Uploaded on

This explains the path-breaking patented technology which can ensure 100% security of an organisation's internal databases. This is used in conjunction with the PVDTN connectivity solution.

This explains the path-breaking patented technology which can ensure 100% security of an organisation's internal databases. This is used in conjunction with the PVDTN connectivity solution.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
294
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
19
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. STSSECURE TRANSFER SYSTEM For transfer of information & data back and forthbetween completely separated networks – physically, electronically, and electromagnetically
  • 2. 1. Figure 1 shows the emblematic diagram of the STS2. Figure 2 shows the schematic diagram of the STS arrangement. The Secure Switch (SS) connects IS alternately to the INTRANET and the Internet LANs and gets into a two way synchronisation with CS (Organisation communications server) and the PS (organisation’s Public or Web server physically connected to the Internet LAN), respectively.3. Figure 3 shows the data flow diagram for the STS for different positions of the Secure Switch (SS).4. Figure 4 shows the schematic diagram of the Secure Switch – 3 position, electromechanical, micro-controller driven, RJ45 switch. a. The switch used for the actual STS is driven by programmed commands located in the Intermediate Server (IS) to which it is permanently connected. b. The switches used with IBNs (Internet Browsing Nodes) are driven by manual commands given from the IBNs to which these are connected.5. Figure 5 shows the duplicated STS at the DRS (disaster recovery sites) for organisations which have these.6. Figure 6 shows the manner in which Organisation LANs are connected to the Internet at present from the ISP LANs or the NIXI at the city.7. Fig 7 shows the manner in which the Internet will be connected to the separated Internet LANs at the central location of the organisation. Similar separated Internet LANs will also be placed at the other organisation locations.
  • 3. Fig 1 Schematic Diagram of STS Storage INTERNET PS Storage SS IS Storage INTRANET CS•PS, IS, CS have same fields which are synchronised at each connection.•CS collates data from internal data bases to pass on to PS through IS,and also distributes information received from the interactive Webpages to the relevant data base.•The information stored in the Storage associated with the PS helps tocarry out e-commerce activity like placing orders, internet banking. Etc.The storage is updated in each STS cycle.
  • 4. Fig 2 Switching arrangement of STS Public Server Company For Company information, Company information Inter-active Web pages data bases and and mail server Internet mail GatewayDB1 DB2 CS PS 0 Company LAN Internet LAN 1 2 3-Pos Electro -mechanical RJ45 switch SS Intermediate Server For transferring information and mail back and forth Between CS and PS (IS) Switch changes state on CL IL Automated settable commands I/O I/O from software in IS Box Box CL IL I/O I/O Box Box 0 1 2 3-Pos EM RJ45 0 Switch 1 2 State changes With manual command From Node SS Nodes for Internet browsing Nodes for Internet browsing
  • 5. Fig 3 – Overall datagram CS IS PS Company Info Web Info Company External mailStorage update Fig 3a Step 1 – IS connected to CS CS IS PS Changes in Company Info Company Info received Changes in Web Info Web Info received Incoming Outgoing Company Mail Mail External mail received received PS STRG CS STRGStorage update PSPPS Update Update received received Fig 3b Step 2 – IS in Null after connecting to CS CS IS PS Changes in Company Info Company Info received Web Info Outgoing Company Mail External mail received CS STRG UpdateStorage update received All content In IS cleansed For viruses etc
  • 6. Fig 3c Step 3 – IS connected to PS CS IS PS Changes in Company Info Company Info received Changes in Web Info Web Info received Incoming Outgoing Company Mail Mail External mail received received PS STRG CS STRG Update Update received received Fig 3d Step 4 – IS in Null after connecting to PS CS IS PS Company Info Changes in Web Info Web Info received Incoming Company Mail External mail received PS STRGStorage update Update received All content In IS Cleansed for Viruses, etc.
  • 7. Fig 4 Schematic Diagram of Secure Switch (SS) 3-Position, Electromechanical, Micro-controller driven RJ45 switch RJ45 socket for connecting to Company secure LAN Switch RJ45 socket MC1 R2 for R1connecti ng toInterme MICRO CONTROLLER LOGIC diate Server MC2 R1 LAN R2 Card Serial Port 9 Pin D Type RJ45 socket for connecting to Internet LAN Switch Normally closed relay contact Normally open relay contact 12V DC
  • 8. Fig 5 STS at CDC And DRS Proxy Server Company For Company information, Company information Inter-active Web pages data bases and and mail server Internet mail GatewayDB1 DB2 CS PS CDC 0 P2P Company LAN Internet LAN 1 2 Internet Leased SS 3-Pos Electro -mechanical Line Duplicated RJ45 switch INTRANET IS WAN LINKS Intermediate Server For transferring information and mail back and forth Internet Between CS and PS Proxy Server Company For Company information, Company information Inter-active Web pages data bases and and mail server Internet mail GatewayDB11 DB21 CS1 PS1 P2P Internet Leased DRS Line 0 Company LAN Internet LAN 1 2 SS1 3-Pos Electro -mechanical RJ45 switch IS1 Intermediate Server For transferring information and mail back and forth Between CS and PS
  • 9. STORAGE SYNCH THROUGH STS INTRANET INTERNET SS C P S S NAS NASDB SERVERS I S NAS INTRANET SAN
  • 10. Fig 6 PRESENT METHODS OF INTERNET CONNECTIONS Leased lines to nearest INTERNET HUIB ISP ISP Authentication Mail Server Server P S T GATEWAY ROUTER N ISP LANACCESS ROUTERS ACCESS ROUTERS LEASED LINES Company Company Company LAN BROADBAND WEB Mail Server ACCESS Server Server NETWORK In this scenario, all Internet mail users In this scenario, the Company has its Use the ISP mail server for their e -mail Own Mail and WEB server, and authentication And the ISP authenticates their user name at these Servers. and pass word Mail from the INTERNET from all the servers meant for this server gets downloaded on this server. Clients access their Internet e -mail from this server. The leased line from the Company premises Terminates on the Internet Gateway Router of the ISP, and not its Access Routers
  • 11. Fig 7 PROPOSED INTERNET CONNECTION & TRANSFER OF INFORMATION FROM PRIVATE NETWORK THROUGH SECURE TRANSFER SYSTEM (STS) Remote log in to Company Proxy Mail and Web Servers PSTN ISP ISP INTERNET Authentication Mail Server Server P Leased lines S to nearest INTERNET T HUIB N GATEWAY ROUTER ISP LAN ACCESS ROUTERS ACCESS ROUTERS Internet log -in from off -campus LEASED LINE CONNECTIONS Log -in to company LAN stand alone TO ISP LAN FROM through PVDTN machines in Company Company DIFFERENT COMPANIES connectionssame town/city Public Public at Residences in same WEB Mail or other Cities / towns. Server Server C C P P Dial -up modem W M Line conversion equipment S S E C C R R M C A V P P S S S D S INTERNET LAN S T P N Three -way S R switch A E S Router P COMPANY LAN A LEASED LINES B I FROM X S COMPANY WAN M W Internet Three -way log -in from switch in-campus stand alone Node in Company premises with Internet browsing facility machines