CN113032354A - Data sharing and real-time high-frequency interaction method between internal and external network applications - Google Patents
Data sharing and real-time high-frequency interaction method between internal and external network applications Download PDFInfo
- Publication number
- CN113032354A CN113032354A CN202110353594.4A CN202110353594A CN113032354A CN 113032354 A CN113032354 A CN 113032354A CN 202110353594 A CN202110353594 A CN 202110353594A CN 113032354 A CN113032354 A CN 113032354A
- Authority
- CN
- China
- Prior art keywords
- data
- sharing
- extranet
- intranet
- real
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 230000003993 interaction Effects 0.000 title claims abstract description 37
- 241000700605 Viruses Species 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 5
- 238000000586 desensitisation Methods 0.000 claims description 5
- 230000001915 proofreading effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 28
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 description 7
- 238000012552 review Methods 0.000 description 7
- 238000007796 conventional method Methods 0.000 description 4
- 238000002955 isolation Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000009385 viral infection Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Abstract
The invention discloses a method for sharing data and performing real-time high-frequency interaction between internal and external network applications, which comprises the following steps: sending first data to an intranet front-end server, and carrying out technical examination on the first data; transmitting the first data to an external network front-end server through a security gateway; and analyzing and checking the first data at the extranet front-end server and sharing the first data to extranet application. Compared with the conventional mode of copying through a mobile hard disk and sharing through a network disk, the efficiency of data sharing can be greatly improved, the flow of data sharing is simplified, the safety of data sharing is improved, the whole process of data sharing is in a safe and controllable state, the data recording can be conveniently traced in the later period, the safety control workload of IT (information technology) personnel can be greatly reduced, and the safety of core digital assets of an enterprise is effectively protected.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a method for sharing data and realizing real-time high-frequency interaction between internal and external network applications.
Background
In order to avoid leakage of core data, internal and external network isolation is implemented in many enterprises, some enterprises even subdivide an internal network into an development network, a production network and an office network, and physical isolation is usually performed between the internal network and the external network, but data sharing interaction is still required to be performed between the internal network and the external network during work, and a plurality of internal and external network data interaction modes of the enterprise are that data copying is performed between the internal network and the external network through a mobile hard disk, and File movement of the internal network and the external network is performed through File Transfer Protocol (FTP) or network sharing, but the data interaction efficiency of the data interaction schemes is low, the risk of data leakage can be increased, and traceability is low after problems occur.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a method for sharing data between internal and external network applications and carrying out real-time high-frequency interaction, which can effectively improve the efficiency of data interaction between the internal and external networks, reduce the risk of data leakage and ensure that the process of data interaction is safer and more controllable.
The invention also provides an internal and external network application data sharing system with the internal and external network application data sharing and real-time high-frequency interaction method.
The invention also provides a computer readable storage medium.
On one hand, the embodiment provides a method for data sharing and real-time high-frequency interaction between intranet and extranet applications, which comprises the following steps:
sending first data to an intranet front-end server, and carrying out technical examination on the first data;
transmitting the first data to an external network front-end server through a security gateway;
and analyzing and checking the first data at the extranet front-end server and sharing the first data to extranet application.
The method for sharing data and realizing real-time high-frequency interaction between the internal network application and the external network application, provided by the embodiment of the invention, at least has the following beneficial effects: usually, physical isolation is carried out between the internal network and the external network, if the internal network of the power system can be an energy supervision network, and the external network can be a public network and is connected with the internet, the first data which needs to be shared by the internal network is processed in the internal network front-end server in the embodiment, the first data is technically examined, the safety and the reliability of the data sharing process between the internal network and the external network can be effectively improved, compared with the conventional data sharing mode of copying through a mobile hard disk, the embodiment can greatly improve the data sharing efficiency, and the data sharing is automatically applied between the internal network and the external network.
According to some embodiments of the invention, after the parsing, checking and sharing the first data to the extranet application, the method comprises the following steps: and archiving and destroying the first data in the extranet front-end server. Because intranet data all have certain confidentiality usually, after using the sharing to the outer net, file and delete the first data in the outer net front-mounted server in time, can effectively promote the security of data sharing process, reduce the risk that data were revealed. The file is automatically filed, reserved and checked, the expired file is automatically cleaned and filed, and file access downloading records and file approval behavior records of designated personnel can be traced.
According to some embodiments of the invention, the technical review of the first data comprises the steps of:
and performing security level query and permission proofreading on the first data. Because data of the intranet usually has certain confidentiality, confidential query needs to be carried out on the first data before data sharing, if non-confidential information exists, the data can be safely shared, and different data sharing authorities can be set for the data with different confidentiality levels so as to flexibly meet different data sharing requirements.
According to some embodiments of the invention, the technical review of the first data comprises the steps of: and performing virus killing and sensitive word checking on the first data. The security of the data sharing process can be effectively improved by performing virus killing on the first data, the possibility of core data leakage can be effectively reduced by performing sensitive word check on the first data, and the security of the data is improved.
According to some embodiments of the invention, the technical review of the first data comprises the steps of: and carrying out data desensitization processing on the first data. When some information of the first data is detected to relate to secret information and data sharing is still needed, desensitization processing is performed on the first data, such as deleting item numbers and item information in the first data, so that the safety of the data can be further improved, the possibility of core data leakage is reduced, and the method has a very good practical value.
According to some embodiments of the invention, after the parsing, checking and sharing the first data to the extranet application, the method comprises the following steps: and generating a data sharing log record to form a data sharing report. The first data are shared between the internal network and the external network to form a complete log record, a shared report is formed according to the complete log record, the whole process of data sharing is safe and controllable, the record of the data can be inquired according to the data shared report under the condition of data leakage, the safety of the data can be effectively improved, the operation record can be audited, the original file can be audited, the creating process, the sending process, the examining and approving process, the access and the downloading of the file packet can be visually embodied in the data shared report, and a quite powerful guarantee is provided for data safety.
In a second aspect, the present embodiment provides a method for sharing data and performing real-time high-frequency interaction between intranet and extranet applications, which is characterized by comprising:
sending second data to an extranet front-end server, and carrying out technical examination on the second data;
transmitting the second data to an intranet front-end server through a security gateway;
and analyzing and checking the second data at the intranet front-end server and sharing the second data to the intranet application.
The method for sharing data and performing real-time high-frequency interaction between the intranet and the extranet application according to the second aspect of the invention has at least the following beneficial effects: the extranet is used and is shared data to the intranet, carry out technical examination in the extranet front-end server, can promote the security in the data transmission process, reduce the possibility because of the second data of extranet carry virus infection intranet file, reduce the risk that intranet data was revealed, transmit to the intranet front-end server through safe gatekeeper again, analyze the sharing to the intranet application after the check-up to the second data, compare in the conventional method of copying data through the mobile hard disk, the data sharing process of this embodiment can promote data sharing's efficiency by a wide margin, data sharing process full automation, the risk of data leakage has been reduced, the ability of system risk retrospection has been improved.
In a third aspect, this embodiment further provides a system for sharing data between an intranet and an extranet application, where the system includes: the data sharing and real-time high-frequency interaction method between the intranet and the extranet applications is characterized in that the processor executes the computer program to realize the data sharing and real-time high-frequency interaction method between the intranet and the extranet applications according to the first aspect and the second aspect.
The data sharing system between the internal network application and the external network application, provided by the embodiment of the invention, has the following beneficial effects: compared with a conventional method for copying data through a mobile hard disk, the data sharing process of the embodiment can greatly improve the data sharing efficiency, is automatic in the whole data sharing process, reduces the risk of data leakage, and improves the system risk tracing capability.
In a fourth aspect, the present embodiment provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions for causing a computer to execute the method for sharing data between intranet and extranet applications and real-time high-frequency interaction according to the first aspect and the second aspect.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which the abstract is to be fully consistent with one of the figures of the specification:
fig. 1 is a flowchart of a method for sharing data and performing real-time high-frequency interaction between intranet and extranet applications according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that although functional block divisions are provided in the system drawings and logical orders are shown in the flowcharts, in some cases, the steps shown and described may be performed in different orders than the block divisions in the systems or in the flowcharts. The terms first, second and the like in the description and in the claims, and the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Compared with the conventional method for copying data through a mobile hard disk, the method for sharing data between the internal network application and the external network application and the real-time high-frequency interaction greatly improves the data sharing efficiency, is automatic in the whole data sharing process, reduces the risk of data leakage, and improves the capability of system risk tracing.
The embodiments of the present invention will be further explained with reference to the drawings.
Referring to fig. 1, fig. 1 is a flowchart of a method for sharing data and interacting with real-time high frequency between intranet and extranet applications according to an embodiment of the present invention, where the method for sharing data and interacting with real-time high frequency between intranet and extranet applications includes, but is not limited to, steps S110 to S130.
Step S110, sending first data to an intranet front-end server, and carrying out technical examination on the first data;
step S120, transmitting the first data to an extranet front-end server through a security gateway;
and step S130, the extranet front-end server analyzes and verifies the first data and shares the first data to the extranet application.
In one embodiment, the intranet application sends first data to the intranet front-end server, the first data may be data to be synchronized to the extranet application, the intranet front-end server performs technical review on the first data, which may be security and authority information for reviewing the first data, the first data is transmitted to the extranet front-end server through a security gateway after the review is completed, the security gateway is a device disposed between networks with different security levels and can perform security isolation on the intranet and the extranet, of course, the intranet may be divided into an development network, a production network and a management network, the security gateway may be disposed between the intranet and the extranet, controllable data exchange may be performed between the intranet and the extranet through the security gateway, the first data is analyzed and verified after the first data is transmitted to the extranet server, the first data may be encrypted and edited by the intranet front-end server, the first data are shared to the external network application, and external personnel cannot acquire useful information in the encrypted and edited data without a specific analysis method, so that the security of data sharing can be further improved. Compared with the conventional mode of copying through a mobile hard disk and sharing through a network disk, the data sharing efficiency can be greatly improved, the data sharing process is simplified, the data sharing safety is improved, the whole data sharing process is in a safe and controllable state, the data recording can be conveniently traced in the later period, the IT personnel safety management and control workload can be greatly reduced, and the core digital asset safety of an enterprise can be effectively protected.
It should be noted that after the first data is technically examined, an approval process may be further provided, for example, some data does not have a sharing right under a preset rule, but needs to be shared to an extranet application, and may still be shared to an external application after being manually approved, of course, an approval log may be generated in the approval process, and the system may record information of the approved file, time, file security level, right, and the like.
In one embodiment, after the first data is analyzed, checked and shared to the extranet application, the method includes the following steps: and archiving and destroying the first data in the extranet front-end server. Because intranet data all have certain confidentiality usually, after using the sharing to the outer net, file and delete the first data in the outer net front-mounted server in time, can effectively promote the security of data sharing process, reduce the risk that data were revealed. The file is automatically filed, reserved and checked, the expired file is automatically cleaned and filed, and file access downloading records and file approval behavior records of designated personnel can be traced.
In one embodiment, the technical review of the first data includes performing a security query and a rights check on the first data. The core data of the intranet can relate to business secrets or national secrets, special attention is needed to be paid to data needing to be synchronized to the extranet, the possibility of core data leakage is reduced, secret level query and permission proofreading can be conducted on the first data before data sharing, different permissions can be set according to different external applications, the external applications can only synchronize data within the permissions, the data can be flexibly synchronized according to different requirements, when the information relates to the business secrets or the national secrets, manual approval or intelligent approval steps can be set according to the requirements, and approval contents are recorded in an approval log. Compared with the conventional method for synchronizing data through a network disk, the data synchronization method is more flexible and controllable, can meet the requirement of high-frequency interaction, can transmit large-capacity files, is stable in transmission effect and safe, can trace the original files of the shared data according to the synchronization logs, can reduce the risk of core data leakage, and has very good practical value.
In an embodiment, the first data is subjected to technical examination, the first data is subjected to virus killing and sensitive word examination, the security of the first data in the data sharing process can be effectively improved by performing virus killing on the first data, the possibility of core data leakage can be effectively reduced by performing sensitive word examination on the first data, and the security of the data is improved. The first data are shared by the intranet application and the extranet application, viruses need to be searched and killed in time by the intranet front-end server, the intranet can be an energy safety management network of the power system, the power transmission is performed with a vital function, the risk that the viruses infect the whole power system can be effectively reduced by searching and killing the viruses on the first data, and the safety of the data sharing process is improved. The risk of disclosure can be effectively reduced by carrying out sensitive word check on the first data, common sensitive words can be item names, item amounts, item codes, supplier names and the like, the sensitive words are detected and replaced or deleted before transmission, the risk of core data disclosure can be reduced, and the whole data sharing process is safer and more reliable.
In one embodiment, the technical review of the first data includes the steps of: data desensitization processing is performed on the first data. When some information of the first data is detected to relate to secret information and data sharing is still needed, desensitization processing is performed on the first data, such as deleting item numbers and item information in the first data, so that the safety of the data can be further improved, the possibility of core data leakage is reduced, and the method has a very good practical value.
In one embodiment, after the first data is analyzed, checked and shared to the extranet application, the method includes the following steps: and generating a data sharing log record to form a data sharing report. The first data are shared between the internal network and the external network to form a complete log record, a shared report is formed according to the complete log record, the whole process of data sharing is safe and controllable, the record of the data can be inquired according to the data shared report under the condition of data leakage, the safety of the data can be effectively improved, the operation record can be audited, the original file can be audited, the creating process, the sending process, the examining and approving process, the access and the downloading of the file packet can be visually embodied in the data shared report, and a quite powerful guarantee is provided for data safety. And the encryption processing in the transmission process improves the data security and integrity in the data exchange process, has strong capability of resisting external attack and good reliability, and meets the requirements of equal security and industry specifications by adopting a front-end processor scheme.
The invention also provides a method for sharing data between the internal network application and the external network application and a real-time high-frequency interaction method, the external network application shares data to the internal network, technical examination is carried out in the external network front-end server, the safety in the data transmission process can be improved, the possibility that the internal network file is infected by viruses carried by second data of the external network is reduced, the risk of internal network data leakage is reduced, the second data is transmitted to the internal network front-end server through the safety network gate, and the second data is shared to the internal network application after analysis and verification. The method for sharing data to the external network application by combining the internal network application can realize mutual data sharing between the internal network and the external network, can effectively improve the data interaction efficiency between the internal network and the external network, enables the whole data sharing process to be in a safe and reliable state, reduces the risk of core data leakage, and has substantial advantages.
The invention also provides a system for sharing data between the internal network application and the external network application and real-time high-frequency interaction, a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor executes the computer program to realize the method for sharing data between the internal network application and the external network application and the real-time high-frequency interaction in the first aspect and the second aspect. The data sharing and real-time high-frequency interaction system between the internal network application and the external network application can simultaneously support different business modes and safety requirements of multiple departments, support people-to-people, server-to-server, manual operation and automatic triggering, and flexibly combine the data exchange modes between networks.
Furthermore, an embodiment of the present invention also provides a computer-readable storage medium storing computer-executable instructions, which are executed by one or more control processors, for example, by one of the control processors, and are capable of performing the method for data sharing and real-time high-frequency interaction between intranet and extranet applications as shown in steps S110 to S130.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the foregoing and various other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention.
Claims (9)
1. A method for sharing data and realizing real-time high-frequency interaction between internal and external network applications is characterized by comprising the following steps:
sending first data to an intranet front-end server, and carrying out technical examination on the first data;
transmitting the first data to an external network front-end server through a security gateway;
and analyzing and checking the first data at the extranet front-end server and sharing the first data to extranet application.
2. The method for sharing data and real-time high-frequency interaction between intranet and extranet applications according to claim 1, wherein after the parsing, checking and sharing the first data to the extranet application, the method comprises the following steps:
and archiving and destroying the first data in the extranet front-end server.
3. The method for data sharing and real-time high-frequency interaction between intranet and extranet applications according to claim 1, wherein the technical examination of the first data comprises the steps of:
and performing security level query and permission proofreading on the first data.
4. The method for data sharing and real-time high-frequency interaction between intranet and extranet applications according to claim 1, wherein the technical examination of the first data comprises the steps of:
and performing virus killing and sensitive word checking on the first data.
5. The method for data sharing and real-time high-frequency interaction between intranet and extranet applications according to claim 1, wherein the technical examination of the first data comprises the steps of:
and carrying out data desensitization processing on the first data.
6. The method for sharing data and real-time high-frequency interaction between intranet and extranet applications according to claim 1, wherein after the parsing, checking and sharing the first data to the extranet application, the method comprises the following steps:
and generating a data sharing log record to form a data sharing report.
7. A method for sharing data and realizing real-time high-frequency interaction between internal and external network applications is characterized by comprising the following steps:
sending second data to an extranet front-end server, and carrying out technical examination on the second data;
transmitting the second data to an intranet front-end server through a security gateway;
and analyzing and checking the second data at the intranet front-end server and sharing the second data to the intranet application.
8. A system for sharing data between intranet and extranet applications, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the method for data sharing and real-time high frequency interaction between intranet and extranet applications according to any one of claims 1 to 7 when executing the computer program.
9. A computer-readable storage medium storing computer-executable instructions for causing a computer to perform the method for data sharing and real-time high-frequency interaction between intranet and extranet applications according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110353594.4A CN113032354A (en) | 2021-03-31 | 2021-03-31 | Data sharing and real-time high-frequency interaction method between internal and external network applications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110353594.4A CN113032354A (en) | 2021-03-31 | 2021-03-31 | Data sharing and real-time high-frequency interaction method between internal and external network applications |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113032354A true CN113032354A (en) | 2021-06-25 |
Family
ID=76453630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110353594.4A Pending CN113032354A (en) | 2021-03-31 | 2021-03-31 | Data sharing and real-time high-frequency interaction method between internal and external network applications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113032354A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113988025A (en) * | 2021-12-28 | 2022-01-28 | 天津联想协同科技有限公司 | Method, device and system for sending, transmitting and receiving cooperative processing document |
CN114417390A (en) * | 2022-03-30 | 2022-04-29 | 天津联想协同科技有限公司 | Method and device for synchronizing data of network disk organization account, network disk and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209801A (en) * | 2016-06-28 | 2016-12-07 | 广东电网有限责任公司信息中心 | Mobile solution platform and inner-external network data safety switching plane integrated system |
CN107846405A (en) * | 2017-10-31 | 2018-03-27 | 北京百悟科技有限公司 | The control system and implementation method that intranet and extranet file is exchanged visits |
CN109150702A (en) * | 2018-08-16 | 2019-01-04 | 南京南瑞信息通信科技有限公司 | A kind of the high-performance mobile access gateway and its method of communication information intranet and extranet |
CN109818956A (en) * | 2019-01-22 | 2019-05-28 | 武汉光谷信息技术股份有限公司 | A kind of intranet and extranet data-sharing systems and method |
CN109977170A (en) * | 2019-03-20 | 2019-07-05 | 南威软件股份有限公司 | The synchronous method and system of network data inside and outside a kind of government affairs |
CN110572373A (en) * | 2019-08-20 | 2019-12-13 | 北京安盟信息技术股份有限公司 | Data exchange platform and file data stream processing method |
CN112073442A (en) * | 2020-11-11 | 2020-12-11 | 杭州云嘉云计算有限公司 | Data transmission method and monitoring system based on double one-way protocol mutual conversion channel |
-
2021
- 2021-03-31 CN CN202110353594.4A patent/CN113032354A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209801A (en) * | 2016-06-28 | 2016-12-07 | 广东电网有限责任公司信息中心 | Mobile solution platform and inner-external network data safety switching plane integrated system |
CN107846405A (en) * | 2017-10-31 | 2018-03-27 | 北京百悟科技有限公司 | The control system and implementation method that intranet and extranet file is exchanged visits |
CN109150702A (en) * | 2018-08-16 | 2019-01-04 | 南京南瑞信息通信科技有限公司 | A kind of the high-performance mobile access gateway and its method of communication information intranet and extranet |
CN109818956A (en) * | 2019-01-22 | 2019-05-28 | 武汉光谷信息技术股份有限公司 | A kind of intranet and extranet data-sharing systems and method |
CN109977170A (en) * | 2019-03-20 | 2019-07-05 | 南威软件股份有限公司 | The synchronous method and system of network data inside and outside a kind of government affairs |
CN110572373A (en) * | 2019-08-20 | 2019-12-13 | 北京安盟信息技术股份有限公司 | Data exchange platform and file data stream processing method |
CN112073442A (en) * | 2020-11-11 | 2020-12-11 | 杭州云嘉云计算有限公司 | Data transmission method and monitoring system based on double one-way protocol mutual conversion channel |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113988025A (en) * | 2021-12-28 | 2022-01-28 | 天津联想协同科技有限公司 | Method, device and system for sending, transmitting and receiving cooperative processing document |
CN114417390A (en) * | 2022-03-30 | 2022-04-29 | 天津联想协同科技有限公司 | Method and device for synchronizing data of network disk organization account, network disk and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10972492B2 (en) | Systems, methods, and computer-readable media for data security | |
US20230269255A1 (en) | Method and System for Forensic Data Tracking | |
US10154066B1 (en) | Context-aware compromise assessment | |
US11372994B2 (en) | Security application for data security formatting, tagging and control | |
US9027123B2 (en) | Data dependence analyzer, information processor, data dependence analysis method and program | |
CN103413088A (en) | Computer document operational safety audit system | |
CN111030963B (en) | Document tracking method, gateway equipment and server | |
CN113032354A (en) | Data sharing and real-time high-frequency interaction method between internal and external network applications | |
CN108390857B (en) | Method and device for exporting file from high-sensitivity network to low-sensitivity network | |
CN204680024U (en) | Computer security based on dynamic human face recognition technology is taken precautions against and early warning system | |
CN114218194A (en) | Data bank safety system | |
Staves et al. | An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments | |
CN116582365B (en) | Network traffic safety control method and device and computer equipment | |
Cha et al. | A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2 | |
Fehér et al. | Log file authentication and storage on blockchain network | |
CN101408919A (en) | Method and system for monitoring computer espionage behavior | |
CN111414340A (en) | File sharing method and device, computer equipment and storage medium | |
US20220150241A1 (en) | Permissions for backup-related operations | |
Kent et al. | Sp 800-92. guide to computer security log management | |
KR102192232B1 (en) | System for providing verification and guide line of cyber security based on block chain | |
Lei et al. | Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. | |
CN108134781B (en) | Important information data secrecy monitoring system | |
Ard et al. | Information behaving badly | |
Karlzén | An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis | |
CN116910784B (en) | Device, method and system for data availability and non-rotatable secure sharing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |