CN107122474A - System document docking technique implementation method under a kind of network physical isolation environment - Google Patents

System document docking technique implementation method under a kind of network physical isolation environment Download PDF

Info

Publication number
CN107122474A
CN107122474A CN201710302119.8A CN201710302119A CN107122474A CN 107122474 A CN107122474 A CN 107122474A CN 201710302119 A CN201710302119 A CN 201710302119A CN 107122474 A CN107122474 A CN 107122474A
Authority
CN
China
Prior art keywords
data
rule
configuration
physical isolation
implementation method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710302119.8A
Other languages
Chinese (zh)
Inventor
裴广恩
邓琦
史振汛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN201710302119.8A priority Critical patent/CN107122474A/en
Publication of CN107122474A publication Critical patent/CN107122474A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Abstract

The invention discloses system document docking technique implementation method under a kind of network physical isolation environment, its implementation process is, data message to be passed is configured first, generate visual image, then visual image is converted into by input data by optical pickup, the input data is input in deblocking module, is parsed by deblocking module and is generated target data.The present invention a kind of network physical isolation environment under system document docking technique implementation method compared with prior art, while realizing data transfer under physical isolation network, data transmission efficiency and operation difficulty can be also improved, it is practical, it is applied widely, with good application value.

Description

System document docking technique implementation method under a kind of network physical isolation environment
Technical field
The present invention relates to field of computer technology, system document is docked under specifically a kind of network physical isolation environment Implementation Technology.
Background technology
Under the internet such as cloud computing, big data overall background, information security more and more turns into focus of attention, in order to The need for information security and information sharing, network is split, the physical isolation of classified network and internet, network split is realized The characteristics of be classified network " only entering to be forbidden ", that is, ensured that information security improves the degree of opening of information sharing again, but simultaneously Also the data transfer problem between two networks is brought.
For this problem, it is proposed that Data Transfer Technology implementation method under a kind of physical isolation network environment, when in appearance This technology can be used when stating scene, the level of security of transmission is improved simultaneously, again in the efficient data transfer of guarantee, simultaneously Error correcting capability also greatly improves a transmission success rate.
The content of the invention
The technical assignment of the present invention is that there is provided system document under a kind of network physical isolation environment for above weak point Docking technique implementation method.
System document docking technique implementation method under a kind of network physical isolation environment, its implementation process is,
Data message to be passed is configured first, visual image is generated, then will be visual by optical pickup Image is converted into input data, and the input data is input in deblocking module, is parsed by deblocking module and is generated target data.
, it is necessary to be packaged to the data when data message to be passed is configured, its process is:
The delivery data to be passed of data sending terminal is read out, and by rule configuration, to generate visual image data, this In rule include data source configuration rule, data transfer rule, tissue data rule;
Corresponding, deblocking data configuration is read and used and data sending terminal by unsealing module in data receiver Identical rule parsing data, for generating target data.
The data source configuration rule refers to that, first by script configuration data assembling engine, the data assembling engine passes through Target data is read in target data source position, and the target data source position is table data store, and table data store must be effective And distribute data assembling engine read access authority.
The transmission data configuration rule refers to assemble engine by script configuration data, true by the data assembling engine Fixed number according to range boundary and content, the reading technology restriction of the range boundary and content based on optical pickup and determine.
Tissue data rule refers to that then encapsulation of data engine is using fixation first by script configuration packages data engine The tissue data rule of symbol segmentation is packaged to data.
Data encapsulation detailed process be:
Step one:Data assembling engine reads the data source of assembling configuration, is shaken hands with data source, enters step after shaking hands successfully Rapid two;
Step 2:The transmission data configuration in data source is read, after reading successfully, data are kept in;
Step 3:Encryption, error correction configuration are read out, subsequently into step 4;
Step 4:Tissue data rule is read, the temporal data of step 2 is packaged and formed according to data rule Visual image.
Data deblocking detailed process be:
Step one:Data deblocking module carries out the incoming triggering of data and waited, after triggering command is received, log-on data solution Envelope process;
Step 2:Data deblocking module reads tissue data rule, and the data to reception carry out deblocking processing, unseal successfully Enter step 3 afterwards;
Step 3:Decryption configuration is read, is decrypted to unsealing successful data;
Step 4:Target data configuration is read, the data that solution is honored as a queen are generated according to object format.
The encryption and decryption uses symmetrical expression encryption and decryption mode.
The present invention a kind of network physical isolation environment under system document docking technique implementation method compared to the prior art, Have the advantages that:
System document docking technique implementation method under a kind of network physical isolation environment of the present invention, realizes physical isolation net Under network while data transfer, data transmission efficiency and operation difficulty can be also improved;Ensureing efficient data transfer simultaneously, The level of security of transmission is improved again, while error correcting capability also greatly improves a transmission success rate, number is transmitted in reduction by hand It is practical according to the loss brought, risk of divulging a secret, it is applied widely, with good application value.
Brief description of the drawings
Accompanying drawing 1 is implementation process figure of the invention.
Embodiment
Below in conjunction with the accompanying drawings and specific embodiment the invention will be further described.
As shown in Figure 1, the present invention is to provide system document docking technique realization side under a kind of network physical isolation environment Method, data, which constitute interface and greatly facilitated, reviews the data of target data and constitutes, and can multiple recursive call, number is reviewed layer by layer According to composition.Data resource interface greatly facilitates the details for reviewing source data, can be easily with module or cross-module displaying Source data all it should be understood that information, function or module are checked where without entering data source.
This method has the characteristics that:
Transmit data can configure, by defining one group of data assembling and deblocking standard for data two ends.
Data dynamic extending is transmitted, transmission data content can be added dynamically.
Transmitting terminal can be encrypted, and transmission content is encrypted based on symmetric cryptosystem.
Receiving terminal can be decrypted, and restoring data transmission bag is decrypted using key.
Data can error correction, support serious forgiveness in the range of automatic error-correcting.
Data assembling engine:Carried out specifically using rule to realize the correct operation of data assembling engine, it is necessary to follow Definition, comprising following components,
Set access source.
Data assembling rule is defined according to standard.
Set level of error correction.
Encryption policy is set, and configures AES.
Data transfer components:In order to realize the correct operation of data delivery components, it is necessary to using optical image acquisition module The visual image data of data assembling engine generation are read, and are transmitted by data link, module is unsealed as data Data input.
Data unseal module:Carry out specifically determining using rule, it is necessary to follow to realize the correct operation of data deblocking module Justice, comprising following components,
Data deblocking rule is defined according to standard.
Set decruption key.
Sets target data format, can support mainstream data source to insert.
The present invention the process that implements be,
Data message to be passed is configured first, visual image is generated, then will be visual by optical pickup Image is converted into input data, and the input data is input in deblocking module, is parsed by deblocking module and is generated target data.
, it is necessary to be packaged to the data when data message to be passed is configured, its process is:
The delivery data to be passed of data sending terminal is read out, and by rule configuration, to generate visual image data, this In rule include data source configuration rule, data transfer rule, tissue data rule;
Corresponding, deblocking data configuration is read and used and data sending terminal by unsealing module in data receiver Identical rule parsing data, for generating target data.
The data source configuration rule refers to that, first by script configuration data assembling engine, the data assembling engine passes through Target data is read in target data source position, and the target data source position is table data store, and table data store must be effective And distribute data assembling engine read access authority.
The transmission data configuration rule refers to assemble engine by script configuration data, true by the data assembling engine Fixed number according to range boundary and content, the reading technology restriction of the range boundary and content based on optical pickup and determine.
Tissue data rule refers to that then encapsulation of data engine is using fixation first by script configuration packages data engine The tissue data rule of symbol segmentation is packaged to data.
Deblocking data configuration is the rule configuration that receiving terminal reads and used, including organizes data rule, target data to match somebody with somebody Composition is put, for generating target data.
Tissue data rule is to unseal the foundation that data engine is split, and is split using mark-hold, can be reverse by rule Unseal as target data.
Target data configuration is the foundation for unsealing the assembled target data of data engine.
Data encapsulation detailed process be:
Step one:Data assembling engine reads the data source of assembling configuration, is shaken hands with data source, enters step after shaking hands successfully Rapid two;
Step 2:The transmission data configuration in data source is read, after reading successfully, data are kept in;
Step 3:Encryption, error correction configuration are read out, subsequently into step 4;
Step 4:Tissue data rule is read, the temporal data of step 2 is packaged and formed according to data rule Visual image.
Data deblocking detailed process be:
Step one:Data deblocking module carries out the incoming triggering of data and waited, after triggering command is received, log-on data solution Envelope process;
Step 2:Data deblocking module reads tissue data rule, and the data to reception carry out deblocking processing, unseal successfully Enter step 3 afterwards;
Step 3:Decryption configuration is read, is decrypted to unsealing successful data;
Step 4:Target data configuration is read, the data that solution is honored as a queen are generated according to object format;
Step 5:Other systems obtain format into object format data and carry out subsequent operation, and system configuration middle finger sets the goal data source When, target data source will be write data into automatically.
In order to improve the security and success rate of data transfer, there is provided the encryption to data encapsulation process and fault-tolerant.Error correction Function substantially increases correct recognition capability, and encryption and decryption uses symmetry encryption mode, it is ensured that the safety of visual image data.
It will be illustrated below by an actual implement scene, become apparent from the above-mentioned target of the present invention, feature and advantage, It is understandable.
By taking " storage document " as an example, wherein optical image acquisition module uses two-dimensional code scanning rifle, and visual image is two dimension Illustrate specific embodiment under the scene of code:
Encapsulation, deblocking, encryption, error correction configuration:
Package arrangements, encryption configuration, error correction configuration are operated in A systems, it is right in B system after the completion of operation Deblocking configuration, decryption configuration are operated.
Unseal and to be matched in encapsulation and B system in A systems.
Solution configuration in A systems in encryption configuration and B system will be matched.
Level of error correction in A systems in fault-tolerant rank and B system will be matched.
A system Mass production Quick Response Codes:
A systems are come out data query to be packaged by query function first, are shown with list mode.
Handling process:
Step one, bills data waiting for transmission in list is chosen;
Step 2, generates visual image data, calls data to encapsulate after engine, generation Quick Response Code, into state to be scanned;
The field information that Quick Response Code is included is:
B system reads data by two-dimensional code scanning rifle:
Scanner is accessed in B system, scans after the Quick Response Code of A systems, identification Quick Response Code, calls data to unseal module logarithm According to being unsealed, the information stored in Quick Response Code is identified and is changed and is stored according to document format.
Handling process:
Step one, click on and start scanning, start scanning oracle listener;
After step 2, scanner barcode scanning, call data to unseal module automatically, after unsealing and decrypting, form target data lattice One row information of automatic increase in formula, form;
Step 3, after document is scanned, the record in selection form clicks on generation document, system will be further automatic Document information is matched and improved, database is saved in.
Code is realized:
By embodiment above, the those skilled in the art can readily realize the present invention.But should Work as understanding, the present invention is not limited to above-mentioned embodiment.On the basis of disclosed embodiment, the technical field Technical staff can be combined different technical characteristics, so as to realize different technical schemes.
It is the known technology of those skilled in the art in addition to the technical characteristic described in specification.

Claims (8)

1. system document docking technique implementation method under a kind of network physical isolation environment, it is characterised in that its implementation process is,
Data message to be passed is configured first, visual image is generated, then by optical pickup by visual image Input data is converted into, the input data is input in deblocking module, is parsed by deblocking module and is generated target data.
2. system document docking technique implementation method under a kind of network physical isolation environment according to claim 1, it is special Levy and be, it is necessary to be packaged to the data when data message to be passed is configured, its process is:
The delivery data to be passed of data sending terminal is read out, and configured by rule, to generate visual image data, here Rule includes data source configuration rule, data transfer rule, tissue data rule;
Corresponding, deblocking data configuration is read and used identical with data sending terminal by unsealing module in data receiver Rule parsing data, for generating target data.
3. system document docking technique implementation method under a kind of network physical isolation environment according to claim 2, it is special Levy and be, the data source configuration rule refers to assemble engine by script configuration data first, and the data assembling engine passes through Target data is read in target data source position, and the target data source position is table data store, and table data store must be effective And distribute data assembling engine read access authority.
4. system document docking technique implementation method under a kind of network physical isolation environment according to claim 2, it is special Levy and be, the transmission data configuration rule refers to assemble engine by script configuration data, true by the data assembling engine Fixed number according to range boundary and content, the reading technology restriction of the range boundary and content based on optical pickup and determine.
5. system document docking technique implementation method under a kind of network physical isolation environment according to claim 2, it is special Levy and be, tissue data rule refers to that then encapsulation of data engine is using fixation first by script configuration packages data engine The tissue data rule of symbol segmentation is packaged to data.
6. system document docking technique realization side under a kind of network physical isolation environment according to claim 3 or 4 or 5 Method, it is characterised in that data encapsulation detailed process be:
Step one:Data assembling engine reads the data source of assembling configuration, is shaken hands with data source, enters step after shaking hands successfully Two;
Step 2:The transmission data configuration in data source is read, after reading successfully, data are kept in;
Step 3:Encryption, error correction configuration are read out, subsequently into step 4;
Step 4:Tissue data rule is read, the temporal data of step 2 is packaged according to data rule and forms visual Change image.
7. system document docking technique implementation method under a kind of network physical isolation environment according to claim 6, it is special Levy and be, the detailed process of data deblocking is:
Step one:Data deblocking module carries out the incoming triggering of data and waited, and after triggering command is received, log-on data was unsealed Journey;
Step 2:Data deblocking module reads tissue data rule, and the data to reception carry out deblocking processing, unseal successfully laggard Enter step 3;
Step 3:Decryption configuration is read, is decrypted to unsealing successful data;
Step 4:Target data configuration is read, the data that solution is honored as a queen are generated according to object format.
8. system document docking technique implementation method under a kind of network physical isolation environment according to claim 7, it is special Levy and be, the encryption and decryption uses symmetrical expression encryption and decryption mode.
CN201710302119.8A 2017-05-02 2017-05-02 System document docking technique implementation method under a kind of network physical isolation environment Pending CN107122474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710302119.8A CN107122474A (en) 2017-05-02 2017-05-02 System document docking technique implementation method under a kind of network physical isolation environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710302119.8A CN107122474A (en) 2017-05-02 2017-05-02 System document docking technique implementation method under a kind of network physical isolation environment

Publications (1)

Publication Number Publication Date
CN107122474A true CN107122474A (en) 2017-09-01

Family

ID=59727029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710302119.8A Pending CN107122474A (en) 2017-05-02 2017-05-02 System document docking technique implementation method under a kind of network physical isolation environment

Country Status (1)

Country Link
CN (1) CN107122474A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881924A (en) * 2018-05-23 2018-11-23 上海昊擎信息技术工程有限公司 Data transmission set

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113532A (en) * 2014-06-30 2014-10-22 公安部交通管理科学研究所 Method for automatic safe exchange of information between physically isolated networks
CN104363221A (en) * 2014-11-10 2015-02-18 青岛微智慧信息有限公司 Network safety isolation file transmission control method
CN104580243A (en) * 2015-01-23 2015-04-29 中国兵器工业集团第五三研究所 Device and method for implementing data transmission between physical isolation networks based on hexadecimal codes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113532A (en) * 2014-06-30 2014-10-22 公安部交通管理科学研究所 Method for automatic safe exchange of information between physically isolated networks
CN104363221A (en) * 2014-11-10 2015-02-18 青岛微智慧信息有限公司 Network safety isolation file transmission control method
CN104580243A (en) * 2015-01-23 2015-04-29 中国兵器工业集团第五三研究所 Device and method for implementing data transmission between physical isolation networks based on hexadecimal codes

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881924A (en) * 2018-05-23 2018-11-23 上海昊擎信息技术工程有限公司 Data transmission set

Similar Documents

Publication Publication Date Title
CN112235289B (en) Data encryption and decryption method and device, computing equipment and storage medium
US11296889B2 (en) Secret sharing via blockchains
CN105049425B (en) A kind of physical isolation transmission method based on Quick Response Code
US8813243B2 (en) Reducing a size of a security-related data object stored on a token
EP2147389B1 (en) Mobile unit parental control
CN102710759A (en) Web server, business logging method and system
CN109905227B (en) System and method for multi-value packing scheme for homomorphic encryption
BR112017016047A2 (en) methods of transmitting a packet and packets containing digital data through a cloud and digital data transmission through a cloud.
US20170371625A1 (en) Content delivery method
WO2008016415A1 (en) Portable personal identity information
CN114860735A (en) Method and device for inquiring hiding trace
US7487354B2 (en) Methods and systems for using digital signatures in uniform resource locators
US11121869B1 (en) Decentralized cryptographic key derivation
US8891760B2 (en) System for checking acceptance of string by automaton
US20230370245A1 (en) Privacy-Preserving Domain Name Services (DNS)
CN105468709A (en) Data inquiry device and data inquiry method based on HBase
CN113507483B (en) Instant messaging method, device, server and storage medium
CN114428972A (en) Privacy protection query method and device supporting outsourcing calculation and related equipment
CN108052550B (en) Annuity data receiving method and device, computer equipment and storage medium
CN110662089A (en) Bullet screen receiving and processing method, storage medium, electronic equipment and system
US20160182462A1 (en) Data view based on context
CN107122474A (en) System document docking technique implementation method under a kind of network physical isolation environment
CN110958216B (en) Secure online network packet transmission
US10750033B2 (en) Electronic package interception, parsing, and routing
CN110585727B (en) Resource acquisition method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170901