Background technology
Along with the development of technology, long-range declaring dutiable goods becomes possibility, and the client enters the server of tax system by PSTN dialing, and the transfer of data of enterprise to tax bureau's server, is made amendment to the data of enterprise in the server of the tax bureau and stored.But this point-to-point connected system can also satisfy the requirement of transfer of data and supervision when single user or small number of users, but then have many deficiencies when many enterprises' common application and use: transmission speed input cost, stability slow, that increased enterprise is not high, because this system is the authentication when adopting simple routing management to login, taken telephone line by hacker's malice easily, normal enterprise can't be dialled.
Also have in the prior art and adopt the Internet form to carry out transfer of data, as disclosed Chinese patent application on October 12nd, 2005, publication number is CN1681246A, it discloses a kind of payment system and method for customs tax by internet, this system comprises and is used for sending the request msg message and accepting the port system of China Electronics of the response receipt message that Web bank of head office processing center sends to Web bank of head office processing center via special line by the webserver, Web bank of the head office processing center that links to each other with port system of described China Electronics by described special line, be used to carry out the professional computer processing system of branch of financial process and fund clearing processing, be used for the data passes between the professional computer processing system of Web bank of head office processing center and branch, finish communications protocol and Data Format Transform branch front end processor, this system simplification procedure, improved work efficiency.But this kind structural stability is relatively poor, is taken telephone line by the hacker easily, and normal enterprise can't use.
The utility model content
The novel purpose of this adaptation is to overcome above-mentioned defective, provides a kind of multiport to manage point-to-point proprietary protocol system, its data transmission efficiency height, reduced input cost, security performance is good.
For achieving the above object, the utility model adopts following technical scheme: it comprises client, protocol conversion gateway, service terminal, client is connected by protocol conversion gateway with service terminal, client is connected by interconnected network mode with protocol conversion gateway, and protocol conversion gateway is connected by the PSTN mode with service terminal.
System is the product suit that is made of jointly three modules, and three modules are independent separately in form, thereby formed the data transmission safety circuit, and data are transmitted on this circuit exactly.Protocol conversion gateway comprises data reception module, data processing module, point-to-point communication system, and data reception module is connected with the point-to-point communication system by data processing module.
Client is carried out encryption acts earlier to the data of needs transmission, then ciphered data is carried out subpackage and coding, sends again; After data were sent completely, protocol conversion gateway sent to data on the accepting server of appointment according to the circuit of having set up, carry out the processing of data.During this period, protocol conversion gateway needs to carry out overtime judgement in the process of waiting for, for exceeding certain hour and carrying out the processing of automatic disconnection when not responding, discharges the Internet resources that taken.Protocol conversion gateway detects illegal network connection and then carries out discard processing immediately, does not take Internet resources.When protocol conversion gateway receives request of data that the Internet sends and other data, be responsible for data are sent to the processing that given server carries out data according to setting up good connection, the data that dispose are returned according to former road, and the destination file of handling is returned to client.
Protocol conversion gateway and client are set up after the user is connected, data reception module receives the request of data that the user sends over by communication program, and give the point-to-point communication system and carry out forwarding of data, data finally send to the final processing that can carry out data behind the service terminal.Data processing module carried out preliminary treatment to the data that receive after Data Receiving finished: untie compressed package and to the data deciphering, come the legitimacy and the correctness of verification msg.Data are untied the essential information data that data file is extracted in the back, extract the proof of identity information of data file etc., and whether checking is the request of data that legal client sends.If illegal, then disconnect connection, discharge resource; If the user is legal, just user data is carried out verification, carry out next step processing, verification mainly comprises the legitimacy verification of file format, sees whether lack necessary file essential information.If the request msg verification can't pass, then directly return miscue, the position that the prompting client is made mistakes; If verification is passed through, data processing module is just handed to the point-to-point communication system to data and is transmitted.
System can utilize the mode of HTTP to receive the transmission of legal data file by ICP/IP protocol, and the data intact for preliminary treatment can be transferred to service terminal by the mode of HTTP, discharge current network and connect.After having illegal HTTP to connect, Automatic Program is carried out authentication, shields for the request of data that does not meet identity, disregards; After illegal HTTP connection, when not having data to transmit, carry out timeout treatment, avoid the waste of resource; Connect for illegal HTTP, system can shield, and has effectively avoided the connection of malice.
If big request of data is arranged, system distributes idle port numbers to carry out data processing automatically, if port numbers is all occupied, request of data then is in the state of wait, in case idle port numbers is arranged, then handles according to sequencing.Program can be tackled the data processing request that exceeds port numbers, the operational effect zero defect.The data file below certain port numbers can be checked,, the progress of data request processing under front port can be clearly recognized by checking of journal file.
Can manage point-to-point communication system, make its circuit of appointment that can be dynamically connected certainly, and connect recovery, and can dispose the long number that connects of Modem according to the actual needs voluntarily, increase the ability that sends data; Can read the information that the point-to-point transmitting system of proprietary protocol writes mailslot, be presented on the interface; After utilizing the Modem pond to connect the plain old telephone network, carry out start-up system,, specified file can be sent, send to the data receiver of service terminal having under the state of request of data.
This flow process is constantly the process of circulation, can after connecting on the net, plain old telephone not break, carry out the connection of long-time (above 12 hours), test its reception and whether can keep to be connected with the transmission data and do not break, and can guarantee the normal reception and the transmission of data.Can constantly retrieve and send after uploading for request of data, constantly carry out the reception of data and the action of transmission.
Cleverly privately owned point-to-point protocol and ICP/IP protocol are used in a system, little in cost of investment, the real-time of assurance data transmission and processing, system use configuration simple, under the equable prerequisite of network configuration, effectively solved the safe transmission problem of data.The encryption of the advanced line data of the data that need transmit client utilizes the mode of HTTP to carry out the transmission of data then on ICP/IP protocol, and client provides in the mode of dynamic base, is convenient to call.Protocol conversion gateway utilizes privately owned point-to-point protocol to carry out the transmission of data on the net at plain old telephone, ensures the safety of data.
This system configuration is simple, and efficiency of transmission height and security performance are good, can use after the server deploy is good.
Embodiment
System comprises client, protocol conversion gateway, service terminal, and client is connected by protocol conversion gateway with service terminal, and client is connected by interconnection network access mode with protocol conversion gateway, and protocol conversion gateway is connected by the PSTN mode with service terminal.In the encryption of client to the advanced line data of data of needs transmission, then enciphered data is carried out subpackage and coding, the form to the The data the Internet behind the coding sends again; Protocol conversion gateway and client are set up after the user is connected, data reception module receives the request of data that the user sends over, data processing module carried out preliminary treatment to the data that receive after Data Receiving finished: untie compressed package, and, come the legitimacy and the correctness of verification msg to the data deciphering.Data are untied the essential information data that data file is extracted in the back, carry out proof of identity, and whether checking is the request of data that legal client sends.If illegal, then disconnect connection, discharge resource; If the user is legal, just user data is carried out verification, carry out next step processing, verification mainly comprises the legitimacy verification of file format, sees whether lack necessary file essential information.If the request msg verification can't pass, then directly return miscue, the position that the prompting client is made mistakes; If verification is passed through, data processing module is just handed to the point-to-point communication system to data and is transmitted, point-to-point communication system and service terminal adopt the mode of PSTN to carry out transfer of data, and data finally send to the final processing that can carry out data behind the service terminal.