 210:Trusted gateway receives the data packet that terminal is sent, and carries out safety verification to the data packet, upchecks, The data packet is then forwarded, inspection does not pass through, then abandons the data packet;
Trusted gateway receives the data packet that terminal is sent, and whether the data packet is judged comprising stream label, if judging not wrap Containing stream label, then according to the source address of data packet, check in the exception list of devices that gateway security strategy file includes whether wrap Containing the source address, if comprising judging external equipment for the terminal, then forwarding the data packet.If in the list of devices that makes an exception not Comprising the source address, then it is not exception equipment to judge the terminal, then abandons the data packet.
If trusted gateway judges that the data packet includes stream label, identifying, being excellent for the security domain that stream label includes is obtained First rank, virtual machine mark, reserved field and check value and acquisition source address, destination address and data segment from data packet; According to the mark of security domain, the safe class of security domain is obtained and according to the mark of security domain from gateway security strategy file Including security domain multicast key table in obtain corresponding multicast key;Pass through mark of the multicast key to security domain, virtual machine Mark, reserved field, safe class, priority level, the source address of data packet, destination address and data segment carry out Hash operation, The value of Hash operation with check value is compared, if the two is identical, is upchecked, if the two differs, is examined and do not lead to It crosses.
In embodiments of the present invention, it can also be divided by the data packet of trusted gateway and flow into gateway and two kinds of gateway of outflow Type.Trusted gateway can be to the process flow of the data packet of inflow:Whether trusted gateway first looks at data packet with stream Label;If not band stream label, check that exception list of devices judges whether it belongs to exception and set according to the source address of data packet It is standby;If belonging to, data packet is allowed to flow into, if being not belonging to, forbid receiving the data packet;If with stream label, to data Packet carries out sign test, and the successful data packet of sign test allows flow into trusted gateway.Trusted gateway flows out the processing of the data packet of outflow It is as follows:Trusted gateway is implemented the processing that the data packet that will be flowed out performs by the networks filter driver of trusted gateway, works as data Packet from network interface card be transferred to networks filter driver when, networks filter driver intercepts the data packet, then check data packet whether band There is stream label;If carrying, directly transferred out;If without checking whether it belongs to exception equipment;If belonging to, Then transferred out;If being not belonging to, the data packet is abandoned.
Trusted gateway can also carry out load balancing to sign test, can be dropped when trusted gateway carries out sign test to mass data packet The low execution efficiency of its own, it is therefore necessary to consider the problem of load balancing of sign test.
The sign test mode of trusted gateway can be divided into not sign test, sampling sign test and whole sign tests.Not sign test expression just looks at Whether credible label is carried in data packet, and according to the forwarding of credible label and gateway security strategy file control data packet;It can Letter gateway itself has the terminal IP tables in its institute's compass of competency, and when trusted gateway flow is larger, trusted gateway is according to the IP Table checks the IP of data packet, belongs to the data packet of this table, and gateway can be to its not sign test.Sign test of sampling can be as set by table 1 Sampling proportion or according to sampling proportion adjustment formula randomly select data packet carry out sign test;Whole sign tests represent all The data packet of trusted gateway is flowed through by sign test.
Furthermore it is possible to the ratio of adjust automatically trusted gateway sampling sign test, sampling proportion and trusted terminal or security domain Level of confidentiality requirement is adapted, and level of confidentiality is higher, and the ratio of sign test is higher.Sampling proportion and the requirement of real-time of business are inversely proportional, in real time Property requirement it is higher, the ratio of sign test is lower.Therefore, the priority in stream label can be used to ensure the real-time of some specific process Property, when network flow is larger, trusted gateway can directly forward data packet according to the priority level in stream label.Root In the sign test bivariate table set according to the security level corresponding to the security domain ID in stream label and priority level according to administrative center The ratio of examination at random carries out sign test.After networks filter driver intercepts data packet, first according to priority level in stream label and peace Full rank checks the strategy schematic diagram of sign test as shown in fig. 2 c of formulation, then implements corresponding sign test mode to data packet, tests The implementation of label is mainly the sign test bivariate table issued according to administrative center, and is carried out in a manner of counting packet number, such as Fig. 2 C Shown, when the security level of data packet is top secret and priority level is " real-time ", sign test strategy is " every 5 packet sign tests one It is secondary ", then the data packet currently intercepted is counted, then this data packet is let pass when data packet number does not reach 5, If reaching 5, sign test is carried out to current data packet.
Step 211:Trusted gateway records data packet exception information, and data packet exception information is formed gateway security daily record, And gateway security daily record is sent to administrative center every the second preset time period;
Above-mentioned second preset time period can be one day or one week etc..Data packet exception information can be trusted gateway right Data packet carries out the data packet abandoned during safety verification, and there are security risks for these data packets.
Step 212:Administrative center receives the gateway security daily record that trusted gateway is sent, according to gateway security daily record to credible Gateway carries out security monitoring.
Gateway security daily record is sent to the terminal of audit administrator by administrative center, and the terminal of audit administrator is received and shown Show the gateway security daily record, so that the data packet progress there are security risk that audit administrator includes gateway security daily record Security audit checks the user for attempting to carry out unauthorized access.
In embodiments of the present invention, the communication between equipment can there are many situation, in order to make it easy to understand, with reference to Attached drawing illustrates.Communication network schematic diagram as shown in Figure 2 D, according to fig. 2 the communication network shown in D can summarize this hair The a variety of situations to communicate in bright embodiment.Wherein, all exception equipment must all pass through trusted gateway ability and miscellaneous equipment It communicates.Signal intelligence is illustrated respectively below:
1. it is connected between communicating pair by multiple trusted gateways, and both sides are conventional trusted terminal.In Fig. 2 D Communication between shown trusted terminal C1 and trusted terminal C5;
2. there is trusted gateway connection between communicating pair, but there is external equipment for a side in both sides, as illustrated in fig. 2d Communication between trusted terminal C1 and exception equipment C6;
3. connection is connected, both sides are conventional trusted terminal, such as without trusted gateway by interchanger between communicating pair The communication between trusted terminal C1 and trusted terminal C3 shown in Fig. 2 D;
4. there is external equipment for a side in communicating pair, between trusted terminal C1 and exception equipment C2 as illustrated in fig. 2d Communication;
5. communicating pair is connected through a trusted gateway, both sides are trusted terminal, trusted terminal as illustrated in fig. 2d Communication between C1 and trusted terminal C7;
6. communicating pair all for external equipment, and connected by trusted gateway, by the data that trusted gateway sends it into Row processing, the communication between exception equipment C2 and exception equipment C6 as illustrated in fig. 2d.
Wherein, above-mentioned 1. and 2. either way to be handled by trusted gateway, trusted gateway can pass through step 210 operation to carry out security control to data packet therethrough.Above-mentioned situation 3. does not have trusted gateway to carry out data packet Control can carry out security control according to the operation of step 205-207 by the trusted terminal of transmitting terminal and receiving terminal to data packet. And since all exception equipment are required for through trusted gateway, it is communicated and is managed to it by trusted gateway.
In embodiments of the present invention, in secure communication process, the networks filter driver of sending side terminal is according in management The terminal security strategy file that the heart issues judges whether energy transmission data packet, and the loading stream label of the data packet to allowing to send out, Data packet after loading stream label is sent.When data packet flows out trusted gateway, trusted gateway is not tested data packet Whether label are just looked at stream label, if for external equipment, then carry out corresponding operating.When data packet flows into trusted gateway, Trusted gateway will carry out sign test to data packet, with the security level and priority level in the number of data packet, data packet stream label Determine the sign test mode of trusted gateway, sign test mode is broadly divided into whole sign tests, sampling sign test and non-sign test.Receive the net of terminal Network filtration drive will to the data packet of inflow carry out sign test, allow sign test by data packet inflow terminal.
Wherein, server and exchange are also had other than trusted terminal, trusted gateway and exception equipment in communication network The plurality of devices such as machine.No matter the topological structure of communication network, the data communication in network can be implemented according to the present invention The method that example provides carries out security control by trusted terminal and trusted gateway to data packet.
In method provided in an embodiment of the present invention, administrative center is trusted terminal configurating terminal Java.policy, with And gateway security strategy file is configured for trusted gateway.Trusted terminal is credible to flowing in or out according to terminal security strategy file The data packet of terminal carries out security control.Trusted gateway according to gateway security strategy file to by trusted gateway data packet into Row security control.It can so realize the secure communication between different network domains, avoid the malice between the domain of no access rights It accesses.
Embodiment 3
Referring to Fig. 3, an embodiment of the present invention provides a kind of secure communication control system, which specifically includes:In management The heart 301, trusted terminal 302 and trusted gateway 303;Lead to due to also carrying out data between trusted terminal 302 and trusted terminal 303 Believe, the communication connection in Fig. 3 with broken line representation between the two.
Administrative center 301, for sending terminal security strategy file to trusted terminal 302 and sending gateway security plan Slightly file is to trusted gateway 303;It receives the terminal security daily record of the transmission of trusted terminal 302 and receives trusted gateway 303 and send Gateway security daily record, according to terminal security daily record and gateway security daily record respectively to trusted terminal 302 and trusted gateway 303 into Row security monitoring.
Trusted terminal 302, for receiving the terminal security strategy file of the transmission of administrative center 301, terminal security strategy text Part includes label allocation list, multicast key table, access control list and security domain correlation table;Pass through networks filter driver intercepted data Packet according to the source address and destination address of data packet, judges the type of data packet, and the type of data packet includes outflow type and inflow Type;When the type for judging data packet is outflow type, data packet is carried out according to destination address and terminal security strategy file Safe handling;When the type for judging data packet is inflow type, according to source address and terminal security strategy file to data packet Carry out safety verification;
When the type of data packet is outflow type, trusted terminal 302 according to destination address, judge to receive terminal whether with can Letter terminal 302 is located in the corresponding range of same trusted gateway;If it is, transmission data packet gives reception terminal;If it is not, then According to the access control list that destination address and terminal security strategy file include, judge to receive whether terminal belongs to exception equipment; If belonging to exception equipment, reception terminal is delivered a packet to;If being not belonging to exception equipment, fail to be sold at auction for data packet generation The data packet for adding stream label by stream label addition in the packet, is sent to reception terminal by label.
Trusted terminal 302 obtains the safe class of the security domain belonging to itself;Pacified according to the port numbers of data packet from terminal The corresponding priority level of port numbers is obtained in the label allocation list that full strategy file includes;Include from terminal security strategy file The mark of security domain and the corresponding multicast key of security domain belonging to trusted terminal 302 are obtained in multicast key table;Pass through multicast The mark of key pair security domain, priority level, the source address of data packet, destination address, virtual machine mark, is reserved safe class Field and data segment carry out Hash operation, obtain check value;By mark, priority level, the virtual machine mark of security domain, write down characters in advance The stream label of section and check value composition data packet, stream label is added in the data packet head of data packet.
When the type of data packet is inflow type, trusted terminal 302 judges whether include stream in the data packet head of data packet Label;If judge not including stream label, the access control included according to the source address of data packet and terminal security strategy file Tabulation, judge to send terminal whether for external equipment, if it is, received data packet, if it is not, then packet discard;If sentence Break and comprising stream label, then convection tags are tested, if upchecking, received data packet if the test fails, abandons Data packet.
Trusted terminal 302 obtain stream label include the mark of security domain, priority level, virtual machine mark, reserved field And check value and source address, destination address and data segment are obtained from data packet;According to the mark of security domain, safety is obtained The multicast key and safe class in domain;By multicast key to the mark of security domain, virtual machine mark, reserved field, safety etc. Grade, priority level, the source address of data packet, destination address and data segment carry out Hash operation, by the value of Hash operation and verification Value is compared, if the two is identical, is upchecked, if the two differs, the test fails.
Trusted terminal 302 goes back record access behavioural information, will access behavioural information compositing terminal security log, and every the One preset time period sends terminal security daily record to administrative center 301.
Trusted gateway 303, for receiving the gateway security strategy file of the transmission of administrative center 301, gateway security strategy text Part includes exception list of devices, sign test Policy Table and security domain multicast key table;The data packet that terminal is sent is received, judges data Whether packet includes stream label;If judge not including stream label, according to the source address of data packet and gateway security strategy file Including exception list of devices, judge terminal whether for external equipment, if it is, forwarding data packet, if it is not, then abandon number According to packet;If judging, comprising stream label, to be tested according to gateway security strategy file convection tags, if upchecking, Forward data packet, if the test fails, packet discard.
Trusted gateway 303 also records data packet exception information, and data packet exception information is formed gateway security daily record, and every Gateway security daily record is sent to administrative center 301 every the second preset time period.
In system provided in an embodiment of the present invention, administrative center is trusted terminal configurating terminal Java.policy, with And gateway security strategy file is configured for trusted gateway.Trusted terminal is credible to flowing in or out according to terminal security strategy file The data packet of terminal carries out security control.Trusted gateway according to gateway security strategy file to by trusted gateway data packet into Row security control.It can so realize the secure communication between different network domains, avoid the malice between the domain of no access rights It accesses.
What the embodiment of the present invention was provided --- device can be equipment on specific hardware or be installed on soft in equipment Part or firmware etc..It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description is The specific work process of system, device and unit can refer to the corresponding process in above method embodiment.
In several embodiments provided herein, it should be understood that disclosed device and method, it can be by other Mode realize.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only one Kind of division of logic function, can there is other dividing mode in actual implementation, in another example, multiple units or component can combine or Person is desirably integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical of device or unit by some communication interfaces Letter connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That each unit is individually physically present, can also two or more units integrate in a unit.
If the function is realized in the form of SFU software functional unit and is independent product sale or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially in other words The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be People's computer, server or network equipment etc.) perform all or part of the steps of the method according to each embodiment of the present invention. And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention described should be subject to the protection scope in claims.

Claims (8)

1. a kind of secure communication control method, which is characterized in that the method includes:
Trusted terminal, according to the source address and destination address of the data packet, is judged by networks filter driver intercepted data packet The type of the data packet, the type of the data packet include outflow type and inflow type;
When the type for judging the data packet is outflow type, the trusted terminal is according to the destination address and terminal security Strategy file carries out safe handling to the data packet;
When the type for judging the data packet is inflow type, the trusted terminal is judged in the data packet head of the data packet Whether stream label is included;If judge not including stream label, according to the source address of the data packet and the terminal security plan The slightly access control list that includes of file, judge to send terminal whether for external equipment, if it is, receiving the data packet, such as Fruit is no, then abandons the data packet;If judging, comprising stream label, to test to the stream label, if upchecking, The data packet is received, if the test fails, abandons the data packet.
2. according to the method described in claim 1, it is characterized in that, the trusted terminal is pacified according to the destination address and terminal Full strategy file carries out safe handling to the data packet, including:
The trusted terminal judges to receive whether terminal with the trusted terminal is located at same trusted networks according to the destination address It closes in corresponding range;
If it is, the data packet is sent to the reception terminal;If it is not, then according to the destination address and terminal security The access control list that strategy file includes, judges whether the reception terminal belongs to exception equipment;
If belonging to exception equipment, the data packet is sent to the reception terminal;If exception equipment is not belonging to, for institute Data packet generation stream label is stated, by stream label addition in the data packet, the data of the stream label will be added Packet is sent to the reception terminal.
3. according to the method described in claim 2, it is characterized in that, described generate stream label for the data packet, by the stream Label is added in the data packet, including:
The trusted terminal obtains the safe class of the security domain belonging to itself;
According to the port numbers of the data packet end is obtained from the label allocation list that the terminal security strategy file includes The corresponding priority level of slogan;
The mark of the security domain belonging to the trusted terminal is obtained in the multicast key table included from the terminal security strategy file Knowledge and the corresponding multicast key of the security domain;
By the multicast key to the identifying of the security domain, the safe class, the priority level, the data packet Source address, destination address, virtual machine mark, reserved field and data segment carry out Hash operation, obtain check value;
By the identifying of the security domain, the priority level, the virtual machine mark, the reserved field and the check value group Into the stream label of the data packet, the stream label is added in the data packet head of the data packet.
4. according to the method described in claim 1, it is characterized in that, described test to the stream label, including:
Mark, priority level, virtual machine mark, reserved field and the check value for the security domain that the stream label includes are obtained, with And source address, destination address and data segment are obtained from the data packet;
According to the mark of the security domain, the multicast key and safe class of the security domain are obtained;
By the multicast key to the identifying of the security domain, virtual machine mark, the reserved field, the safety etc. Grade, the priority level, the source address of the data packet, destination address and data segment carry out Hash operation, by Hash operation Value is compared with the check value, if the two is identical, is upchecked, if the two differs, the test fails.
5. according to the method described in claim 1, it is characterized in that, the method further includes:
The trusted terminal receives the terminal security strategy file that administrative center sends, and the terminal security strategy file includes mark Sign allocation list, multicast key table, access control list and security domain correlation table;
The trusted terminal record access behavioural information, by the access behavioural information compositing terminal security log, and every the One preset time period sends the terminal security daily record to the administrative center.
6. a kind of secure communication control method, which is characterized in that the method includes:
Whether trusted gateway receives the data packet that terminal is sent, judge the data packet comprising stream label;
If judge not including stream label, the exception included according to the source address of the data packet and gateway security strategy file List of devices, judge the terminal whether for external equipment, if it is, forward the data packet, if it is not, then described in abandoning Data packet;
If judging comprising stream label, to check whether carry credible label in data packet, if it is, according to credible label and Gateway security strategy file controls the forwarding of data packet;If it is not, then stream label inspection is carried out by pre-set sampling proportion, Or randomly select data packet progress stream label inspection according to the adjustment formula of sampling proportion;When carrying out stream label inspection according to The gateway security strategy file tests to the stream label, if upchecking, forwards the data packet, if examining not Pass through, then abandon the data packet.
7. according to the method described in claim 6, it is characterized in that, the trusted gateway receive terminal send data packet it Before, it further includes:
The trusted gateway receives the gateway security strategy file that administrative center sends, and the gateway security strategy file includes example External equipment list, sign test Policy Table and security domain multicast key table.
8. according to the method described in claim 6, it is characterized in that, the method further includes:
The trusted gateway records data packet exception information, and the data packet exception information is formed gateway security daily record, and every The gateway security daily record is sent to administrative center every the second preset time period.
CN201510696503.1A 2015-10-22 2015-10-22 A kind of secure communication control method Expired - Fee Related CN105282157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510696503.1A CN105282157B (en) 2015-10-22 2015-10-22 A kind of secure communication control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510696503.1A CN105282157B (en) 2015-10-22 2015-10-22 A kind of secure communication control method

Publications (2)

Publication Number Publication Date
CN105282157A CN105282157A (en) 2016-01-27
CN105282157B true CN105282157B (en) 2018-07-06

Family

ID=55150483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510696503.1A Expired - Fee Related CN105282157B (en) 2015-10-22 2015-10-22 A kind of secure communication control method

Country Status (1)

Country Link
CN (1) CN105282157B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181619A (en) * 2017-06-08 2017-09-19 环球智达科技(北京)有限公司 The monitoring system of service condition
CN107040548A (en) * 2017-06-08 2017-08-11 环球智达科技(北京)有限公司 The monitoring method of terminal traffic state
CN109992974B (en) * 2017-12-29 2023-04-14 中兴通讯股份有限公司 Method and device for protecting byte code file of virtual machine and readable storage medium
CN108563492B (en) * 2018-05-07 2022-05-31 联想(北京)有限公司 Data acquisition method, virtual machine and electronic equipment
CN112015111B (en) * 2019-05-30 2022-02-11 中国科学院沈阳自动化研究所 Industrial control equipment safety protection system and method based on active immunity mechanism
CN112202857B (en) * 2020-09-21 2021-05-14 青岛国信会展酒店发展有限公司 Intelligent management system applied to exhibition center
CN113055397A (en) * 2021-03-29 2021-06-29 郑州中科集成电路与信息系统产业创新研究院 Configuration method and device of security access control policy
CN113973303B (en) * 2021-11-02 2024-04-02 上海格尔安全科技有限公司 Method for realizing mobile terminal equipment access control gateway based on data packet analysis
CN114125583B (en) * 2021-11-15 2023-08-18 浙江中控技术股份有限公司 Communication control method of distributed control network
CN114019933A (en) * 2021-11-27 2022-02-08 河南中烟工业有限责任公司 Network security control method and device of industrial control system
CN116527403B (en) * 2023-07-03 2023-09-08 国网四川省电力公司信息通信公司 Network security control method and system for local area network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111053A (en) * 2006-07-18 2008-01-23 中兴通讯股份有限公司 System and method for defending network attack in mobile network
CN101330494A (en) * 2007-06-19 2008-12-24 瑞达信息安全产业股份有限公司 Method for implementing computer terminal safety admittance based on credible authentication gateway
CN101567888A (en) * 2008-12-29 2009-10-28 郭世泽 Safety protection method of network feedback host computer
CN104038478A (en) * 2014-05-19 2014-09-10 瑞达信息安全产业股份有限公司 Embedded platform identity authentication trusted network connection method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111053A (en) * 2006-07-18 2008-01-23 中兴通讯股份有限公司 System and method for defending network attack in mobile network
CN101330494A (en) * 2007-06-19 2008-12-24 瑞达信息安全产业股份有限公司 Method for implementing computer terminal safety admittance based on credible authentication gateway
CN101567888A (en) * 2008-12-29 2009-10-28 郭世泽 Safety protection method of network feedback host computer
CN104038478A (en) * 2014-05-19 2014-09-10 瑞达信息安全产业股份有限公司 Embedded platform identity authentication trusted network connection method and system

Also Published As

Publication number Publication date
CN105282157A (en) 2016-01-27

Similar Documents

Publication Publication Date Title
CN105282157B (en) A kind of secure communication control method
US11637696B2 (en) End-to-end communication security
CN104618396B (en) A kind of trustable network access and access control method
US9043589B2 (en) System and method for safeguarding and processing confidential information
US20150244684A1 (en) Data security management system
ES2768049T3 (en) Procedures and systems to secure and protect repositories and directories
JP2020516202A (en) Core network access provider
ES2875963T3 (en) Method and system related to user authentication to access data networks
CN106034104A (en) Verification method, verification device and verification system for network application accessing
CN105162763B (en) Communication data processing method and device
Sridhar et al. A survey on cloud security issues and challenges with possible measures
CN103647772A (en) Method for carrying out trusted access controlling on network data package
US9015825B2 (en) Method and device for network communication management
CN107196932A (en) Managing and control system in a kind of document sets based on virtualization
CN106899561A (en) A kind of TNC authority control methods and system based on ACL
US9338137B1 (en) System and methods for protecting confidential data in wireless networks
Rani et al. Cyber security techniques, architectures, and design
CN110417739A (en) It is a kind of based on block chain technology safety Netowrk tape in measurement method
CN111181955B (en) Session control method, device and storage medium based on mark
US20070150947A1 (en) Method and apparatus for enhancing security on an enterprise network
KR101858207B1 (en) System for security network
Kowalski et al. Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures
CN107995222A (en) A kind of exchange method of business's ciphertext part
Kleberger et al. Securing vehicle diagnostics in repair shops
Foltz et al. Secure Endpoint Device Agent Architecture.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180706

Termination date: 20191022