CN107122474A - System document docking technique implementation method under a kind of network physical isolation environment - Google Patents
System document docking technique implementation method under a kind of network physical isolation environment Download PDFInfo
- Publication number
- CN107122474A CN107122474A CN201710302119.8A CN201710302119A CN107122474A CN 107122474 A CN107122474 A CN 107122474A CN 201710302119 A CN201710302119 A CN 201710302119A CN 107122474 A CN107122474 A CN 107122474A
- Authority
- CN
- China
- Prior art keywords
- data
- rule
- configuration
- physical isolation
- implementation method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000002955 isolation Methods 0.000 title claims abstract description 22
- 238000003032 molecular docking Methods 0.000 title claims abstract description 17
- 230000000007 visual effect Effects 0.000 claims abstract description 18
- 230000005540 biological transmission Effects 0.000 claims abstract description 16
- 238000012546 transfer Methods 0.000 claims abstract description 11
- 230000003287 optical effect Effects 0.000 claims abstract description 9
- 238000012937 correction Methods 0.000 claims description 9
- 238000005538 encapsulation Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 3
- 230000011218 segmentation Effects 0.000 claims description 3
- 230000002123 temporal effect Effects 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Abstract
The invention discloses system document docking technique implementation method under a kind of network physical isolation environment, its implementation process is, data message to be passed is configured first, generate visual image, then visual image is converted into by input data by optical pickup, the input data is input in deblocking module, is parsed by deblocking module and is generated target data.The present invention a kind of network physical isolation environment under system document docking technique implementation method compared with prior art, while realizing data transfer under physical isolation network, data transmission efficiency and operation difficulty can be also improved, it is practical, it is applied widely, with good application value.
Description
Technical field
The present invention relates to field of computer technology, system document is docked under specifically a kind of network physical isolation environment
Implementation Technology.
Background technology
Under the internet such as cloud computing, big data overall background, information security more and more turns into focus of attention, in order to
The need for information security and information sharing, network is split, the physical isolation of classified network and internet, network split is realized
The characteristics of be classified network " only entering to be forbidden ", that is, ensured that information security improves the degree of opening of information sharing again, but simultaneously
Also the data transfer problem between two networks is brought.
For this problem, it is proposed that Data Transfer Technology implementation method under a kind of physical isolation network environment, when in appearance
This technology can be used when stating scene, the level of security of transmission is improved simultaneously, again in the efficient data transfer of guarantee, simultaneously
Error correcting capability also greatly improves a transmission success rate.
The content of the invention
The technical assignment of the present invention is that there is provided system document under a kind of network physical isolation environment for above weak point
Docking technique implementation method.
System document docking technique implementation method under a kind of network physical isolation environment, its implementation process is,
Data message to be passed is configured first, visual image is generated, then will be visual by optical pickup
Image is converted into input data, and the input data is input in deblocking module, is parsed by deblocking module and is generated target data.
, it is necessary to be packaged to the data when data message to be passed is configured, its process is:
The delivery data to be passed of data sending terminal is read out, and by rule configuration, to generate visual image data, this
In rule include data source configuration rule, data transfer rule, tissue data rule;
Corresponding, deblocking data configuration is read and used and data sending terminal by unsealing module in data receiver
Identical rule parsing data, for generating target data.
The data source configuration rule refers to that, first by script configuration data assembling engine, the data assembling engine passes through
Target data is read in target data source position, and the target data source position is table data store, and table data store must be effective
And distribute data assembling engine read access authority.
The transmission data configuration rule refers to assemble engine by script configuration data, true by the data assembling engine
Fixed number according to range boundary and content, the reading technology restriction of the range boundary and content based on optical pickup and determine.
Tissue data rule refers to that then encapsulation of data engine is using fixation first by script configuration packages data engine
The tissue data rule of symbol segmentation is packaged to data.
Data encapsulation detailed process be:
Step one:Data assembling engine reads the data source of assembling configuration, is shaken hands with data source, enters step after shaking hands successfully
Rapid two;
Step 2:The transmission data configuration in data source is read, after reading successfully, data are kept in;
Step 3:Encryption, error correction configuration are read out, subsequently into step 4;
Step 4:Tissue data rule is read, the temporal data of step 2 is packaged and formed according to data rule
Visual image.
Data deblocking detailed process be:
Step one:Data deblocking module carries out the incoming triggering of data and waited, after triggering command is received, log-on data solution
Envelope process;
Step 2:Data deblocking module reads tissue data rule, and the data to reception carry out deblocking processing, unseal successfully
Enter step 3 afterwards;
Step 3:Decryption configuration is read, is decrypted to unsealing successful data;
Step 4:Target data configuration is read, the data that solution is honored as a queen are generated according to object format.
The encryption and decryption uses symmetrical expression encryption and decryption mode.
The present invention a kind of network physical isolation environment under system document docking technique implementation method compared to the prior art,
Have the advantages that:
System document docking technique implementation method under a kind of network physical isolation environment of the present invention, realizes physical isolation net
Under network while data transfer, data transmission efficiency and operation difficulty can be also improved;Ensureing efficient data transfer simultaneously,
The level of security of transmission is improved again, while error correcting capability also greatly improves a transmission success rate, number is transmitted in reduction by hand
It is practical according to the loss brought, risk of divulging a secret, it is applied widely, with good application value.
Brief description of the drawings
Accompanying drawing 1 is implementation process figure of the invention.
Embodiment
Below in conjunction with the accompanying drawings and specific embodiment the invention will be further described.
As shown in Figure 1, the present invention is to provide system document docking technique realization side under a kind of network physical isolation environment
Method, data, which constitute interface and greatly facilitated, reviews the data of target data and constitutes, and can multiple recursive call, number is reviewed layer by layer
According to composition.Data resource interface greatly facilitates the details for reviewing source data, can be easily with module or cross-module displaying
Source data all it should be understood that information, function or module are checked where without entering data source.
This method has the characteristics that:
Transmit data can configure, by defining one group of data assembling and deblocking standard for data two ends.
Data dynamic extending is transmitted, transmission data content can be added dynamically.
Transmitting terminal can be encrypted, and transmission content is encrypted based on symmetric cryptosystem.
Receiving terminal can be decrypted, and restoring data transmission bag is decrypted using key.
Data can error correction, support serious forgiveness in the range of automatic error-correcting.
Data assembling engine:Carried out specifically using rule to realize the correct operation of data assembling engine, it is necessary to follow
Definition, comprising following components,
Set access source.
Data assembling rule is defined according to standard.
Set level of error correction.
Encryption policy is set, and configures AES.
Data transfer components:In order to realize the correct operation of data delivery components, it is necessary to using optical image acquisition module
The visual image data of data assembling engine generation are read, and are transmitted by data link, module is unsealed as data
Data input.
Data unseal module:Carry out specifically determining using rule, it is necessary to follow to realize the correct operation of data deblocking module
Justice, comprising following components,
Data deblocking rule is defined according to standard.
Set decruption key.
Sets target data format, can support mainstream data source to insert.
The present invention the process that implements be,
Data message to be passed is configured first, visual image is generated, then will be visual by optical pickup
Image is converted into input data, and the input data is input in deblocking module, is parsed by deblocking module and is generated target data.
, it is necessary to be packaged to the data when data message to be passed is configured, its process is:
The delivery data to be passed of data sending terminal is read out, and by rule configuration, to generate visual image data, this
In rule include data source configuration rule, data transfer rule, tissue data rule;
Corresponding, deblocking data configuration is read and used and data sending terminal by unsealing module in data receiver
Identical rule parsing data, for generating target data.
The data source configuration rule refers to that, first by script configuration data assembling engine, the data assembling engine passes through
Target data is read in target data source position, and the target data source position is table data store, and table data store must be effective
And distribute data assembling engine read access authority.
The transmission data configuration rule refers to assemble engine by script configuration data, true by the data assembling engine
Fixed number according to range boundary and content, the reading technology restriction of the range boundary and content based on optical pickup and determine.
Tissue data rule refers to that then encapsulation of data engine is using fixation first by script configuration packages data engine
The tissue data rule of symbol segmentation is packaged to data.
Deblocking data configuration is the rule configuration that receiving terminal reads and used, including organizes data rule, target data to match somebody with somebody
Composition is put, for generating target data.
Tissue data rule is to unseal the foundation that data engine is split, and is split using mark-hold, can be reverse by rule
Unseal as target data.
Target data configuration is the foundation for unsealing the assembled target data of data engine.
Data encapsulation detailed process be:
Step one:Data assembling engine reads the data source of assembling configuration, is shaken hands with data source, enters step after shaking hands successfully
Rapid two;
Step 2:The transmission data configuration in data source is read, after reading successfully, data are kept in;
Step 3:Encryption, error correction configuration are read out, subsequently into step 4;
Step 4:Tissue data rule is read, the temporal data of step 2 is packaged and formed according to data rule
Visual image.
Data deblocking detailed process be:
Step one:Data deblocking module carries out the incoming triggering of data and waited, after triggering command is received, log-on data solution
Envelope process;
Step 2:Data deblocking module reads tissue data rule, and the data to reception carry out deblocking processing, unseal successfully
Enter step 3 afterwards;
Step 3:Decryption configuration is read, is decrypted to unsealing successful data;
Step 4:Target data configuration is read, the data that solution is honored as a queen are generated according to object format;
Step 5:Other systems obtain format into object format data and carry out subsequent operation, and system configuration middle finger sets the goal data source
When, target data source will be write data into automatically.
In order to improve the security and success rate of data transfer, there is provided the encryption to data encapsulation process and fault-tolerant.Error correction
Function substantially increases correct recognition capability, and encryption and decryption uses symmetry encryption mode, it is ensured that the safety of visual image data.
It will be illustrated below by an actual implement scene, become apparent from the above-mentioned target of the present invention, feature and advantage,
It is understandable.
By taking " storage document " as an example, wherein optical image acquisition module uses two-dimensional code scanning rifle, and visual image is two dimension
Illustrate specific embodiment under the scene of code:
Encapsulation, deblocking, encryption, error correction configuration:
Package arrangements, encryption configuration, error correction configuration are operated in A systems, it is right in B system after the completion of operation
Deblocking configuration, decryption configuration are operated.
Unseal and to be matched in encapsulation and B system in A systems.
Solution configuration in A systems in encryption configuration and B system will be matched.
Level of error correction in A systems in fault-tolerant rank and B system will be matched.
A system Mass production Quick Response Codes:
A systems are come out data query to be packaged by query function first, are shown with list mode.
Handling process:
Step one, bills data waiting for transmission in list is chosen;
Step 2, generates visual image data, calls data to encapsulate after engine, generation Quick Response Code, into state to be scanned;
The field information that Quick Response Code is included is:
B system reads data by two-dimensional code scanning rifle:
Scanner is accessed in B system, scans after the Quick Response Code of A systems, identification Quick Response Code, calls data to unseal module logarithm
According to being unsealed, the information stored in Quick Response Code is identified and is changed and is stored according to document format.
Handling process:
Step one, click on and start scanning, start scanning oracle listener;
After step 2, scanner barcode scanning, call data to unseal module automatically, after unsealing and decrypting, form target data lattice
One row information of automatic increase in formula, form;
Step 3, after document is scanned, the record in selection form clicks on generation document, system will be further automatic
Document information is matched and improved, database is saved in.
Code is realized:
By embodiment above, the those skilled in the art can readily realize the present invention.But should
Work as understanding, the present invention is not limited to above-mentioned embodiment.On the basis of disclosed embodiment, the technical field
Technical staff can be combined different technical characteristics, so as to realize different technical schemes.
It is the known technology of those skilled in the art in addition to the technical characteristic described in specification.
Claims (8)
1. system document docking technique implementation method under a kind of network physical isolation environment, it is characterised in that its implementation process is,
Data message to be passed is configured first, visual image is generated, then by optical pickup by visual image
Input data is converted into, the input data is input in deblocking module, is parsed by deblocking module and is generated target data.
2. system document docking technique implementation method under a kind of network physical isolation environment according to claim 1, it is special
Levy and be, it is necessary to be packaged to the data when data message to be passed is configured, its process is:
The delivery data to be passed of data sending terminal is read out, and configured by rule, to generate visual image data, here
Rule includes data source configuration rule, data transfer rule, tissue data rule;
Corresponding, deblocking data configuration is read and used identical with data sending terminal by unsealing module in data receiver
Rule parsing data, for generating target data.
3. system document docking technique implementation method under a kind of network physical isolation environment according to claim 2, it is special
Levy and be, the data source configuration rule refers to assemble engine by script configuration data first, and the data assembling engine passes through
Target data is read in target data source position, and the target data source position is table data store, and table data store must be effective
And distribute data assembling engine read access authority.
4. system document docking technique implementation method under a kind of network physical isolation environment according to claim 2, it is special
Levy and be, the transmission data configuration rule refers to assemble engine by script configuration data, true by the data assembling engine
Fixed number according to range boundary and content, the reading technology restriction of the range boundary and content based on optical pickup and determine.
5. system document docking technique implementation method under a kind of network physical isolation environment according to claim 2, it is special
Levy and be, tissue data rule refers to that then encapsulation of data engine is using fixation first by script configuration packages data engine
The tissue data rule of symbol segmentation is packaged to data.
6. system document docking technique realization side under a kind of network physical isolation environment according to claim 3 or 4 or 5
Method, it is characterised in that data encapsulation detailed process be:
Step one:Data assembling engine reads the data source of assembling configuration, is shaken hands with data source, enters step after shaking hands successfully
Two;
Step 2:The transmission data configuration in data source is read, after reading successfully, data are kept in;
Step 3:Encryption, error correction configuration are read out, subsequently into step 4;
Step 4:Tissue data rule is read, the temporal data of step 2 is packaged according to data rule and forms visual
Change image.
7. system document docking technique implementation method under a kind of network physical isolation environment according to claim 6, it is special
Levy and be, the detailed process of data deblocking is:
Step one:Data deblocking module carries out the incoming triggering of data and waited, and after triggering command is received, log-on data was unsealed
Journey;
Step 2:Data deblocking module reads tissue data rule, and the data to reception carry out deblocking processing, unseal successfully laggard
Enter step 3;
Step 3:Decryption configuration is read, is decrypted to unsealing successful data;
Step 4:Target data configuration is read, the data that solution is honored as a queen are generated according to object format.
8. system document docking technique implementation method under a kind of network physical isolation environment according to claim 7, it is special
Levy and be, the encryption and decryption uses symmetrical expression encryption and decryption mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710302119.8A CN107122474A (en) | 2017-05-02 | 2017-05-02 | System document docking technique implementation method under a kind of network physical isolation environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710302119.8A CN107122474A (en) | 2017-05-02 | 2017-05-02 | System document docking technique implementation method under a kind of network physical isolation environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107122474A true CN107122474A (en) | 2017-09-01 |
Family
ID=59727029
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710302119.8A Pending CN107122474A (en) | 2017-05-02 | 2017-05-02 | System document docking technique implementation method under a kind of network physical isolation environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107122474A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881924A (en) * | 2018-05-23 | 2018-11-23 | 上海昊擎信息技术工程有限公司 | Data transmission set |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113532A (en) * | 2014-06-30 | 2014-10-22 | 公安部交通管理科学研究所 | Method for automatic safe exchange of information between physically isolated networks |
CN104363221A (en) * | 2014-11-10 | 2015-02-18 | 青岛微智慧信息有限公司 | Network safety isolation file transmission control method |
CN104580243A (en) * | 2015-01-23 | 2015-04-29 | 中国兵器工业集团第五三研究所 | Device and method for implementing data transmission between physical isolation networks based on hexadecimal codes |
-
2017
- 2017-05-02 CN CN201710302119.8A patent/CN107122474A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113532A (en) * | 2014-06-30 | 2014-10-22 | 公安部交通管理科学研究所 | Method for automatic safe exchange of information between physically isolated networks |
CN104363221A (en) * | 2014-11-10 | 2015-02-18 | 青岛微智慧信息有限公司 | Network safety isolation file transmission control method |
CN104580243A (en) * | 2015-01-23 | 2015-04-29 | 中国兵器工业集团第五三研究所 | Device and method for implementing data transmission between physical isolation networks based on hexadecimal codes |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881924A (en) * | 2018-05-23 | 2018-11-23 | 上海昊擎信息技术工程有限公司 | Data transmission set |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112235289B (en) | Data encryption and decryption method and device, computing equipment and storage medium | |
US11296889B2 (en) | Secret sharing via blockchains | |
CN105049425B (en) | A kind of physical isolation transmission method based on Quick Response Code | |
US8813243B2 (en) | Reducing a size of a security-related data object stored on a token | |
EP2147389B1 (en) | Mobile unit parental control | |
CN102710759A (en) | Web server, business logging method and system | |
CN109905227B (en) | System and method for multi-value packing scheme for homomorphic encryption | |
BR112017016047A2 (en) | methods of transmitting a packet and packets containing digital data through a cloud and digital data transmission through a cloud. | |
US20170371625A1 (en) | Content delivery method | |
WO2008016415A1 (en) | Portable personal identity information | |
CN114860735A (en) | Method and device for inquiring hiding trace | |
US7487354B2 (en) | Methods and systems for using digital signatures in uniform resource locators | |
US11121869B1 (en) | Decentralized cryptographic key derivation | |
US8891760B2 (en) | System for checking acceptance of string by automaton | |
US20230370245A1 (en) | Privacy-Preserving Domain Name Services (DNS) | |
CN105468709A (en) | Data inquiry device and data inquiry method based on HBase | |
CN113507483B (en) | Instant messaging method, device, server and storage medium | |
CN114428972A (en) | Privacy protection query method and device supporting outsourcing calculation and related equipment | |
CN108052550B (en) | Annuity data receiving method and device, computer equipment and storage medium | |
CN110662089A (en) | Bullet screen receiving and processing method, storage medium, electronic equipment and system | |
US20160182462A1 (en) | Data view based on context | |
CN107122474A (en) | System document docking technique implementation method under a kind of network physical isolation environment | |
CN110958216B (en) | Secure online network packet transmission | |
US10750033B2 (en) | Electronic package interception, parsing, and routing | |
CN110585727B (en) | Resource acquisition method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170901 |