CN113094438B - Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology - Google Patents

Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology Download PDF

Info

Publication number
CN113094438B
CN113094438B CN202110417118.4A CN202110417118A CN113094438B CN 113094438 B CN113094438 B CN 113094438B CN 202110417118 A CN202110417118 A CN 202110417118A CN 113094438 B CN113094438 B CN 113094438B
Authority
CN
China
Prior art keywords
data
dimensional code
character string
warehousing
external network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110417118.4A
Other languages
Chinese (zh)
Other versions
CN113094438A (en
Inventor
李晓东
徐天元
李雨桐
袁娇
谭深秋
姜延斌
姜鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang Zhanwei Power Technology Co ltd
Original Assignee
Shenyang Zhanwei Power Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Zhanwei Power Technology Co ltd filed Critical Shenyang Zhanwei Power Technology Co ltd
Priority to CN202110417118.4A priority Critical patent/CN113094438B/en
Publication of CN113094438A publication Critical patent/CN113094438A/en
Application granted granted Critical
Publication of CN113094438B publication Critical patent/CN113094438B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)
  • Character Discrimination (AREA)

Abstract

An internal and external network data isolation and transmission method based on a two-dimensional code image recognition technology belongs to the technical field of data real-time transmission based on the two-dimensional code image recognition technology in an internal and external network data isolation environment, and particularly relates to an internal and external network data isolation and transmission method based on the two-dimensional code image recognition technology. The invention provides an internal and external network data isolation and transmission method based on a two-dimensional code image recognition technology. The invention comprises an intranet two-dimensional code data synchronization program and an extranet two-dimensional code data synchronization program, and is characterized in that the intranet two-dimensional code data synchronization program comprises a data extraction program, and the data extraction process of the data extraction program is as follows: and acquiring incremental data from a database, generating an original character string by each record of the incremental data, compressing the original character string to form a compressed character string, encrypting the data, and finally generating a two-dimensional code, wherein a unique code of the data is generated when the two-dimensional code is generated.

Description

Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology
Technical Field
The invention belongs to the technical field of data real-time transmission based on a two-dimensional code image recognition technology in an internal and external network data isolation environment, and particularly relates to an internal and external network data isolation and transmission method based on the two-dimensional code image recognition technology.
Background
At present, enterprises and public institutions such as government departments, electric power departments and the like can form a plurality of physical network environments due to safety guarantee, business requirements and the like, and logical isolation or physical isolation can be formed among the physical network environments, so that the method is not friendly to data cross-network transmission, and particularly physical isolation. However, in the real service demand, a service system always needs data in a plurality of network environments, so that the demand of transmitting data across networks can be formed, a logically isolated network can be performed in a form of a network gate and the like, and a physically isolated network can be performed only in a purely manual mode such as a disc carving mode in the past, so that a great deal of manual participation is needed, a great deal of physical cost is wasted, the real-time performance is poor, and the demand of the service system cannot be guaranteed. How to ensure network security and rapidly, real-time and stably transmit data to meet business requirements under the condition of not damaging the prior network strategy between network environments which are completely physically isolated is a difficult problem in the industry.
Disclosure of Invention
The invention aims at the problems and provides an internal and external network data isolation and transmission method based on a two-dimensional code image recognition technology.
In order to achieve the above purpose, the invention adopts the following technical scheme that the method comprises an intranet two-dimension code data synchronization program and an extranet two-dimension code data synchronization program, and is characterized in that the intranet two-dimension code data synchronization program comprises a data extraction program, and the data extraction process of the data extraction program is as follows: acquiring incremental data from a database, recording each item of the incremental data to generate an original character string, compressing the original character string to form a compressed character string, encrypting the data, and finally generating a two-dimensional code, wherein a unique code of the data is generated when the two-dimensional code is generated;
the external network two-dimension code data synchronization program comprises a data warehousing program, wherein the data warehousing program captures two-dimension code pictures of an internal network, corrects and processes the two-dimension code pictures, analyzes the two-dimension code pictures, decrypts character strings after analysis, performs data warehousing, generates two-dimension codes from the warehousing state after the warehousing is completed, displays the two-dimension codes, and waits for the data extraction program of the internal network to scan;
the state synchronization process in the intranet data extraction program scans the two-dimensional code of the extranet, analyzes the data warehouse-in state contained in the two-dimensional code after the scanning is successful, informs a data circulation task of the warehouse-in state, acquires incremental data again when the data synchronization state is warehouse-in success, and starts the next circulation; and refreshing the two-dimensional code again when the data state is the warehouse entry failure, and carrying out data synchronization again on the data record.
As a preferable scheme, when the compressed character string is still larger than a set value, splitting the character string, encrypting data after splitting, finally generating a two-dimensional code, generating a unique code of the data when generating the two-dimensional code, and adding a sub-packaging serial number.
As another preferable scheme, the intranet two-dimensional code data synchronization program comprises the following steps:
1) Incremental data acquisition: acquiring a certain amount (such as 5-10 pieces) of incremental data according to the warehousing time, the self-increment ID and the database log information of the service table, and generating json character strings from the data;
2) Data compression: compressing the generated character string through gzip;
3) Splitting the two-dimensional code when the increment data acquired in a single time exceeds a character set value after being compressed, forming a packet by the characters of each character set value, and generating a serial number for each packet;
4) Data encryption: encrypting the data by Base 64;
5) Generating a two-dimensional code, namely adding a unique ID with a certain length into an encrypted character string, splitting the same piece of data, and then marking by adding a serial number, wherein the character string is changed into: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
As another preferable scheme, the 3) data splitting method comprises the steps of splitting the two-dimensional code when the increment data acquired in a single time exceeds 220 characters after being compressed, forming a packet for each 220 characters, and generating a serial number for each packet.
As another preferable scheme, the invention 5) generates the two-dimensional code, namely adding the unique ID with the length of 20 to the encrypted character string, splitting the same piece of data, and identifying by adding a serial number, so that the data warehouse-in program of an external network is convenient to splice, and the character string becomes: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
As another preferred scheme, the data warehousing program of the invention scans the display of the intranet through connecting an external high-fidelity camera, captures a two-dimension code picture of the intranet, corrects and processes the two-dimension code, analyzes the two-dimension code picture, decrypts the character string after analysis, judges whether the original character is split according to the serial number after decryption, combines the data into complete data if the split character needs to be combined into the complete data, performs warehousing, generates the two-dimension code from the warehousing state after the warehousing is completed, displays the two-dimension code on the display of the external network, and waits for the data extraction program of the intranet to scan.
As another preferable scheme, the two-dimensional code data synchronization program of the external network of the present invention includes the following steps: 1) The camera focuses, namely calling an interface of the camera to enable the camera to focus the intranet display;
2) Capturing a two-dimensional code: after focusing, scanning the intranet display once at regular intervals to obtain a two-dimensional code displayed on the intranet display;
3) Image gray scale processing: the brightness of three components in the color image is used as the gray value of three gray images, the image is processed into a three-component gray image with R=G=B through graying treatment, the interference of color and partial dry points is removed, and the preparation is made for the next image processing;
4) Image binarization processing: the gray level image is quickly converted into a binary image with only black (front Jing Erwei code matrix dots) and white (background part) distribution through a Kittler algorithm;
5) Two-dimensional code identification: after gray level and binarization processing, identifying information carried in the two-dimensional code, wherein part of conditions cannot be identified, driving the camera again to focus, capturing the two-dimensional code again, and repeating the steps to obtain a clearer two-dimensional code picture;
6) Decrypting data: firstly decrypting the character string identified by the two-dimensional code by using a Base64 algorithm, and restoring the character string to an unpressurized state;
7) Data decompression: decompressing the uncompressed character strings through the GZIp, and storing the decompressed character strings in a local cache database;
8) Data assembly: re-splicing the split character strings into a complete character string through the ID+serial numbers, and taking the character anti-sequence as an object;
9) And (3) data storage: warehousing the generated object, and recording the successful and failed state of warehousing;
10 Generating a two-dimensional code: and generating a two-dimensional code according to the data storage state, namely the ID, the serial number and the state, displaying the two-dimensional code on an external network display, and waiting for scanning by an internal network camera.
Secondly, the invention is characterized in that 2) capturing two-dimension codes: after focusing, the camera scans the intranet display once every 100 milliseconds to obtain the two-dimensional code displayed on the intranet display.
In addition, the state synchronization process in the intranet data extraction program of the invention scans the two-dimension code of the external network through the high-security camera of the intranet, analyzes the synchronization state of the data after the scanning is successful, informs the data circulation task of the synchronization state, acquires the increment data again when the data synchronization state is successful in warehousing, refreshes the two-dimension code again when the data state is failed in warehousing, and continues to synchronize the data.
The invention has the beneficial effects that.
The invention adopts the internal and external network data isolation and transmission method based on the two-dimension code image recognition technology to convert the data into the two-dimension code, thereby realizing the data transmission in the network environment crossing physical isolation, ensuring the data security and the data effective transmission, not needing to modify any security policy of the original network, and saving a great deal of manpower and physical cost.
The invention adopts the two-dimensional code to carry out data transmission, fully utilizes the characteristics of fault tolerance, encryption, strong error correction capability, spaced transmission and the like of the two-dimensional code, and realizes the data transmission of physical isolation in the true sense.
The invention improves the transmission data quantity through data compression.
According to the method, the data synchronization state and the warehousing condition are fed back through two-dimensional code image recognition, and the abnormal data are secondarily synchronized, so that the data synchronization accuracy is ensured.
Drawings
The invention is further described below with reference to the drawings and the detailed description. The scope of the present invention is not limited to the following description.
FIG. 1 is a flow chart of the process of the present invention.
Fig. 2 is a deployment diagram of the present invention.
Detailed Description
As shown in the figure, the method mainly comprises an intranet two-dimensional code data synchronization program and an extranet two-dimensional code data synchronization program. The data synchronization process is as follows, taking the synchronization of intranet data to an internet scene as an example:
the data extraction process of the data extraction program of the intranet is responsible for acquiring incremental data from a database, generating each record of the incremental data into an original character string, compressing the original character string to form a compressed character string for improving data transmission efficiency, and disassembling the compressed character string for ensuring the recognition rate of the external network when the length of each record of the data is inconsistent and the compressed character string is still possibly larger than a set value (220 bytes), encrypting the data after the disassembly to avoid data leakage, generating a two-dimensional code finally, generating a unique code of the data when the two-dimensional code is generated, and disassembling the process, wherein the steps are 5:
"1.1 incremental data acquisition": acquiring a certain amount of incremental data according to the information such as the warehousing time, the self-increment ID, the database log and the like of the service table, and generating json character strings from the data;
"1.2 data compression": the generated character strings are compressed through gzip, so that the character length can be saved by 80%;
1.3 data splitting, namely splitting the two-dimensional code into a packet every 220 characters when the increment data acquired at a time is longer and exceeds 220 characters after compression, and generating a serial number for each packet as the number of the two-dimensional code carried is increased;
"1.4 data encryption": because intranet data often has the sensitivity of different programs, in order to prevent the data from being divulged, the data is encrypted through Base 64;
1.5 generating a two-dimensional code, namely adding a unique ID with the length of 20 to an encrypted character string, splitting the same piece of data, and identifying by adding a serial number, so that the data storage program of an external network is convenient to splice, and the character string becomes: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
The data extraction process is to poll the incremental data of each service table, the process not only ensures the quantity of one-time transmission, but also facilitates the analysis data which can be quickly prepared by the data warehouse-in program of the external network, and the character strings are unpacked according to 220 bytes, so that the recognition rate of the two-dimensional code is greatly improved after unpacking.
The data extraction process uses data compression to improve the data transmission efficiency; the number and the size of matrix points of the two-dimensional code are controlled through unpacking, so that the recognition rate of the two-dimensional code is improved; through the data encryption technology, the safety and reliability of data transmission are guaranteed, and the efficiency and the subsequent recognition rate of the data extraction process are guaranteed.
The data warehousing program of the external network scans a display of the internal network through connecting an external high-fidelity camera, captures a two-dimensional code picture of the internal network, corrects and processes the two-dimensional code, analyzes the two-dimensional code picture, greatly improves the analysis success rate of the two-dimensional code, decrypts the character string after analysis, judges whether the original character is split after decryption, combines the data into complete data if the split character needs to be subjected to data combination, and then performs warehousing, generates the two-dimensional code from the warehousing state after the warehousing is completed, displays the two-dimensional code on the display of the external network, and waits for the scanning of the data extraction program of the internal network. The process specifically comprises the following 10 steps:
2.1 camera focusing, calling an interface of the camera to enable the camera to focus on an intranet display;
"2.2 capture two-dimensional code": after focusing the camera, scanning the intranet display once every 100 milliseconds to obtain a two-dimensional code displayed on the intranet display;
"2.3 image gradation processing": the brightness of three components in the color image is used as the gray value of three gray images, the image is processed into a three-component gray image with R=G=B through graying treatment, the interference of color and partial dry points is removed, and the preparation is made for the next image processing; the two-dimensional code analysis efficiency and success rate are improved;
"2.4 image binarization processing": the gray level image is quickly converted into a binary image with only black (front Jing Erwei code matrix dots) and white (background parts) distribution through a Kittler algorithm, so that the definition, the boundary definition and the feature definition of the two-dimensional code image are improved, and the interference item is effectively removed;
"2.5 two-dimensional code identification": after gray level and binarization processing, rapidly identifying information carried in the two-dimensional code, wherein the character string obtained at the moment is a character string after 1.4 data encryption; part of conditions cannot be identified, then the camera is driven again to focus, the two-dimensional code is captured again, and the steps are repeated to obtain a clearer two-dimensional code picture;
"2.6 data decryption": firstly decrypting the character string identified by the two-dimensional code by using a Base64 algorithm, and restoring the character string to an unpressurized state;
"2.7 data decompression": decompressing the uncompressed character strings through the GZIp, and storing the decompressed character strings in a local cache database;
"2.8 data assembly": re-splicing the split character strings into a complete character string through the ID+serial numbers, and taking the character anti-sequence as an object;
"2.9 data binning": warehousing the generated object, and recording the successful and failed state of warehousing;
"2.10 generates two-dimensional code": and generating a two-dimensional code according to the data storage state, namely the ID, the serial number and the state, displaying the two-dimensional code on an external network display, and waiting for scanning by an internal network camera.
The method is characterized in that in the data warehouse-in process, the image capturing capacity of the external network camera is called, the focusing capacity of the camera is utilized to acquire a clearer intranet two-dimension code image as far as possible, the scanned image is processed, interference points are reduced through gray processing, the display effect of the two-dimension code is enhanced through binarization, and the two-dimension code image is rapidly identified.
The image processing technology is applied in the data warehouse-in process, so that the two-dimensional code recognition rate is improved; the two ends of physical isolation can be mutually perceived through the data synchronization state, so that the loss of data is avoided.
The method comprises the steps that a 'state synchronization process' in an intranet 'data extraction program' scans a two-dimensional code of an external network through a high-security camera of the intranet, after scanning is successful, the synchronization state of data is analyzed, a 'data circulation task' is informed of the synchronization state, incremental data can be acquired again when the data synchronization state is successful in warehousing, the two-dimensional code can be refreshed again when the data state is failed in warehousing, and data synchronization is continued on the data record.
The complete warehousing process of one piece of data is formed by sequentially executing the data extraction process, the data warehousing process, the state synchronization process, and the cyclic process can continuously synchronize the business data of the intranet to the business database of the external network by repeating the above 3 processes.
The data volume of a single data transmission may be configured via a configuration file to optimize the efficiency of the data transmission.
As shown in fig. 2, in combination with the deployment diagram, the intranet implementation deployment includes an intranet server, a display, an extranet two-dimension code camera, and an intranet two-dimension code data synchronization program. The external network implementation and deployment comprises an external network server, a display, an internal network two-dimension code camera and an external network two-dimension code data synchronization program.
And under the condition that the intranet data are synchronized to the Internet, the extranet two-dimensional code camera is connected with the extranet server and is used for identifying the two-dimensional code image generated by the two-dimensional code data synchronization program in the intranet server, and finally, the real-time synchronization of the intranet data and the extranet data is realized. The intranet two-dimensional code camera is connected with the intranet server and is used for identifying a two-dimensional code image fed back by a data synchronization condition generated by a two-dimensional code data synchronization program in the outer network server and verifying whether data synchronization is successful in warehousing.
The data is analyzed by a group of external high-fidelity cameras, the two-dimension codes are captured, the synchronous state is analyzed by the two-dimension codes, and the technical scheme of no manual participation is adopted, so that the real-time data transmission under the network environment of cross physical isolation can be realized, the data security is ensured, the real-time and effective data transmission is ensured, any security policy of the original network is not required to be modified, and a large amount of manpower and physical cost can be saved.
It should be understood that the foregoing detailed description of the present invention is provided for illustration only and is not limited to the technical solutions described in the embodiments of the present invention, and those skilled in the art should understand that the present invention may be modified or substituted for the same technical effects; as long as the use requirement is met, the invention is within the protection scope of the invention.

Claims (9)

1. The internal and external network data isolation and transmission method based on the two-dimension code image recognition technology comprises an internal network two-dimension code data synchronization program and an external network two-dimension code data synchronization program, and is characterized in that the internal network two-dimension code data synchronization program comprises a data extraction program, and the data extraction process of the data extraction program is as follows: acquiring incremental data from a database, recording each item of the incremental data to generate an original character string, compressing the original character string to form a compressed character string, encrypting the data, and finally generating a two-dimensional code, wherein a unique code of the data is generated when the two-dimensional code is generated;
the external network two-dimension code data synchronization program comprises a data warehousing program, wherein the data warehousing program captures two-dimension code pictures of an internal network, corrects and processes the two-dimension code pictures, analyzes the two-dimension code pictures, decrypts character strings after analysis, performs data warehousing, generates two-dimension codes from the warehousing state after the warehousing is completed, displays the two-dimension codes, and waits for the data extraction program of the internal network to scan;
the state synchronization process in the intranet data extraction program scans the two-dimensional code of the extranet, analyzes the data warehouse-in state contained in the two-dimensional code after the scanning is successful, informs a data circulation task of the warehouse-in state, acquires incremental data again when the data synchronization state is warehouse-in success, and starts the next circulation; and refreshing the two-dimensional code again when the data state is the warehouse entry failure, and carrying out data synchronization again on the data record.
2. The method for isolating and transmitting the internal and external network data based on the two-dimensional code image recognition technology according to claim 1, wherein if the compressed character string is still larger than a set value, splitting the character string, encrypting the data after splitting, generating a two-dimensional code, generating a unique code of the data when generating the two-dimensional code, and adding a sub-packet serial number.
3. The method for isolating and transmitting the intranet and extranet data based on the two-dimension code image recognition technology as claimed in claim 1, wherein the intranet two-dimension code data synchronization program comprises the following steps:
1) Incremental data acquisition: acquiring a certain amount (such as 5-10 pieces) of incremental data according to the warehousing time, the self-increment ID and the database log information of the service table, and generating json character strings from the data;
2) Data compression: compressing the generated character string through gzip;
3) Splitting the two-dimensional code when the increment data acquired in a single time exceeds a character set value after being compressed, forming a packet by the characters of each character set value, and generating a serial number for each packet;
4) Data encryption: encrypting the data by Base 64;
5) Generating a two-dimensional code, namely adding a unique ID with a certain length into an encrypted character string, splitting the same piece of data, and then marking by adding a serial number, wherein the character string is changed into: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
4. The method for isolating and transmitting the internal and external network data based on the two-dimensional code image recognition technology according to claim 3 is characterized in that 3) the data is split, when the increment data acquired at a time is compressed to be more than 220 characters, the two-dimensional code is split, each 220 characters are formed into a packet, and a serial number is generated for each packet.
5. The method for isolating and transmitting data of an internal network and an external network based on the two-dimensional code image recognition technology according to claim 3, wherein the 5) two-dimensional code generation is characterized in that an encrypted character string is added with a unique ID with the length of 20, after the same piece of data is split, the same piece of data is identified by adding a serial number, so that an 'data warehouse-in program' of an external network is convenient to splice, and the character string becomes: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
6. The method for isolating and transmitting the data of the internal and external networks based on the two-dimensional code image recognition technology according to claim 1, wherein the data warehousing program scans a display of the internal network through connecting an external high-fidelity camera, captures a two-dimensional code picture of the internal network, corrects and processes the two-dimensional code, analyzes the two-dimensional code picture, decrypts a character string after analysis, judges whether an original character is split according to a serial number after decryption, if the original character is split, needs to be subjected to data combination, is subjected to warehousing after being combined into complete data, generates the two-dimensional code in a warehousing state after the warehousing is completed, displays the two-dimensional code on the display of the external network, and waits for the data extraction program of the internal network to scan.
7. The method for isolating and transmitting the data of the internal and external networks based on the two-dimensional code image recognition technology as claimed in claim 1, wherein the external network two-dimensional code data synchronization program comprises the following steps: 1) The camera focuses, namely calling an interface of the camera to enable the camera to focus the intranet display;
2) Capturing a two-dimensional code: after focusing, scanning the intranet display once at regular intervals to obtain a two-dimensional code displayed on the intranet display;
3) Image gray scale processing: the brightness of three components in the color image is used as the gray value of three gray images, the image is processed into a three-component gray image with R=G=B through graying treatment, the interference of color and partial dry points is removed, and the preparation is made for the next image processing;
4) Image binarization processing: the gray level image is quickly converted into a binary image with only black (front Jing Erwei code matrix dots) and white (background part) distribution through a Kittler algorithm;
5) Two-dimensional code identification: after gray level and binarization processing, identifying information carried in the two-dimensional code, wherein part of conditions cannot be identified, driving the camera again to focus, capturing the two-dimensional code again, and repeating the steps to obtain a clearer two-dimensional code picture;
6) Decrypting data: firstly decrypting the character string identified by the two-dimensional code by using a Base64 algorithm, and restoring the character string to an unpressurized state;
7) Data decompression: decompressing the uncompressed character strings through the GZIp, and storing the decompressed character strings in a local cache database;
8) Data assembly: re-splicing the split character strings into a complete character string through the ID+serial numbers, and taking the character anti-sequence as an object;
9) And (3) data storage: warehousing the generated object, and recording the successful and failed state of warehousing;
10 Generating a two-dimensional code: and generating a two-dimensional code according to the data storage state, namely the ID, the serial number and the state, displaying the two-dimensional code on an external network display, and waiting for scanning by an internal network camera.
8. The method for isolating and transmitting data between internal and external networks based on two-dimensional code image recognition technology according to claim 7, wherein the 2) capturing two-dimensional code: after focusing, the camera scans the intranet display once every 100 milliseconds to obtain the two-dimensional code displayed on the intranet display.
9. The method for isolating and transmitting the data of the internal and external networks based on the two-dimension code image recognition technology according to claim 1, wherein the state synchronization process in the internal network data extraction program is characterized in that a high-security camera of the internal network scans the two-dimension code of the external network, after the scanning is successful, the synchronization state of the data is analyzed, the data circulation task is notified of the synchronization state, when the data synchronization state is successful in warehousing, the incremental data is acquired again, when the data state is failed in warehousing, the two-dimension code is refreshed again, and the data synchronization is continued for the data record.
CN202110417118.4A 2021-04-19 2021-04-19 Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology Active CN113094438B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110417118.4A CN113094438B (en) 2021-04-19 2021-04-19 Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110417118.4A CN113094438B (en) 2021-04-19 2021-04-19 Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology

Publications (2)

Publication Number Publication Date
CN113094438A CN113094438A (en) 2021-07-09
CN113094438B true CN113094438B (en) 2023-10-27

Family

ID=76678893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110417118.4A Active CN113094438B (en) 2021-04-19 2021-04-19 Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology

Country Status (1)

Country Link
CN (1) CN113094438B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095203B (en) * 2021-10-01 2024-09-27 珠海市大悦科技有限公司 Data encryption interaction method, device and readable medium
CN114138275A (en) * 2021-11-15 2022-03-04 安天科技集团股份有限公司 Data transmission method and device, electronic equipment and readable storage medium
CN114330610A (en) * 2021-12-14 2022-04-12 厦门纳龙健康科技股份有限公司 Two-dimensional code video-based efficient data transmission method
CN115378931A (en) * 2022-08-15 2022-11-22 苏州单多啦科技有限公司 Large-capacity data transmission method and system based on two-dimension code
CN115514791B (en) * 2022-11-17 2023-02-17 中国五洲工程设计集团有限公司 Method for cross-network data transmission in emergency management of explosive and powder industry

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973064A (en) * 2017-04-28 2017-07-21 南京佳普科技有限公司 A kind of inside and outside network physical isolated data transmitting device
WO2017186005A1 (en) * 2016-04-29 2017-11-02 中兴通讯股份有限公司 Method, server, and terminal for cloud desktop authentication
WO2019072127A1 (en) * 2017-10-10 2019-04-18 南京百利通信息技术有限责任公司 Law enforcement recorder based on two-dimensional code scanning and identifying, and whole-process audio and video recording method
WO2019161809A1 (en) * 2018-02-24 2019-08-29 南京百利通信息技术有限责任公司 Recording system and method for barcode scanning and identification based on 4g/5g network
CN110417720A (en) * 2019-02-27 2019-11-05 国家电网公司东北分部 A method of carrying out information transmission in the case where physical isolation
CN111404904A (en) * 2020-03-09 2020-07-10 安徽领云物联科技有限公司 Data security exchange method and device for physical isolation of internal network and external network
CN111914971A (en) * 2020-08-17 2020-11-10 国网浙江杭州市余杭区供电有限公司 Two-dimensional code-based data bidirectional transmission method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017186005A1 (en) * 2016-04-29 2017-11-02 中兴通讯股份有限公司 Method, server, and terminal for cloud desktop authentication
CN106973064A (en) * 2017-04-28 2017-07-21 南京佳普科技有限公司 A kind of inside and outside network physical isolated data transmitting device
WO2019072127A1 (en) * 2017-10-10 2019-04-18 南京百利通信息技术有限责任公司 Law enforcement recorder based on two-dimensional code scanning and identifying, and whole-process audio and video recording method
WO2019161809A1 (en) * 2018-02-24 2019-08-29 南京百利通信息技术有限责任公司 Recording system and method for barcode scanning and identification based on 4g/5g network
CN110417720A (en) * 2019-02-27 2019-11-05 国家电网公司东北分部 A method of carrying out information transmission in the case where physical isolation
CN111404904A (en) * 2020-03-09 2020-07-10 安徽领云物联科技有限公司 Data security exchange method and device for physical isolation of internal network and external network
CN111914971A (en) * 2020-08-17 2020-11-10 国网浙江杭州市余杭区供电有限公司 Two-dimensional code-based data bidirectional transmission method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于二维码的涉密内网安全短信网关;王敏;;网络安全技术与应用(第11期);全文 *
基于二维码的数据传输系统设计;陶孙杰;余涛;;计算机科学(第S2期);全文 *

Also Published As

Publication number Publication date
CN113094438A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
CN113094438B (en) Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology
US10726299B2 (en) Sorted geometry with color clustering (SGCC) for point cloud compression
Kawaguchi et al. Principles and applications of BPCS steganography
CN111368960B (en) Quantum anti-counterfeiting two-dimensional code generation method and scanning method
CN104426879B (en) Processing method and the corresponding methods, devices and systems of identifying code generation and verifying
CN111918065A (en) Information compression/decompression method and device
CN109189587A (en) The sharing method and its share system of electronic whiteboard content information
CN105357415A (en) Picture encryption and decryption methods and devices
CN110740352B (en) SPICE protocol-based difference image display method in video card transparent transmission environment
US20230298305A1 (en) Method and apparatus for optimizing hdr video display processing, and storage medium and terminal
Al-Shatnawi et al. An integrated image steganography system with improved image quality
CN116320431B (en) Video compression coding data dynamic wireless network transmission system
JP7089147B2 (en) How to process the data
CN116684201A (en) Digital collection encryption method, system and readable storage medium
CN115378931A (en) Large-capacity data transmission method and system based on two-dimension code
CN113536341A (en) Data hiding method, device, equipment and computer readable storage medium
CN112307527A (en) Data transmission method and structure
Zhou et al. Method of multiple-image hiding in QR code based on compressed sensing and orthogonal modulation
CN112862039A (en) QR code-based data transmission method and device
Lin et al. A tailor-made encryption scheme for high-dynamic range images
CN112464937A (en) Abnormal alarm method in network physical isolation state
Kaushik et al. A two stage hybrid model for image encryption and compression to enhance security and efficiency
CN113595984B (en) Data transmission method and device combining RPA and AI, electronic equipment and storage medium
CN113988243B (en) Three-dimensional code generation and verification method, system, equipment and medium with verification code
CN107506232A (en) A kind of image acquisition method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant