CN202679412U - Data transmission encrypting and decrypting system - Google Patents
Data transmission encrypting and decrypting system Download PDFInfo
- Publication number
- CN202679412U CN202679412U CN201220335723.3U CN201220335723U CN202679412U CN 202679412 U CN202679412 U CN 202679412U CN 201220335723 U CN201220335723 U CN 201220335723U CN 202679412 U CN202679412 U CN 202679412U
- Authority
- CN
- China
- Prior art keywords
- data
- server
- safe proxy
- proxy server
- end equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
A data transmission encrypting and decrypting system comprises a safe proxy client and a safe proxy server both established on the basis of the Secure Socket Layer protocol. The safe proxy client and the safe proxy server are in communication connection through a public network. The safe proxy client encrypts data received from a piece of front-end equipment and then sends the encrypted data to the safe proxy server. The safe proxy server decrypts the data and sends the decrypted data to an access server. The safe proxy server receives data sent from the access server to the front-end equipment and encrypts the data before sending the data to the safe proxy client. The safe proxy client decrypts the data before sending the data to the front-end equipment. By adopting the transparent transmission way, the front-end equipment and the access server of the front-end equipment require no modification of an original program and are thus easy to deploy. The front-end equipment only requires a modification of a server setting inside a configuration and is directed towards the safe proxy client. The access server of the front-end equipment requires no change and has the advantages of system integration convenience and easy deployment, etc.
Description
Technical field
The utility model relates to a kind of encrypting and deciphering system.
Background technology
In the internet information Age of Technology, we need to watch out for from the various danger of hiding after the Internet huge network when enjoying the Internet opening, and the fail safe of data message is particularly important.Particularly to the protection aspect of sensitive data, relevant encryption and decryption technology application demand is more and more urgent.
At present, the encrypting and deciphering system structure of transfer of data is too complicated, and for headend equipment and access server, needs to change original program, and it is very inconvenient to operate.
Summary of the invention
The purpose of this utility model provides a kind of transfer of data encrypting and deciphering system of simple in structure, easy deployment.
For achieving the above object, the utility model is by the following technical solutions:
A kind of transfer of data encrypting and deciphering system, it comprises TSM Security Agent client and the security proxy server that makes up based on secure socket layer protocol, connects by public network communication between TSM Security Agent client and the security proxy server; Described TSM Security Agent client is delivered to security proxy server after with the headend equipment data encryption of receiving, gives access server after the security proxy server deciphering; Described security proxy server receives the data that access server is issued headend equipment, sends to the TSM Security Agent client after the encryption, sends to headend equipment after the deciphering of TSM Security Agent client.
Described TSM Security Agent client comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU also connects headend equipment and public network by Ethernet interface.
Described security proxy server comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU also connects access server and public network by Ethernet interface.
Adopt the utility model of technique scheme, based on SSL (Secure Socket Layer, SSL) agreement, make up the TSM Security Agent client and server.Encrypting and deciphering system adopts the transparent transmission mode, concerning headend equipment and headend equipment access server, does not need to revise original program, is easy to dispose.For headend equipment, only need to revise the Servers installed in the configuration, point to the TSM Security Agent client; For the headend equipment access server, without any need for change, have the system combination of convenience, be easy to the advantages such as deployment; And can effectively reduce the power consumption, volume, cost etc. of present system platform, and be beneficial to the modularized design of system hardware, reduce the system combination difficulty, make this system can better adaptive types of applications environment.
Description of drawings
Fig. 1 is whole theory diagram of the present utility model.
Fig. 2 is the structure chart of TSM Security Agent client.
Fig. 3 is the structure chart of security proxy server.
Embodiment
As shown in Figure 1, a kind of transfer of data encrypting and deciphering system, it comprises TSM Security Agent client and the security proxy server that makes up based on secure socket layer protocol, connects by public network communication between TSM Security Agent client and the security proxy server.In data transmission, the TSM Security Agent client is delivered to security proxy server after with the headend equipment data encryption of receiving, security proxy server is given access server after with data deciphering; Security proxy server receives the data that access server is issued headend equipment, will send to the TSM Security Agent client after the data encryption, sends to headend equipment after the deciphering of TSM Security Agent client.
On hardware configuration, the TSM Security Agent client comprises CPU and the SATA and the DDR that are connected with CPU, and CPU also connects headend equipment and public network by Ethernet interface, as shown in Figure 2.
As shown in Figure 3, security proxy server comprises CPU and the SATA and the DDR that are connected with CPU, and CPU also connects access server and public network by Ethernet interface.
Claims (3)
1. transfer of data encrypting and deciphering system, it is characterized in that: it comprises TSM Security Agent client and the security proxy server that makes up based on secure socket layer protocol, connects by public network communication between TSM Security Agent client and the security proxy server; Described TSM Security Agent client is delivered to security proxy server after with the headend equipment data encryption of receiving, gives access server after the security proxy server deciphering; Described security proxy server receives the data that access server is issued headend equipment, sends to the TSM Security Agent client after the encryption, sends to headend equipment after the deciphering of TSM Security Agent client.
2. transfer of data encrypting and deciphering system according to claim 1 is characterized in that: described TSM Security Agent client comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU is also by Ethernet interface connection headend equipment and public network.
3. transfer of data encrypting and deciphering system according to claim 1 is characterized in that: described security proxy server comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU is also by Ethernet interface connection access server and public network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201220335723.3U CN202679412U (en) | 2012-07-12 | 2012-07-12 | Data transmission encrypting and decrypting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201220335723.3U CN202679412U (en) | 2012-07-12 | 2012-07-12 | Data transmission encrypting and decrypting system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202679412U true CN202679412U (en) | 2013-01-16 |
Family
ID=47500283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201220335723.3U Expired - Fee Related CN202679412U (en) | 2012-07-12 | 2012-07-12 | Data transmission encrypting and decrypting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202679412U (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105407068A (en) * | 2014-06-30 | 2016-03-16 | 优视科技有限公司 | Network data obtaining method, device and system |
CN107222493A (en) * | 2017-06-26 | 2017-09-29 | 浪潮软件股份有限公司 | ORACLE-JDBC data transmission channel encryption compression system and method |
CN112671733A (en) * | 2020-12-16 | 2021-04-16 | 平安科技(深圳)有限公司 | Data communication method, key management system, device, and storage medium |
CN112685301A (en) * | 2020-12-28 | 2021-04-20 | 浙江国利网安科技有限公司 | Fuzzy test method and device |
-
2012
- 2012-07-12 CN CN201220335723.3U patent/CN202679412U/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105407068A (en) * | 2014-06-30 | 2016-03-16 | 优视科技有限公司 | Network data obtaining method, device and system |
CN105407068B (en) * | 2014-06-30 | 2019-02-15 | 优视科技有限公司 | Network Data Capture methods, devices and systems |
CN107222493A (en) * | 2017-06-26 | 2017-09-29 | 浪潮软件股份有限公司 | ORACLE-JDBC data transmission channel encryption compression system and method |
CN112671733A (en) * | 2020-12-16 | 2021-04-16 | 平安科技(深圳)有限公司 | Data communication method, key management system, device, and storage medium |
CN112685301A (en) * | 2020-12-28 | 2021-04-20 | 浙江国利网安科技有限公司 | Fuzzy test method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104094267B (en) | Method, apparatus and system for secure sharing of media content from a source device | |
EP2830282A1 (en) | Storage method, system and device | |
US10937339B2 (en) | Digital cryptosystem with re-derivable hybrid keys | |
CN104378649B (en) | It is a kind of that real-time encrypted method and system being carried out to video flowing using the close SM1 algorithms of state | |
US20170118020A1 (en) | Data communication method, system and gateway for in-vehicle network including a plurality of subnets | |
KR101668033B1 (en) | An improved implementation of robust and secure content protection in a system-on-a-chip apparatus | |
CN104052658A (en) | Privacy protection system and method based on social network | |
CN107306254B (en) | Digital copyright protection method and system based on double-layer encryption | |
TW201417546A (en) | Instant messaging method and system | |
ATE406068T1 (en) | KEY DEVELOPMENT METHOD AND DEVICE IN A COMMUNICATIONS SYSTEM | |
CN104243510B (en) | A kind of secure network storage system and method | |
CN202679412U (en) | Data transmission encrypting and decrypting system | |
GB201016672D0 (en) | Secure exchange/authentication of electronic documents | |
CN107155184B (en) | WIFI module with secure encryption chip and communication method thereof | |
CN102045343B (en) | DC (Digital Certificate) based communication encrypting safety method, server and system | |
CN105049953A (en) | Set-top-box data encryption method and system | |
CN104936172A (en) | Beidou positioning data transmission encryption system | |
CN102932345B (en) | A kind of information transferring method, Apparatus and system | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system | |
CN104333546A (en) | Data transmission isolation method and data transmission isolation device based on SDI (serial digital interface) bus | |
CN102882897A (en) | Cookie protecting method and device | |
WO2013163861A1 (en) | Method, device and system for proxy transformation | |
CN116232880A (en) | Virtual private network establishment method and system based on security isolation | |
CN101895878A (en) | Dynamic password configuration based mobile communication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee | ||
CP01 | Change in the name or title of a patent holder |
Address after: 450000 Henan province Zhengzhou City Dawn Road No. 66 Patentee after: HENAN ZHIYUN DATA INFORMATION TECHNOLOGY CO.,LTD. Address before: 450000 Henan province Zhengzhou City Dawn Road No. 66 Patentee before: Zhengzhou Xinda Xin'an Technology Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130116 Termination date: 20210712 |
|
CF01 | Termination of patent right due to non-payment of annual fee |