CN202679412U - Data transmission encrypting and decrypting system - Google Patents

Data transmission encrypting and decrypting system Download PDF

Info

Publication number
CN202679412U
CN202679412U CN201220335723.3U CN201220335723U CN202679412U CN 202679412 U CN202679412 U CN 202679412U CN 201220335723 U CN201220335723 U CN 201220335723U CN 202679412 U CN202679412 U CN 202679412U
Authority
CN
China
Prior art keywords
data
server
safe proxy
proxy server
end equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201220335723.3U
Other languages
Chinese (zh)
Inventor
杨智
冯继刚
唐海玲
张松
张士甫
单红卫
郑晓红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Zhiyun Data Information Technology Co ltd
Original Assignee
ZHENGZHOU XINDA XIN'AN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHENGZHOU XINDA XIN'AN TECHNOLOGY Co Ltd filed Critical ZHENGZHOU XINDA XIN'AN TECHNOLOGY Co Ltd
Priority to CN201220335723.3U priority Critical patent/CN202679412U/en
Application granted granted Critical
Publication of CN202679412U publication Critical patent/CN202679412U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

A data transmission encrypting and decrypting system comprises a safe proxy client and a safe proxy server both established on the basis of the Secure Socket Layer protocol. The safe proxy client and the safe proxy server are in communication connection through a public network. The safe proxy client encrypts data received from a piece of front-end equipment and then sends the encrypted data to the safe proxy server. The safe proxy server decrypts the data and sends the decrypted data to an access server. The safe proxy server receives data sent from the access server to the front-end equipment and encrypts the data before sending the data to the safe proxy client. The safe proxy client decrypts the data before sending the data to the front-end equipment. By adopting the transparent transmission way, the front-end equipment and the access server of the front-end equipment require no modification of an original program and are thus easy to deploy. The front-end equipment only requires a modification of a server setting inside a configuration and is directed towards the safe proxy client. The access server of the front-end equipment requires no change and has the advantages of system integration convenience and easy deployment, etc.

Description

The transfer of data encrypting and deciphering system
Technical field
The utility model relates to a kind of encrypting and deciphering system.
Background technology
In the internet information Age of Technology, we need to watch out for from the various danger of hiding after the Internet huge network when enjoying the Internet opening, and the fail safe of data message is particularly important.Particularly to the protection aspect of sensitive data, relevant encryption and decryption technology application demand is more and more urgent.
At present, the encrypting and deciphering system structure of transfer of data is too complicated, and for headend equipment and access server, needs to change original program, and it is very inconvenient to operate.
Summary of the invention
The purpose of this utility model provides a kind of transfer of data encrypting and deciphering system of simple in structure, easy deployment.
For achieving the above object, the utility model is by the following technical solutions:
A kind of transfer of data encrypting and deciphering system, it comprises TSM Security Agent client and the security proxy server that makes up based on secure socket layer protocol, connects by public network communication between TSM Security Agent client and the security proxy server; Described TSM Security Agent client is delivered to security proxy server after with the headend equipment data encryption of receiving, gives access server after the security proxy server deciphering; Described security proxy server receives the data that access server is issued headend equipment, sends to the TSM Security Agent client after the encryption, sends to headend equipment after the deciphering of TSM Security Agent client.
Described TSM Security Agent client comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU also connects headend equipment and public network by Ethernet interface.
Described security proxy server comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU also connects access server and public network by Ethernet interface.
Adopt the utility model of technique scheme, based on SSL (Secure Socket Layer, SSL) agreement, make up the TSM Security Agent client and server.Encrypting and deciphering system adopts the transparent transmission mode, concerning headend equipment and headend equipment access server, does not need to revise original program, is easy to dispose.For headend equipment, only need to revise the Servers installed in the configuration, point to the TSM Security Agent client; For the headend equipment access server, without any need for change, have the system combination of convenience, be easy to the advantages such as deployment; And can effectively reduce the power consumption, volume, cost etc. of present system platform, and be beneficial to the modularized design of system hardware, reduce the system combination difficulty, make this system can better adaptive types of applications environment.
Description of drawings
Fig. 1 is whole theory diagram of the present utility model.
Fig. 2 is the structure chart of TSM Security Agent client.
Fig. 3 is the structure chart of security proxy server.
Embodiment
As shown in Figure 1, a kind of transfer of data encrypting and deciphering system, it comprises TSM Security Agent client and the security proxy server that makes up based on secure socket layer protocol, connects by public network communication between TSM Security Agent client and the security proxy server.In data transmission, the TSM Security Agent client is delivered to security proxy server after with the headend equipment data encryption of receiving, security proxy server is given access server after with data deciphering; Security proxy server receives the data that access server is issued headend equipment, will send to the TSM Security Agent client after the data encryption, sends to headend equipment after the deciphering of TSM Security Agent client.
On hardware configuration, the TSM Security Agent client comprises CPU and the SATA and the DDR that are connected with CPU, and CPU also connects headend equipment and public network by Ethernet interface, as shown in Figure 2.
As shown in Figure 3, security proxy server comprises CPU and the SATA and the DDR that are connected with CPU, and CPU also connects access server and public network by Ethernet interface.

Claims (3)

1. transfer of data encrypting and deciphering system, it is characterized in that: it comprises TSM Security Agent client and the security proxy server that makes up based on secure socket layer protocol, connects by public network communication between TSM Security Agent client and the security proxy server; Described TSM Security Agent client is delivered to security proxy server after with the headend equipment data encryption of receiving, gives access server after the security proxy server deciphering; Described security proxy server receives the data that access server is issued headend equipment, sends to the TSM Security Agent client after the encryption, sends to headend equipment after the deciphering of TSM Security Agent client.
2. transfer of data encrypting and deciphering system according to claim 1 is characterized in that: described TSM Security Agent client comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU is also by Ethernet interface connection headend equipment and public network.
3. transfer of data encrypting and deciphering system according to claim 1 is characterized in that: described security proxy server comprises CPU and the SATA and the DDR that are connected with CPU, and described CPU is also by Ethernet interface connection access server and public network.
CN201220335723.3U 2012-07-12 2012-07-12 Data transmission encrypting and decrypting system Expired - Fee Related CN202679412U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201220335723.3U CN202679412U (en) 2012-07-12 2012-07-12 Data transmission encrypting and decrypting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201220335723.3U CN202679412U (en) 2012-07-12 2012-07-12 Data transmission encrypting and decrypting system

Publications (1)

Publication Number Publication Date
CN202679412U true CN202679412U (en) 2013-01-16

Family

ID=47500283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201220335723.3U Expired - Fee Related CN202679412U (en) 2012-07-12 2012-07-12 Data transmission encrypting and decrypting system

Country Status (1)

Country Link
CN (1) CN202679412U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105407068A (en) * 2014-06-30 2016-03-16 优视科技有限公司 Network data obtaining method, device and system
CN107222493A (en) * 2017-06-26 2017-09-29 浪潮软件股份有限公司 ORACLE-JDBC data transmission channel encryption compression system and method
CN112671733A (en) * 2020-12-16 2021-04-16 平安科技(深圳)有限公司 Data communication method, key management system, device, and storage medium
CN112685301A (en) * 2020-12-28 2021-04-20 浙江国利网安科技有限公司 Fuzzy test method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105407068A (en) * 2014-06-30 2016-03-16 优视科技有限公司 Network data obtaining method, device and system
CN105407068B (en) * 2014-06-30 2019-02-15 优视科技有限公司 Network Data Capture methods, devices and systems
CN107222493A (en) * 2017-06-26 2017-09-29 浪潮软件股份有限公司 ORACLE-JDBC data transmission channel encryption compression system and method
CN112671733A (en) * 2020-12-16 2021-04-16 平安科技(深圳)有限公司 Data communication method, key management system, device, and storage medium
CN112685301A (en) * 2020-12-28 2021-04-20 浙江国利网安科技有限公司 Fuzzy test method and device

Similar Documents

Publication Publication Date Title
CN104094267B (en) Method, apparatus and system for secure sharing of media content from a source device
EP2830282A1 (en) Storage method, system and device
US10937339B2 (en) Digital cryptosystem with re-derivable hybrid keys
CN104378649B (en) It is a kind of that real-time encrypted method and system being carried out to video flowing using the close SM1 algorithms of state
US20170118020A1 (en) Data communication method, system and gateway for in-vehicle network including a plurality of subnets
KR101668033B1 (en) An improved implementation of robust and secure content protection in a system-on-a-chip apparatus
CN104052658A (en) Privacy protection system and method based on social network
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
TW201417546A (en) Instant messaging method and system
ATE406068T1 (en) KEY DEVELOPMENT METHOD AND DEVICE IN A COMMUNICATIONS SYSTEM
CN104243510B (en) A kind of secure network storage system and method
CN202679412U (en) Data transmission encrypting and decrypting system
GB201016672D0 (en) Secure exchange/authentication of electronic documents
CN107155184B (en) WIFI module with secure encryption chip and communication method thereof
CN102045343B (en) DC (Digital Certificate) based communication encrypting safety method, server and system
CN105049953A (en) Set-top-box data encryption method and system
CN104936172A (en) Beidou positioning data transmission encryption system
CN102932345B (en) A kind of information transferring method, Apparatus and system
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN105681027A (en) HSM encrypted information synchronization method, device and system
CN104333546A (en) Data transmission isolation method and data transmission isolation device based on SDI (serial digital interface) bus
CN102882897A (en) Cookie protecting method and device
WO2013163861A1 (en) Method, device and system for proxy transformation
CN116232880A (en) Virtual private network establishment method and system based on security isolation
CN101895878A (en) Dynamic password configuration based mobile communication method and system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 450000 Henan province Zhengzhou City Dawn Road No. 66

Patentee after: HENAN ZHIYUN DATA INFORMATION TECHNOLOGY CO.,LTD.

Address before: 450000 Henan province Zhengzhou City Dawn Road No. 66

Patentee before: Zhengzhou Xinda Xin'an Technology Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130116

Termination date: 20210712

CF01 Termination of patent right due to non-payment of annual fee