CN106888189A - Secure border management system and its management method - Google Patents

Secure border management system and its management method Download PDF

Info

Publication number
CN106888189A
CN106888189A CN201510942581.5A CN201510942581A CN106888189A CN 106888189 A CN106888189 A CN 106888189A CN 201510942581 A CN201510942581 A CN 201510942581A CN 106888189 A CN106888189 A CN 106888189A
Authority
CN
China
Prior art keywords
submodule
information
audit
cross
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510942581.5A
Other languages
Chinese (zh)
Inventor
丁中卫
何丞栩
樊少杰
沈民
杨娜
朱星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI GOLDEN SECURITY NET TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI GOLDEN SECURITY NET TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI GOLDEN SECURITY NET TECHNOLOGY Co Ltd filed Critical SHANGHAI GOLDEN SECURITY NET TECHNOLOGY Co Ltd
Priority to CN201510942581.5A priority Critical patent/CN106888189A/en
Publication of CN106888189A publication Critical patent/CN106888189A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of secure border management system and its management method, the system includes application proxy submodule, information landing submodule, Information encapsulation submodule, cross-domain access control submodule, audit submodule, information filtering submodule, internal agreement transmission submodule, and application proxy submodule and information landing submodule are unidirectionally connected;Information lands submodule and cross-domain access control submodule, audit submodule, information filtering submodule are unidirectionally connected;Cross-domain access control submodule, audit submodule, information filtering submodule and Information encapsulation submodule are unidirectionally connected;Information encapsulation submodule and application proxy submodule are unidirectionally connected.According to the given access configuration strategy of safety management platform, the information to all cross-border access carries out effective safe access control to the present invention.Ensure that internet information is exchanged is carried out under safely controllable environment, authentication is carried out to visitor, and retain the audit information that can investigate person directly responsible.

Description

Secure border management system and its management method
Technical field
The present invention relates to a kind of management system and its management method, more particularly to a kind of secure border management system and its management method.
Background technology
At present, Mobile Market has sharp changed the general layout of IT industries, the mobile devices such as smart mobile phone, panel computer and lightweight notebook computer more and more important role of performer in our live and work, they have become the important tool that data sharing is carried out in live and work.For example, people carry out sharing for business meetings data by with mobile phone, and business meetings often relate to some trade secrets, trade secret is happened occasionally by the thing that participant's malice is divulged a secret, at present, the approach one for tracing blabber is that blabber oneself recognizes, another is exactly that other people expose, typically less when voluntarily recognizing for blabber, the in the case of of exposing for other people, easily occur slandering, and easily allow thing to disclose and cause party ugly.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of secure border management system and its management method, it is according to the given access configuration strategy of safety management platform, information to all cross-border access carries out effective safe access control, ensure that internet information is exchanged is carried out under safely controllable environment, authentication is carried out to visitor, and retains the audit information that can investigate person directly responsible.The security domain that guarantee information is protected in exchanging, not by the interference and destruction of other unauthorized access.
The present invention is to solve above-mentioned technical problem by following technical proposals:
A kind of secure border management system, it includes application proxy submodule, information landing submodule, Information encapsulation submodule, cross-domain access control submodule, audit submodule, information filtering submodule, internal agreement transmission submodule;Application proxy submodule and information landing submodule are unidirectionally connected;Information lands submodule and cross-domain access control submodule, audit submodule, information filtering submodule are unidirectionally connected;Cross-domain access control submodule, audit submodule, information filtering submodule and Information encapsulation submodule are unidirectionally connected;Information encapsulation submodule and application proxy submodule are unidirectionally connected.
Preferably, described information landing submodule is used to reduce the cross-domain network information to application layer, obtains subject and object information;The data come from application proxy submodule are received, and according to data category different disposal, if authentication information, obtains subject and object information;If the cross-domain network information, then be reduced into application layer data.
Preferably, described information encapsulation submodule is used for the application layer data that would allow through, and being configured by the inside for setting carries out protocol encapsulation.
Preferably, the cross-domain access control submodule is used to, according to Mandatory Access Control and Subjective and Objective label information, realize the forced symmetric centralization to information in protected security domain, it is ensured that the confidentiality and integrity of information system is not damaged;Secure identity authentication scheme based on Security Strategies, can be bound identity and authorization privilege by authentication mechanism.
Preferably, the Mandatory Access Control mainly completes following functions:The access of cross-border main object file is controlled, the confidentiality and integrality of information system are not damaged in protected field, the access operation of wherein main object file includes:The download of file, the upload of file, the establishment of file, the deletion of file, the renaming of file.
Preferably, the audit submodule is used for the audit carried out to all operations by border, and submits audit information to audit server;According to audit strategy, the dependent event to occurring in system carries out a series of audit action, for auditor provides information specific enough, to the problem of the generation of discrimination system;The audit-trail record of cross-border access is created and safeguarded, and unauthorized user can be prevented to access or destroy it;The all dependent events for occurring are recorded, is examined for auditor.
Preferably, described information filter submodule is used to carry out a series of safety filtering to information according to Security Strategies;According to the strategy of configured in advance, a series of filtering is carried out to stripped data message.
Preferably, the data transfer that the internal agreement transmission submodule is used between three machine inside;Internal agreement transmission submodule is transmitted using special non-network card chip, and the intercommunication inside three machines is realized to other modules, and simple read-write interface is provided to top;Reading and writing, three kinds of interfaces of control that it provides internal transmission agreement.
The present invention also provides a kind of management method of secure border management system, and the data flow when information request of the secure border management system and its management method goes out border is comprised the following steps that:
Step one:Application proxy submodule receive information is connected, and is given information to land submodule information data and is processed;
Step 2:Information landing submodule analyzes the relevant informations such as corresponding identity, main body, object, sends internal agreement transmission submodule to;
Step 3:The internal agreement transmission submodule application data of home agent carries out a series for the treatment of, ferry-boat to arbitration machine;
Step 4:Identity identification function in cross-domain access control submodule discriminates one's identification the legitimacy of information, judges the legitimacy of connection, and this judged result information is used to control the break-make of application proxy submodule;After identity differentiates, forced symmetric centralization function in cross-domain access control submodule conducts interviews effect to corresponding request body and object information, if operation is legal, allows operation, otherwise interrupt operation;
Step 5:The result of cross-domain access control passes home agent control back, takes corresponding operational control application proxy submodule;
Step 6:Application data information after securing permission is transferred to information filtering submodule, and information filtering submodule carries out safety filtering according to filtering policy, application data;
Step 7:Ferried to external agent by arbitration machine internal agreement transmission submodule again by the application data for filtering;
Step 8:Application data is strategically configured and carries out data encapsulation by external agent;
Step 9:Packaged information is sent by application proxy submodule;
Step 10:Audit submodule needs to record a series of relevant informations that all submodules occur;
Step 11:All audit informations are transmitted to arbitration machine by internal agreement transmission submodule, and arbitration machine is processed and deposited according to corresponding strategy;
Step 12:Safety management acquisition of information:After access that security management center is credible, related strategy is sent to internal agreement transmission submodule, is respectively sent to need each submodule of this type of information by the submodule;
Step 13:Audit information sends:By special transmission channel, log information is sent to auditing system.
The beneficial effects of the present invention are:, according to the given access configuration strategy of safety management platform, the information to all cross-border access carries out effective safe access control for secure border management system of the present invention and its management method.Ensure that internet information is exchanged is carried out under safely controllable environment, authentication is carried out to visitor, and retain the audit information that can investigate person directly responsible.The security domain that guarantee information is protected in exchanging, not by the interference and destruction of other unauthorized access.
Brief description of the drawings
Fig. 1 is the subsystem module composition figure of secure border management system of the present invention.
Fig. 2 is the subsystem schematic flow sheet of secure border management system of the present invention.
Fig. 3 is the programmed logic figure of cross-domain access control submodule in the present invention.
Fig. 4 is the logic chart of application proxy submodule in the present invention.
Fig. 5 is the logic chart of audit submodule in the present invention.
Fig. 6 is the logic chart of information landing submodule in the present invention.
Fig. 7 is the logic chart of Information encapsulation submodule in the present invention.
Fig. 8 is the logic chart of information filtering submodule in the present invention.
Fig. 9 is the programmed logic figure of internal agreement transmission submodule in the present invention.
Specific embodiment
Present pre-ferred embodiments are given below in conjunction with the accompanying drawings, to describe technical scheme in detail.
As shown in Figures 1 to 9, secure border management system of the present invention includes application proxy submodule, information landing submodule, Information encapsulation submodule, cross-domain access control submodule, audit submodule, information filtering submodule, internal agreement transmission submodule.Application proxy submodule and information landing submodule are unidirectionally connected;Information lands submodule and cross-domain access control submodule, audit submodule, information filtering submodule are unidirectionally connected;Cross-domain access control submodule, audit submodule, information filtering submodule and Information encapsulation submodule are unidirectionally connected;Information encapsulation submodule and application proxy submodule are unidirectionally connected.Application proxy submodule opens the service of monitoring according to the configuration of security management center, receive or send the cross-domain network information, and need according to identity identification module and the control information of forced symmetric centralization module, to judge the legitimacy of connection user, the access of validated user is received, refuses the connection of disabled user.Information landing submodule is used to reduce the cross-domain network information to application layer, obtains subject and object information;It receives the data come from application proxy module, and according to data category different disposal, if authentication information, subject and object information is obtained, if the cross-domain network information, is reduced into application layer data.Information encapsulation submodule is used for the application layer data that would allow through, and being configured by the inside for setting carries out protocol encapsulation.Cross-domain access control submodule is used for(Forced symmetric centralization function)According to Mandatory Access Control and Subjective and Objective label information, the forced symmetric centralization to information in protected security domain is realized, it is ensured that the confidentiality and integrity of information system is not damaged.(Identity identification function)Secure identity authentication scheme based on Security Strategies, can be bound identity and authorization privilege by authentication mechanism;Forced symmetric centralization module mainly completes following functions:The access of cross-border main object file is controlled, the confidentiality and integrality of information system are not damaged in protected field.Access operation of the theme to object file includes:The download of file, the upload of file, the establishment of file, the deletion of file, the renaming of file.Audit submodule is used for the audit carried out to all operations by border, and submits audit information to audit server;According to audit strategy, the dependent event to occurring in system carries out a series of audit action.Its information specific enough for auditor provides, to the problem of the generation of discrimination system;The audit-trail record that it can create and safeguard cross-border access, and unauthorized user can be prevented to access it or destroy, it is necessary to record all dependent events of generation, examined for auditor.Information filtering submodule is used to carry out a series of safety filtering to information according to Security Strategies;According to the strategy of configured in advance, a series of filtering is carried out to stripped data message.The data transfer that internal agreement transmission submodule is used between three machine inside;It uses special non-network card chip to be transmitted, and the intercommunication inside three machines is realized to other modules, and simple read-write interface is provided to top.
Further embodiment of this invention comprises the following steps there is provided a kind of management method of secure border management system:
Step one:Application proxy submodule receive information connection first, then gives information to land submodule information data and processes.
Step 2:Information landing submodule analyzes the relevant informations such as corresponding identity, main body, object, sends internal agreement transmission submodule to.
Step 3:The internal agreement transmission submodule application data of home agent carries out a series for the treatment of, ferry-boat to arbitration machine.
Step 4:Identity identification function in cross-domain access control submodule discriminates one's identification the legitimacy of information, judges the legitimacy of connection, and this judged result information is used to control the break-make of application proxy submodule;After identity differentiates, forced symmetric centralization function in cross-domain access control submodule conducts interviews effect to corresponding request body and object information, if operation is legal, allows operation, otherwise interrupt operation.
Step 5:The result of cross-domain access control passes home agent control back, takes corresponding operational control application proxy submodule.
Step 6:Application data information after securing permission is transferred to information filtering submodule, and information filtering submodule carries out safety filtering according to filtering policy, application data.
Step 7:Ferried to external agent by arbitration machine internal agreement transmission submodule again by the application data for filtering.
Step 8:Application data is strategically configured and carries out data encapsulation by external agent.
Step 9:Packaged information is sent by application proxy submodule again.
Step 10:Audit submodule needs to record a series of relevant informations that all submodules occur.
Step 11:All audit informations are transmitted to arbitration machine by internal agreement transmission submodule.Arbitration machine is processed and deposited according to corresponding strategy.
Step 12:Safety management acquisition of information:After access that security management center is credible, related strategy is sent to internal agreement transmission submodule, is respectively sent to need each submodule of this type of information by the submodule.
Step 13:Audit information sends:By special transmission channel, log information is sent to auditing system.
, according to the given access configuration strategy of safety management platform, the information to all cross-border access carries out effective safe access control for secure border management system of the present invention and its management method.Ensure that internet information is exchanged is carried out under safely controllable environment, authentication is carried out to visitor, and retain the audit information that can investigate person directly responsible.The security domain that guarantee information is protected in exchanging, not by the interference and destruction of other unauthorized access.
Particular embodiments described above; technical problem, technical scheme and beneficial effect to solution of the invention are further described; should be understood that; the foregoing is only specific embodiment of the invention; it is not intended to limit the invention; all any modification, equivalent substitution and improvements within the spirit and principles in the present invention, done etc., should be included within the scope of the present invention.

Claims (9)

1. a kind of secure border management system, it is characterised in that it includes application proxy submodule, information landing submodule, Information encapsulation submodule, cross-domain access control submodule, audit submodule, information filtering submodule, internal agreement transmission submodule;Application proxy submodule and information landing submodule are unidirectionally connected;Information lands submodule and cross-domain access control submodule, audit submodule, information filtering submodule are unidirectionally connected;Cross-domain access control submodule, audit submodule, information filtering submodule and Information encapsulation submodule are unidirectionally connected;Information encapsulation submodule and application proxy submodule are unidirectionally connected.
2. secure border management system as claimed in claim 1, it is characterised in that described information landing submodule is used to reduce the cross-domain network information to application layer, obtains subject and object information;The data come from application proxy submodule are received, and according to data category different disposal, if authentication information, obtains subject and object information;If the cross-domain network information, then be reduced into application layer data.
3. secure border management system as claimed in claim 1, it is characterised in that described information encapsulation submodule is used for the application layer data that would allow through, and being configured by the inside for setting carries out protocol encapsulation.
4. secure border management system as claimed in claim 1; it is characterized in that; the cross-domain access control submodule is used for according to Mandatory Access Control and Subjective and Objective label information; realize the forced symmetric centralization to information in protected security domain, it is ensured that the confidentiality and integrity of information system is not damaged;Secure identity authentication scheme based on Security Strategies, can be bound identity and authorization privilege by authentication mechanism.
5. secure border management system according to claim 4, it is characterised in that the Mandatory Access Control mainly completes following functions:The access of cross-border main object file is controlled, the confidentiality and integrality of information system are not damaged in protected field, the access operation of wherein main object file includes:The download of file, the upload of file, the establishment of file, the deletion of file, the renaming of file.
6. secure border management system as claimed in claim 1, it is characterised in that the audit submodule is used for the audit carried out to all operations by border, and submits audit information to audit server;According to audit strategy, the dependent event to occurring in system carries out a series of audit action, for auditor provides information specific enough, to the problem of the generation of discrimination system;The audit-trail record of cross-border access is created and safeguarded, and unauthorized user can be prevented to access or destroy it;The all dependent events for occurring are recorded, is examined for auditor.
7. secure border management system as claimed in claim 1, it is characterised in that described information filter submodule is used to carry out a series of safety filtering to information according to Security Strategies;According to the strategy of configured in advance, a series of filtering is carried out to stripped data message.
8. secure border management system as claimed in claim 1, it is characterised in that the data transfer that the internal agreement transmission submodule is used between three machine inside;Internal agreement transmission submodule is transmitted using special non-network card chip, and the intercommunication inside three machines is realized to other modules, and simple read-write interface is provided to top;Reading and writing, three kinds of interfaces of control that it provides internal transmission agreement.
9. a kind of management method of secure border management system, it is characterised in that the data flow when information request of the secure border management system and its management method goes out border is comprised the following steps that:
Step one:Application proxy submodule receive information is connected, and is given information to land submodule information data and is processed;
Step 2:Information landing submodule analyzes the relevant informations such as corresponding identity, main body, object, sends internal agreement transmission submodule to;
Step 3:The internal agreement transmission submodule application data of home agent carries out a series for the treatment of, ferry-boat to arbitration machine;
Step 4:Identity identification function in cross-domain access control submodule discriminates one's identification the legitimacy of information, judges the legitimacy of connection, and this judged result information is used to control the break-make of application proxy submodule;After identity differentiates, forced symmetric centralization function in cross-domain access control submodule conducts interviews effect to corresponding request body and object information, if operation is legal, allows operation, otherwise interrupt operation;
Step 5:The result of cross-domain access control passes home agent control back, takes corresponding operational control application proxy submodule;
Step 6:Application data information after securing permission is transferred to information filtering submodule, and information filtering submodule carries out safety filtering according to filtering policy, application data;
Step 7:Ferried to external agent by arbitration machine internal agreement transmission submodule again by the application data for filtering;
Step 8:Application data is strategically configured and carries out data encapsulation by external agent;
Step 9:Packaged information is sent by application proxy submodule;
Step 10:Audit submodule needs to record a series of relevant informations that all submodules occur;
Step 11:All audit informations are transmitted to arbitration machine by internal agreement transmission submodule, and arbitration machine is processed and deposited according to corresponding strategy;
Step 12:Safety management acquisition of information:After access that security management center is credible, related strategy is sent to internal agreement transmission submodule, is respectively sent to need each submodule of this type of information by the submodule;
Step 13:Audit information sends:By special transmission channel, log information is sent to auditing system.
CN201510942581.5A 2015-12-16 2015-12-16 Secure border management system and its management method Pending CN106888189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510942581.5A CN106888189A (en) 2015-12-16 2015-12-16 Secure border management system and its management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510942581.5A CN106888189A (en) 2015-12-16 2015-12-16 Secure border management system and its management method

Publications (1)

Publication Number Publication Date
CN106888189A true CN106888189A (en) 2017-06-23

Family

ID=59174089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510942581.5A Pending CN106888189A (en) 2015-12-16 2015-12-16 Secure border management system and its management method

Country Status (1)

Country Link
CN (1) CN106888189A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173830A (en) * 2017-12-22 2018-06-15 北京明朝万达科技股份有限公司 A kind of data safety between net is shared and management method and system
CN108600178A (en) * 2018-03-28 2018-09-28 深圳市银之杰科技股份有限公司 A kind of method for protecting and system, reference platform of collage-credit data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272281A (en) * 2008-04-22 2008-09-24 北京邮电大学 System and method for providing network service relating to four parties
CN102299926A (en) * 2011-08-29 2011-12-28 浙江中烟工业有限责任公司 Data exchange prepositioning subsystem of multistage safe interconnection platform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272281A (en) * 2008-04-22 2008-09-24 北京邮电大学 System and method for providing network service relating to four parties
CN102299926A (en) * 2011-08-29 2011-12-28 浙江中烟工业有限责任公司 Data exchange prepositioning subsystem of multistage safe interconnection platform

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
范红: "信息系统整体保护安全设计技术实现", 《警察技术》 *
蔡智勇: "高安全等级网络中信息隐蔽分析和实用抵抗模型", 《中国博士学位论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173830A (en) * 2017-12-22 2018-06-15 北京明朝万达科技股份有限公司 A kind of data safety between net is shared and management method and system
CN108600178A (en) * 2018-03-28 2018-09-28 深圳市银之杰科技股份有限公司 A kind of method for protecting and system, reference platform of collage-credit data

Similar Documents

Publication Publication Date Title
Nieto et al. Digital witness: Safeguarding digital evidence by using secure architectures in personal devices
CN104113595B (en) A kind of mixing cloud storage system and method based on safety status classification
King et al. What do They Really Know about Me in the Cloud: A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data
CN101488952A (en) Mobile storage apparatus, data secured transmission method and system
CN101986599B (en) Network security control method based on cloud service and cloud security gateway
CN100399739C (en) Method and system for realizing trust identification based on negotiation communication
CN103618693B (en) A cloud manufacturing user data management and control method based on labels
RU2573211C2 (en) Execution method and universal electronic card and smart card system
CN103942478A (en) Method and device for identity verification and authority management
CN109741800A (en) The method for security protection of medical data intranet and extranet interaction based on block chain technology
CN103812649A (en) Method and system for safety access control of machine-card interface, and handset terminal
CN103905402B (en) A kind of secret and safe management method based on safety label
KR101318170B1 (en) data sharing system using a tablets apparatus and controlling method therefor
CN104219077A (en) Information management system for middle and small-sized enterprises
CN104239812A (en) Local area network data safety protection method and system
CA2702220C (en) Method of establishing protected electronic communication between various electronic devices, especially between electronic devices of electronic service providers and electronic devices of users of electronic service
Shehu et al. On the interoperability of european national identity cards
CN102790770A (en) Electronic document concentrated preservation and takeout safety management system and method
CN104506480A (en) Cross-domain access control method and system based on marking and auditing combination
KR20110126953A (en) Apparatus for safely distributing an internal document and methods thereof
CN106888189A (en) Secure border management system and its management method
Otterbein et al. The German eID as an authentication token on android devices
CN203164961U (en) Safe portable storage device
KR101349762B1 (en) Method for protecting and menaging a personal information
DE102009027268B3 (en) Method for generating an identifier

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170623