CN1152331C - System for ensuring computer network information safety and corresponding method thereof - Google Patents
System for ensuring computer network information safety and corresponding method thereof Download PDFInfo
- Publication number
- CN1152331C CN1152331C CNB991079205A CN99107920A CN1152331C CN 1152331 C CN1152331 C CN 1152331C CN B991079205 A CNB991079205 A CN B991079205A CN 99107920 A CN99107920 A CN 99107920A CN 1152331 C CN1152331 C CN 1152331C
- Authority
- CN
- China
- Prior art keywords
- network
- user
- computer
- hub
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000004044 response Effects 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 claims 2
- 230000002146 bilateral effect Effects 0.000 claims 1
- 239000004615 ingredient Substances 0.000 claims 1
- 230000008859 change Effects 0.000 description 8
- 238000004364 calculation method Methods 0.000 description 7
- 238000002955 isolation Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000026676 system process Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
- H04L12/5691—Access to open networks; Ingress point selection, e.g. ISP selection
- H04L12/5692—Selection among different networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a system and method for guaranteeing the information security of computer network, users presume the serial number of the computer network to be connected on the network selector; the network selector checks the inserted user identity card, acquires parameters such as user identity, network security level use authority, network number and the like, and sends the parameters to the security hub through T1 and T2 of RJ45 Plus as a request for the security hub; if the network selector does not find the user identity card, the network number is automatically set to 0, and the user only accesses the Internet; after receiving the request through T1 and T2 of RJ4 Plus, the security hub checks whether the user is legal and has the right to access the network that the user wants to access, and after confirming, the security hub connects the computer network to be accessed for the user.
Description
The present invention relates to the information security of computer network, on Ethernet, add network selector and safe hub specifically and just can use a computer access to a plurality of different security levels and mutual computer network of isolating physically.
The internet is computer local network is linked together and to move the computer network of IP agreement.For guaranteeing the information security of computer network, usual way is to add fire wall or acting server between LAN and internet, controls from the internet the visit of LAN by software approach.But this does not make that the computing machine that is connected into the internet exempts from the attack from interconnection network.Therefore those information valuable, that maintain secrecy can not get safety assurance.
In order to ensure information security, the method that adopts physical network to separate usually guarantees that just the internet is not connected on physical circuit with internal computer network valuable, that maintain secrecy now.The cable wiring manufacture of two networks will be carried out in office inside like this, will put two computing machines on the desk, not only increase the cost of office information system, make troubles also for the use of infosystem.Increase the computer network of several different security levels if desired again, just need increase some computing machines again in office, effect can be not desirable yet.
Purpose of the present invention aims to provide a kind of method of information security of computer network and based on the network system of the realization information security of computer network of this scheme, contradiction with between the availability of the Information Security that solves computer network and computer network overcomes the unsafe shortcoming of present computer network information.
A scheme of the present invention has provided a kind of computer network system that guarantees information security of computer network, comprise: router, computing machine, LAN (Local Area Network), and level of confidentiality is different and computer network that isolate physically each other, it is characterized in that it also comprises:
Network selector links to each other with described computing machine, is used to receive customer parameter, receives the request of the computer network of connecting certain level of confidentiality, and the hard disk of described computing machine is controlled;
Safe hub, be connected between the hub of described network selector and described LAN (Local Area Network), be used for the request of response to network selector switch, according to customer parameter and request from network selector, legitimacy to computed user is judged, and according to judged result, agreement or refusing user's are visited the request of the computer network of certain level of confidentiality.
Alternative plan of the present invention provides a kind of method that is used to guarantee information security of computer network, may further comprise the steps;
(1) receives customer parameter, and propose the request of the computer network of certain level of confidentiality of connection;
(2) request of the computer network of described certain level of confidentiality of connection of response is judged user's legitimacy according to described customer parameter;
(3) according to judged result, agreement or refusing user's are visited the request of the computer network of certain level of confidentiality.
The present invention realizes that the method for information security of computer network is transformed the transmission end of existing tree type computer network, need not to change the wiring system of existing network, the physics change of whole computer network is less, and cost is low, time is short, easily success.
To build safe Computer information network in the past and must just will build two parallel fully computer network systems to internal computer network and internet physical isolation.The present invention realizes that the method for information security of computer network only needs a cover Ethernet, has reduced the complexity and the construction cost of network.
The user can have access to a plurality of computer networks on a computing machine, convenient and swift, helps increasing work efficiency.Because diskless computer is simple relatively, the user to the maintenance of computer system save time, laborsaving.
Because the present invention realizes the technical scheme of information security of computer network and implementation method and allows the classification number of level of confidentiality arbitrarily to increase and decrease, therefore it is little that it is not only applicable to size of the organization, security requirements is not high, only need two physically-isolated computer networks with regard to mechanism much of that, also be applicable to trans-regional, transnational, headcount is many, operation flow is complicated, the security sensitive of computer network information is strong, level of confidentiality is got thin mechanism, especially government bodies, transregional company etc.
Computing machine is in the network calculations stage at present through the development course of centralized calculation, Distribution calculation and network calculations.Centralized calculation is exactly that the user is by the information on the terminal use mainframe computer; Distribution calculation is exactly large, medium and small computing machine preservation data separately, and each calculates each computing machine separately, networking share information, the status of the main frame that weakened; Network calculations is exactly that uniform data is stored on the mainframe computer, but data processing can be carried out i.e. DATA DISTRIBUTION calculating, information centralized management on the network computer of networking.The present invention realizes the method for information security of computer network and meets this trend just based on the network system of the realization information security of computer network of the method, helps the user's computer network and use for a long time.
Fig. 1 is the configuration figure according to network selector of the present invention;
Fig. 2 is the configuration figure according to safe hub of the present invention;
Fig. 3 is the configuration figure according to RJ45 Plus plug of the present invention;
Fig. 4 is traditional physically-isolated computer network synoptic diagram;
Fig. 5 is the computer network pie graph according to a plurality of levels of confidentiality of first embodiment of the invention;
Fig. 6 is classical fail-safe computer network pie graph;
Fig. 7 is to the improved fail-safe computer network of Fig. 6 pie graph according to the present invention;
Fig. 8 is the network system process flow diagram according to assurance information security of computer network of the present invention;
Fig. 9 is according to the software flow pattern in the network selector in the system of the present invention;
Figure 10 is according to the software flow pattern in the safe hub in the system of the present invention.
Describe the present invention below in conjunction with accompanying drawing.
To prolong with traditional tree type wiring system with the designed computer local network of technical scheme of the present invention, computing machine is on the leaf position, its network interface standard is RJ45,4 pairs of twisted-pair feeders of drawing thus insert the other network selector (Fig. 1) of computing machine, 4 pairs of twisted-pair feeders that this network selector is drawn by the RJ45 interface again insert far-ends more near the safe hub (Fig. 2) of tree root, opposite side at the safety hub has eight RJ45 interfaces, is respectively to insert internet (Internet), domestic network, outreach network (Extranet), Intranet (Intranet), internal network (Innernet), secret network, secret network and top-secret network.These eight computer networks have all been installed and have been the file server of diskless computer work, there are the start-up routine of each diskless computer and each user's system data and operational data in the file server, also are separately installed with name server, www server, ftp server etc. on these eight computer networks in addition.
So-called diskless computer is meant the system disk that this computing machine itself had not both had guiding device to start, and does not also have the hard disk of store data, but internal memory and central processing unit (CPU) are arranged, and also has motherboard, mainframe box, display, keyboard etc. in addition.The boot that diskless computer can only read relevant this computing machine in the file server by Ethernet with aforesaid internetwork connection mode is to local internal memory, and then from local internal memory with this program start relevant devices.After starting successfully, diskless computer will read operational data from file server and process to local internal memory, and then store on the webserver.
With internet (Internet), domestic network, outreach network (Extranet), Intranet (Intranet), internal network (Innernet), secret network, secret network and top-secret network in advance number consecutively be 0~7, network selector is learnt the network that the user will connect according to the numbering that the user is provided with.Network selector contains card reader, and therefore, network selector has the function that reads the information on the user's ID card that inserts in the card reader, and when not inserting user's ID card, network selector is made as 0 automatically, shows that Any user all can the access internet network.Every computing machine all will be furnished with a network selector.
Safe hub inserts computer network by its network selector appointment to a plurality of computing machines respectively, and safe hub guarantees that these eight computer networks are to isolate mutually.Safe hub also contains card reader, has only the system manager just can hold the control card of safe hub, has only system manager's maintenance safe hub of just having the right.The system manager is provided with each user's information such as level of confidentiality authority on the safety hub, and generates user's ID card for each user.
The special case of safe hub is a layer connection hub, and the interface of the network side of layer connection hub has only one, and that the interface of its computer-side has is a plurality of, is not with IC-card, and the effect of layer connection hub is the access number that extends one's service.
Because two pairs of twisted-pair feeders that RJ45 has defined are used for the variety of protocol of Ethernet and the transmission of network data, so the present invention uses a pair of twisted-pair feeder (Fig. 3) of other two centerings to transmit user identity and uses the information such as authority of network level of confidentiality.T1, T2 represent among the RJ45 a pair of arbitrarily in undefined two pairs of twisted-pair feeders to be marked on the 4th core and the 5th core just schematically among Fig. 3.Like this, the definition of each core is respectively:
The 1--data send "+"
The 2--data send "-"
3--Data Receiving "+"
4--level of confidentiality, proof of identification etc. send "+"
5--level of confidentiality, proof of identification etc. send "-"
6--Data Receiving "-"
7--wouldn't use
8--wouldn't use
The present invention calls RJ45 Plus to the RJ45 of definition like this.Therefore, the computer-side interface of network selector is RJ45, and the network side interface of network selector is RJ45 Plus, and the computer-side of safe hub is RJ45 Plus, the network side interface of safe hub is RJ45, and two side interfaces of layer connection hub all are RJ45 Plus.
Traditional computer network physical isolation method (see figure 4), making on the desk must not two computing machine of dead beat, and one is inserted the internet, and another inserts internal network.Though high safety is wanted two cover computer networks, the cost height, it is too big to take working top, uses inconvenient.
Fig. 4 is transformed later network (see figure 7), because the acting in conjunction of safe hub and network selector makes the user can select on one's own initiative computing machine is connected into any one computer network.Because safe hub is with two computer network physical isolation, so Fig. 5 is the safing characteristic of physical isolation of network loss neither, has reduced cost again, has saved the space.
Classical fail-safe computer network almost can't be maintained secrecy.At present protect networks measure great majority are still adopted the technology mode (see figure 6) of firewall/proxy server, but network hacker can pass firewall/proxy server with multiple means such as personation validated users, enters user's internal computer network.And the present invention is the physical network isolation, does not come so the hacker advances.
Fig. 5 is the information security of computer network system pie graph according to a plurality of levels of confidentiality of the present invention, referring to Fig. 5
In figure five, computer local network prolongs with tree type wiring system, being in leaf locational is computing machine, its network interface standard is RJ45,4 pairs of twisted-pair feeders of drawing thus insert the other network selector 5,6 of computing machine, and network selector 5,6 is again by RJ45 Plus Access Layer connection hub 2,3,4, and this layer connection hub inserts another layer connection hub by RJ45 Plus interface again, like this through the several times relay, at last by RJ45 Plus interface access security hub 1.In other words, be exactly between network selector 5,6 and safe hub 1, to insert multilayer layer connection hub, form the tower shape, can certainly not use by a layer connection hub.Opposite side at safety hub 1 has eight RJ45 interfaces, inserts internet (Internet), domestic network respectively, outreaches network (Extranet), Intranet (Internet), internal network (Internet), secret network, secret network and top-secret network.These eight networks have all been installed and have been the file server of diskless computer work, there are the start-up routine of each diskless computer and each user's system data and operational data in the file server, on each network name server, www server, ftp server etc. are installed also in addition.
With internet (Internet), domestic network, outreach network (Extranet), Intranet (Intranet), internal network (Internet), secret network, secret network and top-secret network in advance number consecutively be 0~7, network selector 5,6 is learnt the network that the user will visit according to the numbering that the user is provided with.The hereinafter alleged computer network that level of confidentiality arranged is meant and is numbered 1~7 network.Network selector 5,6 contains card reader, and when not inserting user's ID card, network selector 5,6 is made as 0 automatically, shows that Any user can the access internet network.Every computing machine all will be furnished with a network selector.
In Fig. 5, from 8 permission accesses of computing machine internet of this machine hard disk startup.If the user will have access to the computer network of level of confidentiality, it has the file server of the computer network of level of confidentiality to start from this to network selector by force so, and between access periods, hard disk will be stopped power supply.This moment it with system in the annexation of other parts and the course of work and diskless computer 7 identical, no longer repeat at this.
Fig. 7 is the information safety computer network figure according to second embodiment of the present invention, referring to Fig. 7.
System flow: after device power-on, if user's setting network selector switch is a non-zero, then diskless computer starts on the file server of LAN (Local Area Network) internally, otherwise, be connected startup with the file server of external lan.
Network selector can also place computer-internal, integrate with CD drive or floppy disk, its network number demonstration, network number selector button, network number ACK button also can be incorporated on the panel of CD drive or floppy disk, and draw two information lines to the T1 of the RJ45 interface of Ethernet card with T2 goes up or on the T1 and T2 of the RJ45 interface on the mainboard, like this, the user just can be with direct Access Layer connection hub of computing machine or safe hub.The benefit of this design is to save the energy, and the aspect is used, and reduces and takes up an area of the space.
Each LAN can insert eight domestic networks in the computer network, and domestic network is connected to each other by WAN communication network, has just constituted national information borderland.Domestic network is the domestic public's a network, and the talent who only has Chinese nationality has the right to use this network.
The present invention realizes that the method for information security of computer network and process are: after computing machine, network selector and safe hub powered up respectively, the user set the numbering of the computer network that will connect on network selector; The user's ID card that the network selector inspection is inserted is known parameters such as user identity, network level of confidentiality rights of using and network numbering, and these parameters is sent to safe hub by T1, the T2 of RJ45 Plus in the lump as the request to the safety hub; If network selector is not found user's ID card, then network numbering is made as 0 automatically, mean this user access internet; After T1, the T2 of safe hub by RJ45 Plus receives request, check whether the user is validated user, whether have the right to visit it and want the computer network of visiting, after confirming, connect the computer network that to visit for the user; After file server is confirmed user's request, send the boot of diskless computer, diskless computer starts in view of the above, after the user keys in the user name and password, enters normal operating conditions.
Fig. 8 is the network system process flow diagram according to assurance information security of computer network of the present invention, below this flow process is described further.
Steps A 1 is obtained user identity, key, the authority of user capture computer network level of confidentiality, the current network number that will visit of user, whether require from the network startup local computer, whether parameters such as data disks are arranged, enter steps A 2 then, if it is diskless computer that A2 judges, then enter A3, otherwise be exactly the dish computing machine, enter B1, might as well ask the internet if at this moment the dish computing machine is arranged, then (B2) network selector makes hard disc of computer must not work during the visit, mean that this has the dish computing machine also will equally start and move with diskless computer, change A3 over to, if steps A 3 judges that the user is illegal, then (C1) alarm stops user's use, and reminding user to replace parameter, in case the user has changed parameter (C2) and just turned back to A1,, then connect circuit and normal operation (A4) for the user if steps A 3 judges that the user is legal, change (A5) until customer parameter, return steps A 1.
The function of Fig. 8 is to be cooperatively interacted by the software in network selector 5,6 and the safe hub 1 to realize.The major function of network selector is exactly the related parameter that has that the user is provided for the safety hub, and prepares to stop disabled user's network that uses a computer at any time.The major function of safe hub is to judge user's legitimacy, for validated user is connected computer network.Be further described below in conjunction with Fig. 9 and Figure 10.
In Fig. 9, step 11 is that network selector judges whether the computing machine that is connected starts from this machine.Step 12 is that network selector assert that computing machine has system disk, and for ensuring information security, network selector will not allow computer access that the computer network of level of confidentiality is arranged, but allow its access internet network, thus step 14 by force setting network be numbered 0.Step 13 shows that this computing machine is a diskless computer, it has the right to visit each computer network, but require the user to insert identification card, so that network selector obtains subscriber identity information, the network numbering selected of integrating step 15 users again, T1, the T2 by RJ45 Plus sends to safe hub in the lump in step 17.If step 16 judges that the network number that the user selects is 1~7, and local hard drive is arranged, then during this computer network of visit, cut off the power supply of hard disk.Can prevent that like this computer network information that will level of confidentiality be arranged is unloaded on the hard disk of this computing machine, because just might divulge a secret during the access internet network once more when this computing machine.If network selector does not have user's ID card, then network numbering is made as 0 automatically, mean this user access internet, step 14 that Here it is.Step 18 is waited for the legitimacy that safe hub is answered this user, if conclusion is illegally just to enter into step 19, and stops this time and connects and network.Step 20 is that network selector is watched the user quietly and whether changed identity or network number, promptly whether changed the user, if do not use the family instead, whether the active user will change the computer network that is connected, there is any one change just to arrive 21 and 17, loops back.
In Figure 10, step 41 is that safe hub passes through the request of T1, the T2 wait of RJ45 Plus from network selector, when not asking, circular wait, when request is arranged, entering step 42, at this moment must be that network number or user identity change, if user identity changes, but have the right to visit the current computer network, then withdraw from a user's network, connect the computer network that to visit for the active user, step 43 that Here it is, 46,47 is got back to 41 then and is waited for; If user identity changes, but have no right to visit the current computer network, then enter step 45, stop connecting and reporting an error to network selector.If user identity does not change, that is to have changed network number certainly, if 44 users have authority to visit this computer network, step 48 notice current file server keeps the working site, be connected to the file server of corresponding new computer network according to user identity, network number etc., get back to 41 again.
Because eight computer networks are isolated mutually, the data between them can not read mutually, especially, can't attack remaining seven network from the internet.Because certain in eight computer networks of diskless computer access just becomes the part of this computer network automatically, because no hard disk, can't be at this organizational security deposit data, and when the computer network of dish computer access band level of confidentiality is arranged, hard disk is not worked, so computing machine can not revealed the information of legacy network when inserting another network again because of it exits network, thereby ensures the information security of computer network.
When switching between the computer network of user at different security level, the webserver automatically keeps user's operation scene, so that continue operation when switching back once more.
We might as well examine the process of this method of realization more intuitively closely.When this process was equivalent to have in face of the user several not connected computer network, the user inserted the Network plug of a computing machine to insert to go as required between each computer network.
Why will be with the computing machine of no dish, be exactly for reveal information on the user's computer not.Why using network selector and safe hub, is the length for the hand of the slotting plug that extends, and reduces the cost of wiring and construction simultaneously.
Claims (8)
1, a kind of computer network system that guarantees information security of computer network comprises: router, and computing machine, LAN (Local Area Network), and level of confidentiality is different and computer network that isolate physically each other, it is characterized in that it also comprises:
Network selector links to each other with described computing machine, is used to receive customer parameter, receives the request of the computer network of connecting certain level of confidentiality, and the hard disk of described computing machine is controlled;
Safe hub, be connected between the hub of described network selector and described LAN (Local Area Network), be used for the request of response to network selector switch, according to customer parameter and request from network selector, legitimacy to computed user is judged, and according to judged result, agreement or refusing user's are visited the request of the computer network of certain level of confidentiality;
Adopt the RJ45 interface to link to each other between network selector and the safe hub, and transmit described customer parameter with a pair of twisted-pair feeder in the undefined twisted-pair feeder of two couple among the RJ45, request and control information by twisted-pair feeder.
2, computer network system as claimed in claim 1 is characterized in that: described network selector has the driver of IC-card, is used for reading the user profile that IC-card stores.
3, computer network system as claimed in claim 1 is characterized in that: described safe hub has the driver of reading IC-card, and safe hub recognition system keeper's ID (identity number) card generates user's ID card.
4, as claim 1,2,3 one of any described computer network systems, it is characterized in that: described network selector places computer-internal, and the panel of network selector becomes the ingredient of register face.
5, computer network system as claimed in claim 1, it is characterized in that: it also comprises: layer connection hub, described layer connection hub bilateral adopts the RJ45 interface, be connected between described network selector and the described safe hub, and transmit described customer parameter, request and control information with a pair of twisted-pair feeder in the undefined twisted-pair feeder of two couple among the RJ45, be used for more computing machine and network selector access security hub.
6, a kind of method that is used to guarantee information security of computer network may further comprise the steps:
(1), determine level of confidentiality and numbering respectively for physically isolated mutually a plurality of networks;
(2), each user's level of confidentiality authority is set on the safety hub;
(3), receive customer parameter, determine to propose the numbering of the network that the user will connect the request of this computer network of connection and send customer parameter to safe hub according to customer parameter by network selector;
(4), safe hub responds the request of the network of described certain level of confidentiality of connection, according to described customer parameter user validation is judged;
(5), according to judged result, agree or request that refusing user's is connected the computer network of certain level of confidentiality.
7, method as claimed in claim 6, the customer parameter that it is characterized in that receiving in the step of customer parameter comprises following content: user identity, key, the authority of customer access network level of confidentiality, the number of the current computer network that will visit of user, whether require whether parameters such as system disk are arranged from the network startup local computer.
8, method as claimed in claim 6 is characterized in that in described step (1), the user also can propose to connect the network of no level of confidentiality; In described step (2), further comprising the steps of:
(1) judges whether this user visits the network of level of confidentiality;
(2) if the user does not visit the network of level of confidentiality, then directly connect the internet for the user;
(3) if described user capture has the network of level of confidentiality, then user validation is judged according to described customer parameter.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB991079205A CN1152331C (en) | 1999-06-02 | 1999-06-02 | System for ensuring computer network information safety and corresponding method thereof |
CNB008084297A CN1174579C (en) | 1999-06-02 | 2000-04-30 | System enabling user to select information networks and method thereof |
AU45332/00A AU4533200A (en) | 1999-06-02 | 2000-04-30 | A system enabling a user to select information networks and a method thereof |
PCT/CN2000/000100 WO2000076128A1 (en) | 1999-06-02 | 2000-04-30 | A system enabling a user to select information networks and a method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB991079205A CN1152331C (en) | 1999-06-02 | 1999-06-02 | System for ensuring computer network information safety and corresponding method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1276573A CN1276573A (en) | 2000-12-13 |
CN1152331C true CN1152331C (en) | 2004-06-02 |
Family
ID=5273031
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB991079205A Expired - Fee Related CN1152331C (en) | 1999-06-02 | 1999-06-02 | System for ensuring computer network information safety and corresponding method thereof |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN1152331C (en) |
AU (1) | AU4533200A (en) |
WO (1) | WO2000076128A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003058886A1 (en) * | 2002-01-08 | 2003-07-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Network selection for connectivity |
TW200414737A (en) | 2002-09-27 | 2004-08-01 | Matsushita Electric Ind Co Ltd | Contents transmission system |
US7530113B2 (en) * | 2004-07-29 | 2009-05-05 | Rockwell Automation Technologies, Inc. | Security system and method for an industrial automation system |
US8732789B2 (en) | 2006-05-30 | 2014-05-20 | Iyuko Services L.L.C. | Portable security policy and environment |
CN101820438B (en) * | 2010-01-27 | 2013-11-27 | 戴一奇 | Computer starting method in local area network (LAN) and LAN |
CN104301924B (en) * | 2013-07-19 | 2019-07-23 | 中兴通讯股份有限公司 | Call processing method, device and terminal |
CN106209871B (en) * | 2016-07-18 | 2019-10-01 | 四川君逸数码科技股份有限公司 | The Wired Security access control apparatus and cut-in method of financial circles network |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2985940B2 (en) * | 1996-11-08 | 1999-12-06 | 日本電気株式会社 | Failure recovery device |
CN1146290C (en) * | 1997-04-17 | 2004-04-14 | 艾利森公司 | Network interface with adaptive bridge for efficient mapping of ethernets over ATM-based broadband access network |
CN1276683C (en) * | 1997-11-04 | 2006-09-20 | 皇家菲利浦电子有限公司 | Communication system with improved access network |
-
1999
- 1999-06-02 CN CNB991079205A patent/CN1152331C/en not_active Expired - Fee Related
-
2000
- 2000-04-30 WO PCT/CN2000/000100 patent/WO2000076128A1/en active Application Filing
- 2000-04-30 AU AU45332/00A patent/AU4533200A/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
AU4533200A (en) | 2000-12-28 |
CN1276573A (en) | 2000-12-13 |
WO2000076128A1 (en) | 2000-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110545260B (en) | Cloud management platform construction method based on mimicry structure | |
CN105247529B (en) | The synchronous voucher hash between directory service | |
US6366951B1 (en) | Distributed processing system where a management computer automatically connects remote reduced-capability workstations with centralized computing modules | |
US6886038B1 (en) | System and method for restricting data transfers and managing software components of distributed computers | |
CN100535808C (en) | System and method for secure remote access | |
US6993556B1 (en) | Context administrator | |
CN1578215A (en) | System and method for automatic negotiation of a security protocol | |
CN101061454A (en) | Systems and methods for managing a network | |
CN100539499C (en) | A kind of safe star-shape local network computer system | |
CN1514382A (en) | Method and system for regulating trust relation using nomenclature space and policy | |
CN1514653A (en) | Information route method and system based on secret strategy | |
CN1801825A (en) | Bulk transmission of messages using a single HTTP request | |
CN1453959A (en) | Remote control system and method for domestic network | |
CN1152331C (en) | System for ensuring computer network information safety and corresponding method thereof | |
JP2007213397A (en) | Data management program, data management device and switching method of protocol | |
CN1731743A (en) | Method for managing network device | |
CN1452081A (en) | Server, local server access system and access control method | |
CN101283540B (en) | Method and device for sharing rights object in digital rights management and system thereof | |
CN1172495C (en) | Method for realizing interconnection between devices by using door gateway and its realizing equipment | |
CN2840527Y (en) | Network manager | |
CN1180359C (en) | Control method of network connection and separation | |
AU2003234152A1 (en) | Method and system for distributing data | |
CN116707904A (en) | Cross-security-zone access control method and pre-proxy system | |
CN1223155C (en) | Method for realizing 802.1 X communication based on group management | |
CN101043418A (en) | Server device and communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |