CN110290128A - A kind of Network Isolation and switching control method and device based on service security label - Google Patents

A kind of Network Isolation and switching control method and device based on service security label Download PDF

Info

Publication number
CN110290128A
CN110290128A CN201910536196.9A CN201910536196A CN110290128A CN 110290128 A CN110290128 A CN 110290128A CN 201910536196 A CN201910536196 A CN 201910536196A CN 110290128 A CN110290128 A CN 110290128A
Authority
CN
China
Prior art keywords
data
service security
label
marking
transmitting terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910536196.9A
Other languages
Chinese (zh)
Other versions
CN110290128B (en
Inventor
于海波
李志谦
刘坤颖
祁峰
孙永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201910536196.9A priority Critical patent/CN110290128B/en
Publication of CN110290128A publication Critical patent/CN110290128A/en
Application granted granted Critical
Publication of CN110290128B publication Critical patent/CN110290128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention proposes a kind of Network Isolation and switching control method and device based on service security label, belong to network technique field, the service security label being had by identifying data, the service security attribute informations such as security level, the class of service for including according to label, data are controlled respectively in transmitting terminal, receiving end, to realize that fine-grained Network Isolation exchange is managed with data.

Description

A kind of Network Isolation and switching control method and device based on service security label
Technical field
The present invention relates to a kind of methods that service security attribute according to data carries out Network Isolation exchange control to data And device, belong to network technique field.
Technical background
When carrying out Network Isolation and data exchange under across a network, across security domain scene, traditional unidirectional importing, gateway etc. Security isolation mainly passes through removing agreement with Information Exchange System and carries out checking and killing virus, information filtering inspection to the data exchanged Etc. modes improve the safety exchanged between network, can not the service security attribute based on data the data that exchange network are carried out Fine granularity control, it is also difficult to which preventing malice code carries out unauthorized exchange.
Summary of the invention
It is of the invention for fine granularity isolation exchange and security management and control demand of the data resource under inter-network, cross-domain environment Purpose is to propose a kind of Network Isolation and switching control method and device based on service security label, by identifying data band Some service security label, the service security attribute information such as security level, class of service for including according to label, transmitting terminal, Receiving end respectively controls data, to realize that fine-grained Network Isolation exchange is managed with data.
To achieve the above object, the present invention using it is a kind of based on service security label Network Isolation with exchange controlling party Method, method includes the following steps:
Step1: marking of control strategy is respectively configured for transmitting terminal and receiving end, marking of control strategy is to have based on data Service security tag definitions relevant matches rule, corresponding control row is taken to the data with specific transactions safety label For;
Step2: after transmitting terminal receives data to be imported, check whether data have service security label and according to transmitting terminal The marking of control strategy of configuration carries out respective handling, comprising: if data are marked without service security and transmitting terminal configures Marking of control strategy forbid data untagged to import, then record log and do respective handling;If data are pacified without business The marking of control strategy permission data untagged importing of all mark and transmitting terminal configuration, then be the formatting number to one-way transmission One-way transmission is executed after adding specified service security label automatically according to block;If data are marked with service security, logarithm According to service security label checked, pass through if checking, the service security of data label be added to unidirectionally pass One-way transmission is executed after defeated block of formatted data, otherwise record log and does respective handling;
Step3: after receiving end receives the block of formatted data of one-way transmission, check whether the data block has service security It marks and respective handling is carried out according to the marking of control strategy of receiving end configuration, comprising: if data block is without service security Label then record log and does respective handling;If data block have safety label, to the service security of data block mark into Row checks, and passes through if checking, restores the data imported based on data block, otherwise record log and does respective handling.
Further, service security labeled as multi-component system M=<C, G, F comprising multiple business security attribute>, wherein C is Security level, G are service security attribute set, and F is operation controlled attribute set, and service security attribute set G includes business Classification, working group, role, environmental requirement, operation controlled attribute set F include Read-write Catrol, print control, imprinting control, Copy control.
Further, service security label includes that the service security of information object marks M (r)=< Cr,Gr,Fr> and system The service security of object marks M (o)=< Co,Go>, wherein information object includes data, system object include application, service, into Journey.
Further, there are two types of the relationships between M (o) and M (r): dominate with it is not comparable;Work as Co≥CrAndNote For M (o) >=M (r), then there is dominance relation between M (o) and M (r), indicates that system object can dominate information object;If M (o) Dominance relation is not present between M (r), then is therebetween not comparable relationship, indicates that system object haves no right to dominate information object.
Further, ifThen main body should be according to FrThe operation controlled attribute limitation for including carries out resource corresponding Operation.
Further, marking of control strategy is represented by R=<C, and G>, wherein R is marking of control strategy, which indicates Meet the set of the information object of specified attribute.
It further, is a transmitting terminal s configuration flag control strategy Rs=< Cs,Gs>, RsThe business of specified information object Safety label is M (s)=< Cs,Gs>, if M (s) >=M (r), indicates that transmitting terminal checks and pass through;Phase is configured for a receiving end g The marking of control strategy R answeredg=< Cg,Gg>, RgThe service security of specified information object is labeled as M (g)=< Cg,Gg>, it receives It holds the service security of the data block of identification to mark M (r '), if M (g) >=M (r '), indicates that receiving end checks and pass through.
Further, the respective handling includes alarm, abandons, forwards or audit.
To achieve the above object, the present invention also provides it is a kind of based on service security label Network Isolation with exchange control Device mainly includes transmitting terminal label control module, receiving end label control module;
Transmitting terminal label control module: for configuring transmitting terminal marking of control strategy, identification imported into the data of transmitting terminal Service security label, and checked with the marking of control strategy of transmitting terminal configuration, according to inspection result by data Service security label, which is added to after the block of formatted data of one-way transmission, executes one-way transmission, or carries out record log to data And do respective handling;
Receiving end label control module: for configuring receiving end marking of control strategy, receiving end block of formatted data is identified Service security label, and with receiving end configuration marking of control strategy checked, according to inspection result restore import Data, or data block is carried out record log and to do respective handling.
Further, in receiving end label control module, the respective handling includes alarm, discarding, forwarding or audit.
Compared with prior art, the positive effect of the present invention are as follows:
By correctly configuring the marking of control strategy for the data transmission channel being made of transmitting terminal and receiving end, can be based on The service security label of data carries out fine granularity control to the data of one-way transmission, supports the safety such as unidirectional introducing equipment, gateway Isolation carries out fine-grained data control with Information Exchange System, and further promotes internet security.For example, by configuring this Device can unidirectionally imported into internal network from internet only to allow the data of specific transactions content;It can also support high-level The data flow low level security domain of lower security grade in security domain, but still the data flow low level of high safety grade is forbidden to pacify Universe;It can be found that data untagged or abnormal marking data that malicious code is sent, prevent the unauthorized business of camouflage in time Data outflow.
Detailed description of the invention
Fig. 1 is a kind of Network Isolation and switching control method flow chart based on service security label.
Fig. 2 be it is a kind of based on service security label Network Isolation (unidirectionally led with exchange control device module relation diagram Enter).
Fig. 3 is a kind of Network Isolation and exchange control device module relation diagram (Two-way Network based on service security label Lock).
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that embodiment described herein Only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
A kind of Network Isolation and switching control method based on service security label that the present embodiment proposes, Fig. 1 is we The step of flow chart of method, this method, is described as follows.
1. configuration flag control strategy
Service security marks M for a multi-component system comprising multiple business security attribute, M=<C, G, and F>.Wherein C is peace Full rank;G is multiple service security attribute giSet, G={ g1,g2,…gn, giIt can be class of service, working group, angle The service security attribute such as color, environmental requirement;F is operation controlled attribute fjSet, F={ f1,f2,…fm, fjIt can be read-write The operation generic attributes such as control, print control, imprinting control, copy control.
Under the abstract definition, the service security of the information objects such as data (resource) is denoted as M (r)=< Cr,Gr,Fr>, M (o)=< C is denoted as using the service security of, service and the system objects (main body) such as processo,Go>.Body mark M (o) with There are two types of relationships between resource mark M (r): dominate with it is not comparable.It marks M (o) to dominate label M (r), works as Co≥CrAndIt is denoted as M (o) >=M (r), indicates that main body can dominate object (resource).If there is no dominate to close between M (o) and M (r) System, then not comparable between them, main body haves no right to dominate object (resource).IfThen main body should include according to the label Concrete operations controlled attribute fjLimitation carries out corresponding operating to resource.
Since information object (resource) and system object (main body) service security label are all made of attribution method definition, because This, mark of correlation control strategy is also defined using similar attribution method.Marking of control strategy R can be expressed as R=< C, G >, show the set for meeting the information object of specified attribute.Therefore, regular RsThe service security of specified information object marks M (s)=< C can also be denoted ass,Gs>.When carrying out strategy matching inspection, if M (s) >=M (r), the business of information object r is pacified All mark meets marking of control policing rule Rs
It can be certain transmitting terminal s configuration flag control strategy R according to above-mentioned abstract definition methods=< Cs,Gs>, it is corresponding Receiving end g configures corresponding marking of control strategy Rg=< Cg,Gg>。
2. data untagged one-way transmission controls
(step1): when the data that transmitting terminal identifies that discovery imports are marked without service security, if transmitting terminal forbids nothing Flag data imports, then record log and to data record log and to execute the respective handlings such as alarm, discarding, forwarding or audit dynamic Make;If transmitting terminal allows data untagged to import, and has preset specified service security for data untagged and marked Mx, then turn Enter (step2), otherwise record log and to data execute alarm, discarding, forwarding or audit etc. respective handlings act, process knot Beam.
(step2): transmitting terminal is that the service security specified to the block of formatted data addition of one-way transmission marks Mx, then Data block is one-way transmitted to receiving end.
(step3): receiving end checks whether data block has service security label, if marked with service security, It is transferred to (step4);If marked without service security, receiving end executes alarm, discarding, forwarding or audit etc. to data block Respective handling movement, and record log.
(step4): data block service security label M (r '), and the label control with receiving end configuration are extracted in receiving end identification Make strategy RgIt is checked, if successful match, is transferred to (step5);If matching is unsuccessful, data block is held in receiving end The respective handlings movement such as row alarm, discarding, forwarding or audit, and record log.
The matching rule are as follows: M (g) >=M (r ') if it exists, then successful match, otherwise matches unsuccessful.
(step5): restoring Data Concurrent and send to related system in receiving end.
3. tagged data one-way transmission controls
(step1): transmitting terminal identifies and extracts service security label M (r) of data, the marking of control with transmitting terminal configuration Tactful RsIt is checked, if successful match, is transferred to (step2);If matching is unsuccessful, to data execute alarm, The respective handlings movement such as discarding, forwarding or audit, and record log.
The matching rule are as follows: M (s) >=M (r) if it exists, then successful match, otherwise matches unsuccessful.
(step2): service security label M (r) of data is then added to the format data to one-way transmission by transmitting terminal In block, data block is then one-way transmitted to receiving end.
(step3): receiving end checks whether data block has service security label, if marked with service security, It is transferred to (step4);If marking without service security, it is dynamic that the respective handlings such as alarm, discarding, forwarding or audit are executed to data Make, and record log.
(step4): the service security that data block is extracted in receiving end identification marks M (r '), and the label with receiving end configuration Control strategy gjIt is matched, if successful match, is transferred to (step5), if matching is unsuccessful, announcement is executed to data block The respective handlings movement such as alert, discarding, forwarding or audit, and record log.
The matching rule are as follows: M (g) >=M (r ') if it exists, then successful match, otherwise matches unsuccessful.
(step5): restoring Data Concurrent and send to related system in receiving end.
The present embodiment also provides a kind of Network Isolation and exchange control device based on service security label, for real The existing above method, including transmitting terminal label control module, receiving end label control module.Transmitting terminal label control module is used for Transmitting terminal marking of control strategy is configured, identification imported into the service security label of the data of transmitting terminal, and configured with transmitting terminal Marking of control strategy is checked, and the service security label of data is added to the lattice to one-way transmission according to inspection result One-way transmission is executed after formula data block, or data are abandoned, audited or are forwarded.Receiving end label control module: it uses In configuration receiving end marking of control strategy, the service security label of identification receiving end block of formatted data, and configured with receiving end Marking of control strategy checked, the data imported are restored according to inspection result or data block is abandoned, audits Or forwarding.
Data exchange control may be implemented in the present apparatus: present apparatus transmitting terminal and receiving end constitute an one-way data in pairs Transmission channel can be used for unidirectional introducing equipment, realize the fine granularity control of unidirectional data transmission, as shown in Figure 2.It can also use In the security isolations such as gateway and message exchange equipment, the one-way transmission path opposite to both direction carries out fine granularity pipe respectively Control, further increases the safety of network exchange, as shown in Figure 3.
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this field Personnel can be with modification or equivalent replacement of the technical solution of the present invention are made, without departing from the spirit and scope of the present invention, this The protection scope of invention should be subject to described in claims.

Claims (10)

1. a kind of Network Isolation and switching control method based on service security label, comprising the following steps:
Marking of control strategy is respectively configured for transmitting terminal and receiving end, marking of control strategy is the service security having based on data Data with specific transactions safety label are taken corresponding controlling behavior by tag definitions relevant matches rule;
After transmitting terminal receives data to be imported, the label whether data have service security label and configure according to transmitting terminal is checked Control strategy carries out respective handling, comprising: if the marking of control that data are marked without service security and transmitting terminal configures Strategy forbids data untagged to import, then record log and does respective handling;If data without service security mark and The marking of control strategy of transmitting terminal configuration allows data untagged to import, then adds automatically for the block of formatted data to one-way transmission One-way transmission is executed after adding specified service security to mark;If data are marked with service security, the business of data is pacified All mark is checked, and is passed through if checking, the service security label of data is added to the formatting to one-way transmission One-way transmission is executed after data block, otherwise record log and does respective handling;
After receiving end receives the block of formatted data of one-way transmission, check whether the data block has service security label and basis The marking of control strategy of receiving end configuration carries out respective handling, comprising: if data block is marked without service security, records Log simultaneously does respective handling;If data block has safety label, the service security label of data block is checked, Pass through if checking, restore the data imported based on data block, otherwise record log and does respective handling.
2. the method as described in claim 1, which is characterized in that service security is labeled as including the more of multiple business security attribute Tuple M=<C, G, F>, wherein C is security level, and G is service security attribute set, and F is operation controlled attribute set, the business Security attribute set G includes class of service, working group, role, environmental requirement, and operation controlled attribute set F includes read-write control System, print control, imprinting control, copy control.
3. method according to claim 2, which is characterized in that service security label includes that the service security of information object marks M (r)=< Cr,Gr,Fr>the service security with system object marks M (o)=<Co,Go>, wherein information object includes data, system Object includes application, service, process.
4. method as claimed in claim 3, which is characterized in that there are two types of the relationships between M (o) and M (r): dominate with can not Than;Work as Co≥CrAndIt is denoted as M (o) >=M (r), then there is dominance relation between M (o) and M (r), indicates system object Information object can be dominated;If dominance relation is not present between M (o) and M (r), it is therebetween not comparable relationship, indicates system System object haves no right to dominate information object.
5. method as claimed in claim 3, which is characterized in that ifThen main body should be according to FrThe operation control for including Attribute limitation carries out corresponding operating to resource.
6. method as claimed in claim 3, which is characterized in that marking of control strategy is represented by R=<C, G>, wherein R is Marking of control strategy, the formula indicate the set for meeting the information object of specified attribute.
7. method as claimed in claim 6, which is characterized in that be a transmitting terminal s configuration flag control strategy Rs=< Cs,Gs>, RsThe service security of specified information object is labeled as M (s)=< Cs,Gs>, if M (s) >=M (r), indicate that transmitting terminal checks Pass through;Corresponding marking of control strategy R is configured for a receiving end gg=< Cg,Gg>, RgThe service security mark of specified information object It is denoted as M (g)=< Cg,Gg>, the service security of the data block of receiving end identification marks M (r '), if M (g) >=M (r '), indicates to receive End, which checks, to be passed through.
8. the method as described in claim 1, which is characterized in that the respective handling includes alarm, abandons, forwards or audit.
9. a kind of Network Isolation and exchange control device based on service security label, comprising:
Transmitting terminal label control module, for configuring transmitting terminal marking of control strategy, identification imported into the industry of the data of transmitting terminal It is engaged in safety label, and is checked with the marking of control strategy of transmitting terminal configuration, according to inspection result by the business of data Safety label, which is added to after the block of formatted data of one-way transmission, executes one-way transmission, or carries out record log to data and do Respective handling;
Receiving end label control module identifies the industry of receiving end block of formatted data for configuring receiving end marking of control strategy Business safety label, and checked with the marking of control strategy of receiving end configuration, restore the number imported according to inspection result It carries out record log according to or to data block and does respective handling.
10. device as claimed in claim 9, which is characterized in that the respective handling includes alarm, abandons, forwards or audit.
CN201910536196.9A 2019-06-20 2019-06-20 Network isolation and exchange control method and device based on service security label Active CN110290128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910536196.9A CN110290128B (en) 2019-06-20 2019-06-20 Network isolation and exchange control method and device based on service security label

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910536196.9A CN110290128B (en) 2019-06-20 2019-06-20 Network isolation and exchange control method and device based on service security label

Publications (2)

Publication Number Publication Date
CN110290128A true CN110290128A (en) 2019-09-27
CN110290128B CN110290128B (en) 2021-02-19

Family

ID=68004356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910536196.9A Active CN110290128B (en) 2019-06-20 2019-06-20 Network isolation and exchange control method and device based on service security label

Country Status (1)

Country Link
CN (1) CN110290128B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049851A (en) * 2019-12-24 2020-04-21 中国电子科技集团公司第五十四研究所 Multi-level and multi-dimensional linkage management and control system for cross-domain transmission service

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534300A (en) * 2009-04-17 2009-09-16 公安部第一研究所 System protection framework combining multi-access control mechanism and method thereof
CN101860526A (en) * 2009-12-22 2010-10-13 中国航空工业集团公司第六三一研究所 Method for controlling multilevel access to integrated avionics system
CN101876994A (en) * 2009-12-22 2010-11-03 中国科学院软件研究所 Establishing method for multi-layer optimized strategy evaluation engine and implementing method thereof
CN102486819A (en) * 2010-12-01 2012-06-06 中铁信息工程集团有限公司 Reinforcing system
CN102495989A (en) * 2011-12-21 2012-06-13 北京诺思恒信科技有限公司 Subject-label-based access control method and system
CN102904889A (en) * 2012-10-12 2013-01-30 北京可信华泰信息技术有限公司 Cross-platform-unified-management-supported mandatory access controlling system and method
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN103647772A (en) * 2013-12-12 2014-03-19 浪潮电子信息产业股份有限公司 Method for carrying out trusted access controlling on network data package
CN105245543A (en) * 2015-10-28 2016-01-13 中国人民解放军国防科学技术大学 Operating system mandatory access control method based on security marker randomization
CN107016289A (en) * 2017-02-15 2017-08-04 中国科学院信息工程研究所 The thin terminal security method for establishing model of movement and device based on Web operating systems
CN107277023A (en) * 2017-06-28 2017-10-20 中国科学院信息工程研究所 A kind of thin terminal access control method of movement based on Web, system and thin terminal
CN108270782A (en) * 2018-01-15 2018-07-10 中国科学院信息工程研究所 A kind of access control method and system based on safety label
CN109117313A (en) * 2018-08-28 2019-01-01 成都信息工程大学 A kind of band isolation calamity for mechanism of control vehicle wisdom security gateway and management-control method

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534300A (en) * 2009-04-17 2009-09-16 公安部第一研究所 System protection framework combining multi-access control mechanism and method thereof
CN101860526A (en) * 2009-12-22 2010-10-13 中国航空工业集团公司第六三一研究所 Method for controlling multilevel access to integrated avionics system
CN101876994A (en) * 2009-12-22 2010-11-03 中国科学院软件研究所 Establishing method for multi-layer optimized strategy evaluation engine and implementing method thereof
CN102486819A (en) * 2010-12-01 2012-06-06 中铁信息工程集团有限公司 Reinforcing system
CN102495989A (en) * 2011-12-21 2012-06-13 北京诺思恒信科技有限公司 Subject-label-based access control method and system
CN102904889A (en) * 2012-10-12 2013-01-30 北京可信华泰信息技术有限公司 Cross-platform-unified-management-supported mandatory access controlling system and method
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN103647772A (en) * 2013-12-12 2014-03-19 浪潮电子信息产业股份有限公司 Method for carrying out trusted access controlling on network data package
CN105245543A (en) * 2015-10-28 2016-01-13 中国人民解放军国防科学技术大学 Operating system mandatory access control method based on security marker randomization
CN107016289A (en) * 2017-02-15 2017-08-04 中国科学院信息工程研究所 The thin terminal security method for establishing model of movement and device based on Web operating systems
CN107277023A (en) * 2017-06-28 2017-10-20 中国科学院信息工程研究所 A kind of thin terminal access control method of movement based on Web, system and thin terminal
CN108270782A (en) * 2018-01-15 2018-07-10 中国科学院信息工程研究所 A kind of access control method and system based on safety label
CN109117313A (en) * 2018-08-28 2019-01-01 成都信息工程大学 A kind of band isolation calamity for mechanism of control vehicle wisdom security gateway and management-control method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049851A (en) * 2019-12-24 2020-04-21 中国电子科技集团公司第五十四研究所 Multi-level and multi-dimensional linkage management and control system for cross-domain transmission service
CN111049851B (en) * 2019-12-24 2021-10-01 中国电子科技集团公司第五十四研究所 Multi-level and multi-dimensional linkage management and control system for cross-domain transmission service

Also Published As

Publication number Publication date
CN110290128B (en) 2021-02-19

Similar Documents

Publication Publication Date Title
JP2018516419A (en) A computerized system that securely delivers and exchanges cyber threat information in a standardized format
CN108270782B (en) Access control method and system based on security label
CN101622849B (en) System and method for adding context to prevent data leakage over a computer network
CN104299286A (en) Attendance method and system for public security inspection tour
CN108111536B (en) Application-level secure cross-domain communication method and system
CN105577639A (en) Trusted device control messages
KR102414334B1 (en) Method and apparatus for detecting threats of cooperative-intelligent transport road infrastructure
CN111567012A (en) Decentralized automated phone fraud risk management
CN109583229B (en) Privacy information tracing and evidence obtaining method, device and system
CN105516091A (en) Secure flow filter and filtering method based on software defined network (SDN) controller
CN110290128A (en) A kind of Network Isolation and switching control method and device based on service security label
CN102217248B (en) Distributed packet flow checks and process
CN102984125B (en) A kind of system and method for Mobile data isolation
CN102509057B (en) Mark-based method for safely filtering unstructured data
CN111181955A (en) Session control method and device based on mark
CN105227540A (en) A kind of MTD guard system of event-triggered and method
CN114254269A (en) System and method for determining rights of biological digital assets based on block chain technology
CN108833383A (en) Linkage defense system based on deep learning and agent
Alberts et al. Introduction to the security engineering risk analysis (SERA) framework
US11831661B2 (en) Multi-tiered approach to payload detection for incoming communications
CN104112201A (en) Electronic bill data transmitting and receiving methods and apparatuses
He et al. An industrial control systems incident response decision framework
CN109063013A (en) A kind of behavior database operation blocking-up method and device
CN105376167A (en) Distributed packet stream inspection and processing
CN113807700A (en) Method and system for issuing and receiving airplane on-wing command scheduling based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant