CN113094438B - Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology - Google Patents
Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology Download PDFInfo
- Publication number
- CN113094438B CN113094438B CN202110417118.4A CN202110417118A CN113094438B CN 113094438 B CN113094438 B CN 113094438B CN 202110417118 A CN202110417118 A CN 202110417118A CN 113094438 B CN113094438 B CN 113094438B
- Authority
- CN
- China
- Prior art keywords
- data
- dimensional code
- character string
- warehousing
- external network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000005540 biological transmission Effects 0.000 title claims abstract description 26
- 238000002955 isolation Methods 0.000 title claims abstract description 18
- 238000013075 data extraction Methods 0.000 claims abstract description 8
- 238000013144 data compression Methods 0.000 claims description 5
- 238000013500 data storage Methods 0.000 claims description 5
- 239000011159 matrix material Substances 0.000 claims description 4
- 230000006837 decompression Effects 0.000 claims description 3
- 238000002360 preparation method Methods 0.000 claims description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Information Transfer Between Computers (AREA)
- Character Discrimination (AREA)
Abstract
An internal and external network data isolation and transmission method based on a two-dimensional code image recognition technology belongs to the technical field of data real-time transmission based on the two-dimensional code image recognition technology in an internal and external network data isolation environment, and particularly relates to an internal and external network data isolation and transmission method based on the two-dimensional code image recognition technology. The invention provides an internal and external network data isolation and transmission method based on a two-dimensional code image recognition technology. The invention comprises an intranet two-dimensional code data synchronization program and an extranet two-dimensional code data synchronization program, and is characterized in that the intranet two-dimensional code data synchronization program comprises a data extraction program, and the data extraction process of the data extraction program is as follows: and acquiring incremental data from a database, generating an original character string by each record of the incremental data, compressing the original character string to form a compressed character string, encrypting the data, and finally generating a two-dimensional code, wherein a unique code of the data is generated when the two-dimensional code is generated.
Description
Technical Field
The invention belongs to the technical field of data real-time transmission based on a two-dimensional code image recognition technology in an internal and external network data isolation environment, and particularly relates to an internal and external network data isolation and transmission method based on the two-dimensional code image recognition technology.
Background
At present, enterprises and public institutions such as government departments, electric power departments and the like can form a plurality of physical network environments due to safety guarantee, business requirements and the like, and logical isolation or physical isolation can be formed among the physical network environments, so that the method is not friendly to data cross-network transmission, and particularly physical isolation. However, in the real service demand, a service system always needs data in a plurality of network environments, so that the demand of transmitting data across networks can be formed, a logically isolated network can be performed in a form of a network gate and the like, and a physically isolated network can be performed only in a purely manual mode such as a disc carving mode in the past, so that a great deal of manual participation is needed, a great deal of physical cost is wasted, the real-time performance is poor, and the demand of the service system cannot be guaranteed. How to ensure network security and rapidly, real-time and stably transmit data to meet business requirements under the condition of not damaging the prior network strategy between network environments which are completely physically isolated is a difficult problem in the industry.
Disclosure of Invention
The invention aims at the problems and provides an internal and external network data isolation and transmission method based on a two-dimensional code image recognition technology.
In order to achieve the above purpose, the invention adopts the following technical scheme that the method comprises an intranet two-dimension code data synchronization program and an extranet two-dimension code data synchronization program, and is characterized in that the intranet two-dimension code data synchronization program comprises a data extraction program, and the data extraction process of the data extraction program is as follows: acquiring incremental data from a database, recording each item of the incremental data to generate an original character string, compressing the original character string to form a compressed character string, encrypting the data, and finally generating a two-dimensional code, wherein a unique code of the data is generated when the two-dimensional code is generated;
the external network two-dimension code data synchronization program comprises a data warehousing program, wherein the data warehousing program captures two-dimension code pictures of an internal network, corrects and processes the two-dimension code pictures, analyzes the two-dimension code pictures, decrypts character strings after analysis, performs data warehousing, generates two-dimension codes from the warehousing state after the warehousing is completed, displays the two-dimension codes, and waits for the data extraction program of the internal network to scan;
the state synchronization process in the intranet data extraction program scans the two-dimensional code of the extranet, analyzes the data warehouse-in state contained in the two-dimensional code after the scanning is successful, informs a data circulation task of the warehouse-in state, acquires incremental data again when the data synchronization state is warehouse-in success, and starts the next circulation; and refreshing the two-dimensional code again when the data state is the warehouse entry failure, and carrying out data synchronization again on the data record.
As a preferable scheme, when the compressed character string is still larger than a set value, splitting the character string, encrypting data after splitting, finally generating a two-dimensional code, generating a unique code of the data when generating the two-dimensional code, and adding a sub-packaging serial number.
As another preferable scheme, the intranet two-dimensional code data synchronization program comprises the following steps:
1) Incremental data acquisition: acquiring a certain amount (such as 5-10 pieces) of incremental data according to the warehousing time, the self-increment ID and the database log information of the service table, and generating json character strings from the data;
2) Data compression: compressing the generated character string through gzip;
3) Splitting the two-dimensional code when the increment data acquired in a single time exceeds a character set value after being compressed, forming a packet by the characters of each character set value, and generating a serial number for each packet;
4) Data encryption: encrypting the data by Base 64;
5) Generating a two-dimensional code, namely adding a unique ID with a certain length into an encrypted character string, splitting the same piece of data, and then marking by adding a serial number, wherein the character string is changed into: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
As another preferable scheme, the 3) data splitting method comprises the steps of splitting the two-dimensional code when the increment data acquired in a single time exceeds 220 characters after being compressed, forming a packet for each 220 characters, and generating a serial number for each packet.
As another preferable scheme, the invention 5) generates the two-dimensional code, namely adding the unique ID with the length of 20 to the encrypted character string, splitting the same piece of data, and identifying by adding a serial number, so that the data warehouse-in program of an external network is convenient to splice, and the character string becomes: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
As another preferred scheme, the data warehousing program of the invention scans the display of the intranet through connecting an external high-fidelity camera, captures a two-dimension code picture of the intranet, corrects and processes the two-dimension code, analyzes the two-dimension code picture, decrypts the character string after analysis, judges whether the original character is split according to the serial number after decryption, combines the data into complete data if the split character needs to be combined into the complete data, performs warehousing, generates the two-dimension code from the warehousing state after the warehousing is completed, displays the two-dimension code on the display of the external network, and waits for the data extraction program of the intranet to scan.
As another preferable scheme, the two-dimensional code data synchronization program of the external network of the present invention includes the following steps: 1) The camera focuses, namely calling an interface of the camera to enable the camera to focus the intranet display;
2) Capturing a two-dimensional code: after focusing, scanning the intranet display once at regular intervals to obtain a two-dimensional code displayed on the intranet display;
3) Image gray scale processing: the brightness of three components in the color image is used as the gray value of three gray images, the image is processed into a three-component gray image with R=G=B through graying treatment, the interference of color and partial dry points is removed, and the preparation is made for the next image processing;
4) Image binarization processing: the gray level image is quickly converted into a binary image with only black (front Jing Erwei code matrix dots) and white (background part) distribution through a Kittler algorithm;
5) Two-dimensional code identification: after gray level and binarization processing, identifying information carried in the two-dimensional code, wherein part of conditions cannot be identified, driving the camera again to focus, capturing the two-dimensional code again, and repeating the steps to obtain a clearer two-dimensional code picture;
6) Decrypting data: firstly decrypting the character string identified by the two-dimensional code by using a Base64 algorithm, and restoring the character string to an unpressurized state;
7) Data decompression: decompressing the uncompressed character strings through the GZIp, and storing the decompressed character strings in a local cache database;
8) Data assembly: re-splicing the split character strings into a complete character string through the ID+serial numbers, and taking the character anti-sequence as an object;
9) And (3) data storage: warehousing the generated object, and recording the successful and failed state of warehousing;
10 Generating a two-dimensional code: and generating a two-dimensional code according to the data storage state, namely the ID, the serial number and the state, displaying the two-dimensional code on an external network display, and waiting for scanning by an internal network camera.
Secondly, the invention is characterized in that 2) capturing two-dimension codes: after focusing, the camera scans the intranet display once every 100 milliseconds to obtain the two-dimensional code displayed on the intranet display.
In addition, the state synchronization process in the intranet data extraction program of the invention scans the two-dimension code of the external network through the high-security camera of the intranet, analyzes the synchronization state of the data after the scanning is successful, informs the data circulation task of the synchronization state, acquires the increment data again when the data synchronization state is successful in warehousing, refreshes the two-dimension code again when the data state is failed in warehousing, and continues to synchronize the data.
The invention has the beneficial effects that.
The invention adopts the internal and external network data isolation and transmission method based on the two-dimension code image recognition technology to convert the data into the two-dimension code, thereby realizing the data transmission in the network environment crossing physical isolation, ensuring the data security and the data effective transmission, not needing to modify any security policy of the original network, and saving a great deal of manpower and physical cost.
The invention adopts the two-dimensional code to carry out data transmission, fully utilizes the characteristics of fault tolerance, encryption, strong error correction capability, spaced transmission and the like of the two-dimensional code, and realizes the data transmission of physical isolation in the true sense.
The invention improves the transmission data quantity through data compression.
According to the method, the data synchronization state and the warehousing condition are fed back through two-dimensional code image recognition, and the abnormal data are secondarily synchronized, so that the data synchronization accuracy is ensured.
Drawings
The invention is further described below with reference to the drawings and the detailed description. The scope of the present invention is not limited to the following description.
FIG. 1 is a flow chart of the process of the present invention.
Fig. 2 is a deployment diagram of the present invention.
Detailed Description
As shown in the figure, the method mainly comprises an intranet two-dimensional code data synchronization program and an extranet two-dimensional code data synchronization program. The data synchronization process is as follows, taking the synchronization of intranet data to an internet scene as an example:
the data extraction process of the data extraction program of the intranet is responsible for acquiring incremental data from a database, generating each record of the incremental data into an original character string, compressing the original character string to form a compressed character string for improving data transmission efficiency, and disassembling the compressed character string for ensuring the recognition rate of the external network when the length of each record of the data is inconsistent and the compressed character string is still possibly larger than a set value (220 bytes), encrypting the data after the disassembly to avoid data leakage, generating a two-dimensional code finally, generating a unique code of the data when the two-dimensional code is generated, and disassembling the process, wherein the steps are 5:
"1.1 incremental data acquisition": acquiring a certain amount of incremental data according to the information such as the warehousing time, the self-increment ID, the database log and the like of the service table, and generating json character strings from the data;
"1.2 data compression": the generated character strings are compressed through gzip, so that the character length can be saved by 80%;
1.3 data splitting, namely splitting the two-dimensional code into a packet every 220 characters when the increment data acquired at a time is longer and exceeds 220 characters after compression, and generating a serial number for each packet as the number of the two-dimensional code carried is increased;
"1.4 data encryption": because intranet data often has the sensitivity of different programs, in order to prevent the data from being divulged, the data is encrypted through Base 64;
1.5 generating a two-dimensional code, namely adding a unique ID with the length of 20 to an encrypted character string, splitting the same piece of data, and identifying by adding a serial number, so that the data storage program of an external network is convenient to splice, and the character string becomes: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
The data extraction process is to poll the incremental data of each service table, the process not only ensures the quantity of one-time transmission, but also facilitates the analysis data which can be quickly prepared by the data warehouse-in program of the external network, and the character strings are unpacked according to 220 bytes, so that the recognition rate of the two-dimensional code is greatly improved after unpacking.
The data extraction process uses data compression to improve the data transmission efficiency; the number and the size of matrix points of the two-dimensional code are controlled through unpacking, so that the recognition rate of the two-dimensional code is improved; through the data encryption technology, the safety and reliability of data transmission are guaranteed, and the efficiency and the subsequent recognition rate of the data extraction process are guaranteed.
The data warehousing program of the external network scans a display of the internal network through connecting an external high-fidelity camera, captures a two-dimensional code picture of the internal network, corrects and processes the two-dimensional code, analyzes the two-dimensional code picture, greatly improves the analysis success rate of the two-dimensional code, decrypts the character string after analysis, judges whether the original character is split after decryption, combines the data into complete data if the split character needs to be subjected to data combination, and then performs warehousing, generates the two-dimensional code from the warehousing state after the warehousing is completed, displays the two-dimensional code on the display of the external network, and waits for the scanning of the data extraction program of the internal network. The process specifically comprises the following 10 steps:
2.1 camera focusing, calling an interface of the camera to enable the camera to focus on an intranet display;
"2.2 capture two-dimensional code": after focusing the camera, scanning the intranet display once every 100 milliseconds to obtain a two-dimensional code displayed on the intranet display;
"2.3 image gradation processing": the brightness of three components in the color image is used as the gray value of three gray images, the image is processed into a three-component gray image with R=G=B through graying treatment, the interference of color and partial dry points is removed, and the preparation is made for the next image processing; the two-dimensional code analysis efficiency and success rate are improved;
"2.4 image binarization processing": the gray level image is quickly converted into a binary image with only black (front Jing Erwei code matrix dots) and white (background parts) distribution through a Kittler algorithm, so that the definition, the boundary definition and the feature definition of the two-dimensional code image are improved, and the interference item is effectively removed;
"2.5 two-dimensional code identification": after gray level and binarization processing, rapidly identifying information carried in the two-dimensional code, wherein the character string obtained at the moment is a character string after 1.4 data encryption; part of conditions cannot be identified, then the camera is driven again to focus, the two-dimensional code is captured again, and the steps are repeated to obtain a clearer two-dimensional code picture;
"2.6 data decryption": firstly decrypting the character string identified by the two-dimensional code by using a Base64 algorithm, and restoring the character string to an unpressurized state;
"2.7 data decompression": decompressing the uncompressed character strings through the GZIp, and storing the decompressed character strings in a local cache database;
"2.8 data assembly": re-splicing the split character strings into a complete character string through the ID+serial numbers, and taking the character anti-sequence as an object;
"2.9 data binning": warehousing the generated object, and recording the successful and failed state of warehousing;
"2.10 generates two-dimensional code": and generating a two-dimensional code according to the data storage state, namely the ID, the serial number and the state, displaying the two-dimensional code on an external network display, and waiting for scanning by an internal network camera.
The method is characterized in that in the data warehouse-in process, the image capturing capacity of the external network camera is called, the focusing capacity of the camera is utilized to acquire a clearer intranet two-dimension code image as far as possible, the scanned image is processed, interference points are reduced through gray processing, the display effect of the two-dimension code is enhanced through binarization, and the two-dimension code image is rapidly identified.
The image processing technology is applied in the data warehouse-in process, so that the two-dimensional code recognition rate is improved; the two ends of physical isolation can be mutually perceived through the data synchronization state, so that the loss of data is avoided.
The method comprises the steps that a 'state synchronization process' in an intranet 'data extraction program' scans a two-dimensional code of an external network through a high-security camera of the intranet, after scanning is successful, the synchronization state of data is analyzed, a 'data circulation task' is informed of the synchronization state, incremental data can be acquired again when the data synchronization state is successful in warehousing, the two-dimensional code can be refreshed again when the data state is failed in warehousing, and data synchronization is continued on the data record.
The complete warehousing process of one piece of data is formed by sequentially executing the data extraction process, the data warehousing process, the state synchronization process, and the cyclic process can continuously synchronize the business data of the intranet to the business database of the external network by repeating the above 3 processes.
The data volume of a single data transmission may be configured via a configuration file to optimize the efficiency of the data transmission.
As shown in fig. 2, in combination with the deployment diagram, the intranet implementation deployment includes an intranet server, a display, an extranet two-dimension code camera, and an intranet two-dimension code data synchronization program. The external network implementation and deployment comprises an external network server, a display, an internal network two-dimension code camera and an external network two-dimension code data synchronization program.
And under the condition that the intranet data are synchronized to the Internet, the extranet two-dimensional code camera is connected with the extranet server and is used for identifying the two-dimensional code image generated by the two-dimensional code data synchronization program in the intranet server, and finally, the real-time synchronization of the intranet data and the extranet data is realized. The intranet two-dimensional code camera is connected with the intranet server and is used for identifying a two-dimensional code image fed back by a data synchronization condition generated by a two-dimensional code data synchronization program in the outer network server and verifying whether data synchronization is successful in warehousing.
The data is analyzed by a group of external high-fidelity cameras, the two-dimension codes are captured, the synchronous state is analyzed by the two-dimension codes, and the technical scheme of no manual participation is adopted, so that the real-time data transmission under the network environment of cross physical isolation can be realized, the data security is ensured, the real-time and effective data transmission is ensured, any security policy of the original network is not required to be modified, and a large amount of manpower and physical cost can be saved.
It should be understood that the foregoing detailed description of the present invention is provided for illustration only and is not limited to the technical solutions described in the embodiments of the present invention, and those skilled in the art should understand that the present invention may be modified or substituted for the same technical effects; as long as the use requirement is met, the invention is within the protection scope of the invention.
Claims (9)
1. The internal and external network data isolation and transmission method based on the two-dimension code image recognition technology comprises an internal network two-dimension code data synchronization program and an external network two-dimension code data synchronization program, and is characterized in that the internal network two-dimension code data synchronization program comprises a data extraction program, and the data extraction process of the data extraction program is as follows: acquiring incremental data from a database, recording each item of the incremental data to generate an original character string, compressing the original character string to form a compressed character string, encrypting the data, and finally generating a two-dimensional code, wherein a unique code of the data is generated when the two-dimensional code is generated;
the external network two-dimension code data synchronization program comprises a data warehousing program, wherein the data warehousing program captures two-dimension code pictures of an internal network, corrects and processes the two-dimension code pictures, analyzes the two-dimension code pictures, decrypts character strings after analysis, performs data warehousing, generates two-dimension codes from the warehousing state after the warehousing is completed, displays the two-dimension codes, and waits for the data extraction program of the internal network to scan;
the state synchronization process in the intranet data extraction program scans the two-dimensional code of the extranet, analyzes the data warehouse-in state contained in the two-dimensional code after the scanning is successful, informs a data circulation task of the warehouse-in state, acquires incremental data again when the data synchronization state is warehouse-in success, and starts the next circulation; and refreshing the two-dimensional code again when the data state is the warehouse entry failure, and carrying out data synchronization again on the data record.
2. The method for isolating and transmitting the internal and external network data based on the two-dimensional code image recognition technology according to claim 1, wherein if the compressed character string is still larger than a set value, splitting the character string, encrypting the data after splitting, generating a two-dimensional code, generating a unique code of the data when generating the two-dimensional code, and adding a sub-packet serial number.
3. The method for isolating and transmitting the intranet and extranet data based on the two-dimension code image recognition technology as claimed in claim 1, wherein the intranet two-dimension code data synchronization program comprises the following steps:
1) Incremental data acquisition: acquiring a certain amount (such as 5-10 pieces) of incremental data according to the warehousing time, the self-increment ID and the database log information of the service table, and generating json character strings from the data;
2) Data compression: compressing the generated character string through gzip;
3) Splitting the two-dimensional code when the increment data acquired in a single time exceeds a character set value after being compressed, forming a packet by the characters of each character set value, and generating a serial number for each packet;
4) Data encryption: encrypting the data by Base 64;
5) Generating a two-dimensional code, namely adding a unique ID with a certain length into an encrypted character string, splitting the same piece of data, and then marking by adding a serial number, wherein the character string is changed into: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
4. The method for isolating and transmitting the internal and external network data based on the two-dimensional code image recognition technology according to claim 3 is characterized in that 3) the data is split, when the increment data acquired at a time is compressed to be more than 220 characters, the two-dimensional code is split, each 220 characters are formed into a packet, and a serial number is generated for each packet.
5. The method for isolating and transmitting data of an internal network and an external network based on the two-dimensional code image recognition technology according to claim 3, wherein the 5) two-dimensional code generation is characterized in that an encrypted character string is added with a unique ID with the length of 20, after the same piece of data is split, the same piece of data is identified by adding a serial number, so that an 'data warehouse-in program' of an external network is convenient to splice, and the character string becomes: and (3) generating a two-dimensional code by the ID, the serial number and the encryption string, displaying the two-dimensional code on a display, and waiting for scanning of a data warehouse-in program of an external network.
6. The method for isolating and transmitting the data of the internal and external networks based on the two-dimensional code image recognition technology according to claim 1, wherein the data warehousing program scans a display of the internal network through connecting an external high-fidelity camera, captures a two-dimensional code picture of the internal network, corrects and processes the two-dimensional code, analyzes the two-dimensional code picture, decrypts a character string after analysis, judges whether an original character is split according to a serial number after decryption, if the original character is split, needs to be subjected to data combination, is subjected to warehousing after being combined into complete data, generates the two-dimensional code in a warehousing state after the warehousing is completed, displays the two-dimensional code on the display of the external network, and waits for the data extraction program of the internal network to scan.
7. The method for isolating and transmitting the data of the internal and external networks based on the two-dimensional code image recognition technology as claimed in claim 1, wherein the external network two-dimensional code data synchronization program comprises the following steps: 1) The camera focuses, namely calling an interface of the camera to enable the camera to focus the intranet display;
2) Capturing a two-dimensional code: after focusing, scanning the intranet display once at regular intervals to obtain a two-dimensional code displayed on the intranet display;
3) Image gray scale processing: the brightness of three components in the color image is used as the gray value of three gray images, the image is processed into a three-component gray image with R=G=B through graying treatment, the interference of color and partial dry points is removed, and the preparation is made for the next image processing;
4) Image binarization processing: the gray level image is quickly converted into a binary image with only black (front Jing Erwei code matrix dots) and white (background part) distribution through a Kittler algorithm;
5) Two-dimensional code identification: after gray level and binarization processing, identifying information carried in the two-dimensional code, wherein part of conditions cannot be identified, driving the camera again to focus, capturing the two-dimensional code again, and repeating the steps to obtain a clearer two-dimensional code picture;
6) Decrypting data: firstly decrypting the character string identified by the two-dimensional code by using a Base64 algorithm, and restoring the character string to an unpressurized state;
7) Data decompression: decompressing the uncompressed character strings through the GZIp, and storing the decompressed character strings in a local cache database;
8) Data assembly: re-splicing the split character strings into a complete character string through the ID+serial numbers, and taking the character anti-sequence as an object;
9) And (3) data storage: warehousing the generated object, and recording the successful and failed state of warehousing;
10 Generating a two-dimensional code: and generating a two-dimensional code according to the data storage state, namely the ID, the serial number and the state, displaying the two-dimensional code on an external network display, and waiting for scanning by an internal network camera.
8. The method for isolating and transmitting data between internal and external networks based on two-dimensional code image recognition technology according to claim 7, wherein the 2) capturing two-dimensional code: after focusing, the camera scans the intranet display once every 100 milliseconds to obtain the two-dimensional code displayed on the intranet display.
9. The method for isolating and transmitting the data of the internal and external networks based on the two-dimension code image recognition technology according to claim 1, wherein the state synchronization process in the internal network data extraction program is characterized in that a high-security camera of the internal network scans the two-dimension code of the external network, after the scanning is successful, the synchronization state of the data is analyzed, the data circulation task is notified of the synchronization state, when the data synchronization state is successful in warehousing, the incremental data is acquired again, when the data state is failed in warehousing, the two-dimension code is refreshed again, and the data synchronization is continued for the data record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110417118.4A CN113094438B (en) | 2021-04-19 | 2021-04-19 | Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110417118.4A CN113094438B (en) | 2021-04-19 | 2021-04-19 | Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113094438A CN113094438A (en) | 2021-07-09 |
CN113094438B true CN113094438B (en) | 2023-10-27 |
Family
ID=76678893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110417118.4A Active CN113094438B (en) | 2021-04-19 | 2021-04-19 | Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113094438B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114095203B (en) * | 2021-10-01 | 2024-09-27 | 珠海市大悦科技有限公司 | Data encryption interaction method, device and readable medium |
CN114138275A (en) * | 2021-11-15 | 2022-03-04 | 安天科技集团股份有限公司 | Data transmission method and device, electronic equipment and readable storage medium |
CN114330610A (en) * | 2021-12-14 | 2022-04-12 | 厦门纳龙健康科技股份有限公司 | Two-dimensional code video-based efficient data transmission method |
CN115378931A (en) * | 2022-08-15 | 2022-11-22 | 苏州单多啦科技有限公司 | Large-capacity data transmission method and system based on two-dimension code |
CN115514791B (en) * | 2022-11-17 | 2023-02-17 | 中国五洲工程设计集团有限公司 | Method for cross-network data transmission in emergency management of explosive and powder industry |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106973064A (en) * | 2017-04-28 | 2017-07-21 | 南京佳普科技有限公司 | A kind of inside and outside network physical isolated data transmitting device |
WO2017186005A1 (en) * | 2016-04-29 | 2017-11-02 | 中兴通讯股份有限公司 | Method, server, and terminal for cloud desktop authentication |
WO2019072127A1 (en) * | 2017-10-10 | 2019-04-18 | 南京百利通信息技术有限责任公司 | Law enforcement recorder based on two-dimensional code scanning and identifying, and whole-process audio and video recording method |
WO2019161809A1 (en) * | 2018-02-24 | 2019-08-29 | 南京百利通信息技术有限责任公司 | Recording system and method for barcode scanning and identification based on 4g/5g network |
CN110417720A (en) * | 2019-02-27 | 2019-11-05 | 国家电网公司东北分部 | A method of carrying out information transmission in the case where physical isolation |
CN111404904A (en) * | 2020-03-09 | 2020-07-10 | 安徽领云物联科技有限公司 | Data security exchange method and device for physical isolation of internal network and external network |
CN111914971A (en) * | 2020-08-17 | 2020-11-10 | 国网浙江杭州市余杭区供电有限公司 | Two-dimensional code-based data bidirectional transmission method and system |
-
2021
- 2021-04-19 CN CN202110417118.4A patent/CN113094438B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017186005A1 (en) * | 2016-04-29 | 2017-11-02 | 中兴通讯股份有限公司 | Method, server, and terminal for cloud desktop authentication |
CN106973064A (en) * | 2017-04-28 | 2017-07-21 | 南京佳普科技有限公司 | A kind of inside and outside network physical isolated data transmitting device |
WO2019072127A1 (en) * | 2017-10-10 | 2019-04-18 | 南京百利通信息技术有限责任公司 | Law enforcement recorder based on two-dimensional code scanning and identifying, and whole-process audio and video recording method |
WO2019161809A1 (en) * | 2018-02-24 | 2019-08-29 | 南京百利通信息技术有限责任公司 | Recording system and method for barcode scanning and identification based on 4g/5g network |
CN110417720A (en) * | 2019-02-27 | 2019-11-05 | 国家电网公司东北分部 | A method of carrying out information transmission in the case where physical isolation |
CN111404904A (en) * | 2020-03-09 | 2020-07-10 | 安徽领云物联科技有限公司 | Data security exchange method and device for physical isolation of internal network and external network |
CN111914971A (en) * | 2020-08-17 | 2020-11-10 | 国网浙江杭州市余杭区供电有限公司 | Two-dimensional code-based data bidirectional transmission method and system |
Non-Patent Citations (2)
Title |
---|
一种基于二维码的涉密内网安全短信网关;王敏;;网络安全技术与应用(第11期);全文 * |
基于二维码的数据传输系统设计;陶孙杰;余涛;;计算机科学(第S2期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113094438A (en) | 2021-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113094438B (en) | Internal and external network data isolation and transmission method based on two-dimensional code image recognition technology | |
US10726299B2 (en) | Sorted geometry with color clustering (SGCC) for point cloud compression | |
Kawaguchi et al. | Principles and applications of BPCS steganography | |
CN111368960B (en) | Quantum anti-counterfeiting two-dimensional code generation method and scanning method | |
CN104426879B (en) | Processing method and the corresponding methods, devices and systems of identifying code generation and verifying | |
CN111918065A (en) | Information compression/decompression method and device | |
CN109189587A (en) | The sharing method and its share system of electronic whiteboard content information | |
CN105357415A (en) | Picture encryption and decryption methods and devices | |
CN110740352B (en) | SPICE protocol-based difference image display method in video card transparent transmission environment | |
US20230298305A1 (en) | Method and apparatus for optimizing hdr video display processing, and storage medium and terminal | |
Al-Shatnawi et al. | An integrated image steganography system with improved image quality | |
CN116320431B (en) | Video compression coding data dynamic wireless network transmission system | |
JP7089147B2 (en) | How to process the data | |
CN116684201A (en) | Digital collection encryption method, system and readable storage medium | |
CN115378931A (en) | Large-capacity data transmission method and system based on two-dimension code | |
CN113536341A (en) | Data hiding method, device, equipment and computer readable storage medium | |
CN112307527A (en) | Data transmission method and structure | |
Zhou et al. | Method of multiple-image hiding in QR code based on compressed sensing and orthogonal modulation | |
CN112862039A (en) | QR code-based data transmission method and device | |
Lin et al. | A tailor-made encryption scheme for high-dynamic range images | |
CN112464937A (en) | Abnormal alarm method in network physical isolation state | |
Kaushik et al. | A two stage hybrid model for image encryption and compression to enhance security and efficiency | |
CN113595984B (en) | Data transmission method and device combining RPA and AI, electronic equipment and storage medium | |
CN113988243B (en) | Three-dimensional code generation and verification method, system, equipment and medium with verification code | |
CN107506232A (en) | A kind of image acquisition method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |