Data exchange method and security gateway

A security gateway and data exchange technology, applied in the field of Internet of Things, can solve problems such as the paralysis of the entire network, and achieve the effects of avoiding attacks, improving practicability, and ensuring performance

Active Publication Date: 2019-08-16
VISIONVERA INFORMATION TECH CO LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows for secure communication between different networks without compromising their privacy. It uses special software called an encryption system (ESS) to encrypt sensitive digital signals before they reach its destination. When two devices communicate over these channels, each other's ESS checks if any changes have been made during transmission. If there were no problems then sending new messages will still work properly even after receiving them correctly. Overall, this technology helps protect against attacks caused by external sources like hacking into internet connections.

Problems solved by technology

This patented technical problem addressed by this patents relates to ensuring secure communications across both internet protocols (IP) connections without causing any damage or malfunctions that could compromise the overall system's performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data exchange method and security gateway
  • Data exchange method and security gateway
  • Data exchange method and security gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0125] refer to Figure 5 , shows a flow chart of the steps of Embodiment 1 of a data exchange method of the present application. In the embodiment of the present application, the method is applied to the Internet of Views, and the Internet of Views is connected to the Internet through a security gateway, and the security gateway There is a first whitelist pre-configured in .

[0126] In the embodiment of this application, the security gateway can be deployed on network or service aggregation nodes such as node switches and node servers in the Internet of Vision, for example, it can be deployed on the co-translation server in the Internet of Vision, and the co-translation in the Internet of Vision The server is responsible for transmitting the data in the Internet of Vision to the Internet, or the data in the Internet to the Internet of Vision. Therefore, the co-translation server can be regarded as the network exchange node between the Internet of Vision and the Internet, and th

Embodiment 2

[0201] Such as Figure 8 It shows a security gateway in Embodiment 2 of the present application. Compared with the processing method in Embodiment 1, the security gateway can be applied to the Internet of View and the Internet, and includes a whitelist configuration module, which is pre-configured with the first A white list, the security gateway also includes:

[0202] The Internet of Vision gateway module 801 is used to verify the port information and protocol in each of the Internet of Vision data packets based on the pre-received first whitelist when receiving a plurality of Internet of Vision data packets from the Internet of Vision Type and MAC address are legal, and extract and verify legal N first Internet of Vision data packets from the plurality of Internet of Vision data packets; wherein, N is a positive integer.

[0203] The Internet gateway module 802 is configured to verify whether the port information, protocol type, and MAC address in each of the Internet data pa

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data exchange method applied to an articulated naturality web, the articulated naturality web is connected to the Internet through a security gateway, and afirst white list is pre-configured in the security gateway. The method comprises the steps of using the security gateway to receive a plurality of articulated naturality web data packets from the articulated naturality web and a plurality of Internet data packets from the Internet; carrying out white list verification on each Internet data packet and each articulated naturality web data packet, and reserving the data packets which are verified to be qualified; extracting the first articulated naturality web audio and video stream data from the articulated naturality web data packet which is verified to be qualified, and extracting the first articulated naturality web audio and video stream data from the Internet data packet which is verified to be qualified; based on each first articulatednaturality web audio and video stream data and each first Internet audio and video stream data, updating the first white list; and based on an updated second white list, extracting a second articulated naturality web data packet and a second Internet data packet, and converting each second articulated naturality web data packet and each second Internet data packet to the articulated naturality web or the Internet.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner VISIONVERA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products