CN104363221A - Network safety isolation file transmission control method - Google Patents
Network safety isolation file transmission control method Download PDFInfo
- Publication number
- CN104363221A CN104363221A CN201410629644.7A CN201410629644A CN104363221A CN 104363221 A CN104363221 A CN 104363221A CN 201410629644 A CN201410629644 A CN 201410629644A CN 104363221 A CN104363221 A CN 104363221A
- Authority
- CN
- China
- Prior art keywords
- intranet
- message
- file
- outer net
- control end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to a safety isolation file transmission control method, in particular to a file transmission control method between taxation network safety isolation systems. A transmission control system comprises an external network isolation firewall, an external network control end, an external network transmitting end, an external network receiving end, an internal network transmitting end, an internal network receiving end, an internal network control end and an internal network isolation firewall. A computer system, a virtual machine system and the isolation firewalls are combined to achieved a relatively universal safety data transmission manner, safe and reliable bidirectional data transmission is achieved by the control method with a special safety protocol, confidentiality, completeness and non-repudiation during information transmission are achieved by safety techniques such as data encryption, digital signatures and information authentication codes, data exchanging performance is increased while safety of internal and external network systems is guaranteed, and the whole system can work reliably and stably.
Description
Technical field
The present invention relates to a kind of network security isolation control method, be specifically related to file transfer control method between a kind of tax network security shielding system.Be applicable to the transmitting data between networks different security classification, while guarantee network security, realize the high efficiency of transmission of file between heterogeneous networks.
Background technology
Isolation concept is when producing to protect when high safety grade network environment, period experienced by five generation isolation technology change.First generation isolation technology---isolate completely: the method makes network be in information island state, accomplish physical isolation completely, need at least two cover network and systems, the more important thing is the inconvenience of information interchange and the raising of cost, bring great inconvenience to like this maintenance and use.Second generation isolation technology---hardware card is isolated: increase by one piece of hardware card in client, first client hard disk or other memory devices are connected to this card, and then are transferred on mainboard, can control client hard disk or other memory devices by this card.And when selecting different hard disks, have selected network interfaces different on this card simultaneously, being connected to different networks.But what this isolated product had still needs network layout to be two net line structures, and product also exists larger potential safety hazard.Third generation isolation technology---data retransmission is isolated: utilize the approach of broadcast relay system timesharing xcopy to realize isolation, switching time very, even needs manual completing, not only slow down access speed significantly, more do not support common network application, lose the meaning that network exists.Forth generation isolation technology---air switch is isolated: it is by using single-pole double-throw switch (SPDT), makes inside and outside network timesharing access temporary buffer to complete exchanges data, but there is many problems in safety and performance.5th generation isolation technology---escape way is isolated: this technology is by the security mechanism such as private communication hardware and private secure protocol, realize isolation and the exchanges data of inside and outside network, isolation technology Problems existing before not only solving, and effectively inside and outside Network Isolation is come, and achieve the secure exchange of intranet and extranet data efficiently, transparent support multiple network application, becomes the developing direction of current isolation technology.
There are following distinct issues in current network isolation:
(1) Network Isolation adopts unresponsive mechanism when transmitting data, causes information or data integrity not to ensure.High and low level of confidentiality net only has one simultaneously and is connected with xegregating unit under Network Isolation condition, and like this, the communication protocol that " shaking hands " confirms cannot use, and therefore just must adopt unidirectional unresponsive transmission mechanism in isolation transmission.Although ensure that the fail safe of data like this, the problem brought be receiving terminal without feedback signal, cause user cannot find mistake, incomplete information.Therefore, how guarantee information transmission time the integrality of data, correctness become the critical problem of data no-feedback one-way transmission between different security level net.
(2) in Network Isolation situation, data are transmitted, High Security Level net and Low Security Level net have simultaneously and one can only be had to set up the connection of specialized protocol to reach the object transmitting data with xegregating unit, can not ensure that the data importing High Security Level net from Low Security Level net into can not cause High Security Level systemic breakdown or make it be destroyed like this, therefore High Security Level system safety problem is also a problem needing solution badly.
Therefore for Network Isolation, following requirement is proposed:
(1) data stably can be transferred to High Security Level net by Low Security Level net;
(2) message transmission rate should reach higher requirement;
(3) ensure that core classified network is not by the frontal attack of hacker;
(4) data received reach certain requirement in integrality.
Summary of the invention
Based on the 5th generation technology of network isolation, the object of the invention is to realize safe and reliable forward and reverse transfer of data by the control method of private secure protocol, thus while ensureing internal-external network system safety, the performance of exchanges data can be promoted again, and make the reliable and stable work of whole system.
The present invention is achieved through the following technical solutions: the technical solution realizing target of the present invention is information transmission and control system between a kind of network security shielding system, it is characterized in that: this system composition comprises outer net isolation fire compartment wall, outer net control end, external network sending end, outer net receiving terminal, Intranet transmitting terminal, Intranet receiving terminal, Intranet control end and Intranet isolation fire compartment wall.Transmission of messages is divided into: when 1, outer net sends file to Intranet, outer net main frame is transmitting terminal, and intranet host is receiving terminal, and first message be submitted to outer net control end, is responsible for data to submit to Intranet, carries out safety data transmission by outer net control end.2, when Intranet sends file to outer net, outer net main frame is receiving terminal, and intranet host is transmitting terminal, and first message be submitted to Intranet control end, is responsible for data to submit to outer net, carries out safety data transmission by Intranet control end.
The data transmission method utilizing above-mentioned data transmission system to implement, is characterized in that:
(1) utilize outer net isolation fire compartment wall and Intranet isolation fire compartment wall to realize the Network Isolation of Inside and outside network, isolation fire compartment wall, only to particular ip address and protocol open, ensures network security;
(2) utilize outer net control end and Intranet control end to realize the access authentication of outbound communication terminal and Intranet communication terminal, only have validated user ability usage data transmission system, control end also realizes the Content inspection to transfer files, ensures content safety;
(3) message that S/MIME encapsulate data transmits is utilized, the particular data of text, image, sound, video and other application program can be transmitted, receipt service is provided, there is provided following encryption safe service: certification, integrity protection, qualification and data confidentiality etc., ensure the confidentiality in message transmitting procedure, integrality and resisting denying;
(4) external network sending end and Intranet receiving terminal is utilized to realize the one-way transmission of outer net to Intranet, Intranet transmitting terminal and outer net receiving terminal realize the one-way transmission of Intranet to outer net, coordinate the proprietary message envelope format based on file, realize the information exchange of the safety between Inside and outside network.
(5) external network sending end and Intranet receiving terminal are two virtual machines on a physical machine, communicated by Microsoft Loopback Adapter between them, half Intel Virtualization Technology is utilized to set up by shared drive the high-speed communication that communication port realizes between virtual machine, outer net receiving terminal and Intranet transmitting terminal are two virtual machines on a physical machine, and communication mode is similar.
Advantage and effect:
The invention provides a kind of technology and method of network isolation system Data Transmission Controlling, this technology utilizes computer system, dummy machine system, isolation fire compartment wall combines achieves a kind of comparatively general safety data transmission mode, at hardware aspect, the present invention is made up of electronic equipments such as computer, isolation fire compartment wall, server, web-transporting device, data servers, the communication path redundant configuration safeguards system reliability of its visual plant; Utilize data encryption, digital signature ensures the confidentiality in message transmitting procedure, integrality and resisting denying; Between intranet and extranet, information exchange employs the safety that proprietary protocol ensures message.
The feature of this technology:
1, use S/MIME protocol encapsulation message format, and receipt service is provided, provide following encryption safe service: certification, integrity protection, qualification and data confidentiality etc., ensure the confidentiality in message transmitting procedure, integrality and resisting denying;
2, external network sending end and Intranet receiving terminal are two virtual machines on a physical machine, communicated by Microsoft Loopback Adapter between them, half Intel Virtualization Technology is utilized to set up by shared drive the high-speed communication that communication port realizes between virtual machine, coordinate proprietary communication protocol, realize the information exchange of the high-speed secure between Inside and outside network.
Accompanying drawing explanation
Fig. 1 is network architecture diagram of the present invention.
Fig. 2 is the network architecture of external network sending end of the present invention and Intranet receiving terminal.
Fig. 3 is outer net receiving terminal and Intranet transmitting terminal.
Fig. 4 be the present invention is based on file transfer Inside and outside network shielding system between message transmission mode.
Fig. 5 is transmission document flowchart of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail:
Fig. 1 is network architecture diagram of the present invention, comprises outer net control end, external network sending end, outer net receiving terminal, Intranet receiving terminal, Intranet transmitting terminal and Intranet control end and outer net isolation fire compartment wall and Intranet isolation fire compartment wall.
Outer net control end and Intranet control end are operated in the industrial computer of a Multi-netmouth, and as Core server, the parsing being specifically responsible for whole transmission control protocol performs, and bears storage and the forwarding work of shared file, make the mutual more controlled and efficient of file.
Fig. 2 is the network architecture of external network sending end and Intranet receiving terminal, external network sending end and Intranet receiving terminal are two virtual machines on a physical server, physical machine is installed multiple network interface card, one of them network interface card connects outer net, a network interface card connects Intranet, external network sending end virtual machine binds the network interface card of outer net by bridge joint mode, Intranet receiving terminal virtual machine binds Intranet network interface card by bridge joint mode, two virtual machines add second piece of network interface card respectively with the same Microsoft Loopback Adapter of Host-only pattern connection physical machine, and two virtual machines are communicated by this Microsoft Loopback Adapter.The network configuration signal of Fig. 3 two virtual machines that to be outer net receiving terminal and Intranet transmitting terminal be on a physical server, their internetwork connection mode and external network sending end and Intranet receiving terminal similar.Outer net control end two network interfaces, one is connected to outer net firewall configuration IP address is IP1, can with outer net terminal communication, another one is connected to external network sending end and outer net receiving terminal configuration of IP address is IP2.Intranet control end two network interfaces, one is connected to Intranet firewall configuration IP address is IP3, can with Intranet terminal communication, another one is connected to Intranet transmitting terminal and Intranet receiving terminal configuration of IP address is IP4.
Outer net fire compartment wall isolation the Internet and outer net control end, outer net firewall configuration is only allow the datagram of leading to outer net control end IP address ip 1 and designated port to pass through, and Intranet firewall configuration is only allow the data of leading to Intranet control end IP address ip 3 and designated port to pass through.
The network interface of outer net control end IP2, an internal network address section is configured with external network sending end and outer net receiving terminal, each network interface configuration of IP address, there is no gateway, arranging rule makes outer net receiving terminal can only send data to outer net control end by IP2, external network sending end can only send data to outer net control end, can not communicate between external network sending end and outer net receiving terminal.
The network interface of Intranet control end IP4, another one internal network address section is configured with Intranet transmitting terminal and Intranet receiving terminal, each network interface configuration of IP address, there is no gateway, arranging rule makes Intranet receiving terminal can only send data to Intranet control end by IP4, Intranet transmitting terminal can only send data to Intranet control end, can not communicate between Intranet transmitting terminal and Intranet receiving terminal.
Second network interface of external network sending end and Intranet receiving terminal is connected to Microsoft Loopback Adapter by Host-only pattern, the another one network segment is set, arranging rule makes Intranet receiving terminal can only be received from the data of external network sending end by this IP, and Intranet receiving terminal can not send data to external network sending end.
Second network interface of outer net receiving terminal and Intranet transmitting terminal is connected to Microsoft Loopback Adapter by Host-only pattern, the another one network segment is set, arranging rule makes outer net receiving terminal can only be received from the data of Intranet transmitting terminal by this IP, and outer net receiving terminal can not send data to Intranet transmitting terminal.
Fig. 4 describe this programme design based on file transfer Inside and outside network shielding system between message transmission mode.Transmit leg, document handling unit is for relevant treatment before file transfer, fail safe and the efficiency of file transfer can be improved, its course of work is as follows: first will receive message and split the multiple sequential file of generation by agreement prescribed level, finally add current time stamp and a HMAC file generated based on transmit leg and recipient's shared key, recipient can the source of authenticating documents by shared key, and the validity of authenticating documents, gives each file designation again according to naming rule.Fractionation file designation rule: the serial number of session id number+split total number of files order+this file.Then the file after fractionation is sent buffer directory.Recipient, document handling unit is used for finishing receiving rear associative operation, will split file access pattern to original according to configuration information file.
The method that HMAC generates: set shared key as K, number of files is n, and current time is Timestamp, and each file is set to F
1, F
2..., F
n:
HMAC
1=HASH(K||F
1)
HMAC
i=HASH(HMAC
i-1||F
i)(n>i>1),
HMAC=HASH(HMAC
n-1||F
n||Timestamp||K)。Last HMAC is the authentication information that this secondary data sends.
After recipient receives, first whether the proving time is in the error allowed, and the shared key K ' then utilizing it to preserve by the same way carries out same computing, and unanimously whether, if unanimously show, transmit leg identity is correct to more last HMAC.
In order to complete relevant operation and function, Inside and outside network has been come by the message of certain specific format, and message format adopts the form of S/MIME to encapsulate.Message carries order and file data, completes the mutual of intranet and extranet data.
Control end major function is the message that analyzing and processing intranet and extranet receive, and realizes relevant operation according to the order of message, and the result of operation is packaged into protocol massages feeds back to transmit leg.The mechanism for the treatment of and analysis is determined according to the form of message.
The human-computer interaction module of Inside and outside network works in the main frame of intranet and extranet respectively, and human-computer interaction module is responsible for the mutual of external user and Intranet system, is positioned at the periphery of system architecture.Human-computer interaction module mainly provides the functional interface based on window, for user provides order inputting interface, and user friendly operation.
According to Fig. 5 transmission document flowchart of the present invention, when outer net main frame to intranet host request send file time, namely by outer net main frame human-computer interaction module from human-computer interaction module to intranet host send file, the course of work of the present invention is as follows:
The each unit of step 1, start up system, outer net control end is the file transfer management server of extra-net part, be responsible for external user end, the certification of external network sending end and outer net receiving terminal, Intranet control end is the file transfer management server of internal network part, be responsible for Intranet user end, the certification of Intranet transmitting terminal and Intranet receiving terminal, certification can consult a session key by rear both sides;
First step 2, transmitting terminal user need log file transmission system, carry out certification by outer net control end to the identity of user, and certification can see contacts list after passing through, during certification and control end consult a session key.
The recipient of step 3, transmitting terminal user select File from contacts list, sends file or message, and user side generates and sends message packet, and message content comprises recipient information, sender information, current time information, type of message, message body.Message packet uses the session key of user to protect, and message packet form uses S/MIME encapsulation, and message sends to outer net control end.
After step 4, outer net control end receive message, the legitimacy of checking message, carry out security inspection (as used antivirus software) to message, forward the message to external network sending end after being verified, message uses session key to protect;
After step 5, external network sending end receipt message, first the legitimacy of session key checking message is used, by laggard row Document encapsulation, document handling unit process needs the file of transmission, if the size of file exceedes the threshold value of fractionation, then file declustering is become the file of multiple fixed size, by filename rule, each file is numbered, use pre-assigned key to carry out protection and generate HMAC file;
Step 6, file transfer: external network sending end main frame by split after data file, through Microsoft Loopback Adapter by being transferred to Intranet receiving terminal main frame;
Step 7, Piece file mergence: Intranet receiving terminal host receiving data file, and according to filename rule, file is merged, be repackaged into message, use session key to protect, and send Intranet control end to;
Step 8, message sink: after Intranet control end receives message, checking message legitimacy, to message carry out security inspection (as use antivirus software), by after forward the message to receiving terminal, message use session key protect.
Step 9, user check: user side receives prompting message user and checks, if transmitting terminal requires to provide receipt, automatically send receipt to sender when user opens message, receipt uses the private key attest validity of recipient.
Repeat above step, in the human-computer interaction module of request end main frame, increase the submodule of task scheduling function, multitask, the concurrent transmission file of multi-user and download file can be realized.
During the human-computer interaction module request download file of request end main frame, if the file of outer net is downloaded in request, directly download, do not need through network isolation system.If the file of request Intranet, first request end sends file request message to object contact person or systems share files folder (being controlled by Intranet control end), the transmitting procedure process described above of message, after object contact person or Intranet control end receipt message, whether allow to send file according to rule judgment, if allow, according to upper described process, file is sent to request end:
It is identical to the step of intranet host request download file with outer net main frame that the step that intranet host outside net host request sends file and intranet host outside net host request download file and outer net main frame send file to intranet host request.
The present invention can solve unilateral network safety insulating device can not be mutual, the shortcoming of data interchange poor performance, download file can be uploaded in batches, upload the bandwidth upper limit that speed of download reaches network isolating device, support concurrent, improve the intranet and extranet exchanges data efficiency of isolated device isolation, the present invention supports encryption, the safe practices such as signature, can ensure the confidentiality in message transmitting procedure, integrality and non-repudiation.
Claims (5)
1. an information transmission and control system between network security shielding system, is characterized in that: this system composition comprises outer net isolation fire compartment wall, outer net control end, external network sending end, outer net receiving terminal, Intranet transmitting terminal, Intranet receiving terminal, Intranet control end and Intranet isolation fire compartment wall; Transmission of messages is divided into: when a. outer net sends file to Intranet, outer net main frame is transmitting terminal, and intranet host is receiving terminal, and first message be submitted to outer net control end, is responsible for data to submit to Intranet, carries out transfer of data by outer net control end; B., when Intranet sends file to outer net, outer net main frame is receiving terminal, and intranet host is transmitting terminal, and first message be submitted to Intranet control end, is responsible for data to submit to outer net, carries out transfer of data by Intranet control end.
2. the data transmission method implemented of data transmission system according to claim 1, is characterized in that:
(1) between outer net computer and outer net control end, isolated device is connected with; Connect between inner net computer and Intranet control end and be also provided with isolated device;
(2) net control end and Intranet control end realize the access authentication of outbound communication terminal and Intranet communication terminal outside, and control end realizes the Content inspection to transfer files, ensure content safety;
(4) external network sending end and Intranet receiving terminal realize the one-way transmission of outer net to Intranet, and Intranet transmitting terminal and outer net receiving terminal realize the one-way transmission of Intranet to outer net;
(5) external network sending end and Intranet receiving terminal are two virtual machines on a physical server, physical machine is installed multiple network interface card, one of them network interface card connects outer net, a network interface card connects Intranet, external network sending end virtual machine binds the network interface card of outer net by bridge joint mode, Intranet receiving terminal virtual machine binds Intranet network interface card by bridge joint mode, two virtual machines add second piece of network interface card respectively with the same Microsoft Loopback Adapter of Host-only pattern connection physical machine, and two virtual machines are communicated by this Microsoft Loopback Adapter; Outer net receiving terminal and Intranet transmitting terminal are two virtual machines on a physical machine, and communication mode is similar.
3. the data transmission method implemented of data transmission system according to claim 1, is characterized in that the message that system utilizes S/MIME encapsulate data and transmits, the particular data of transmission text, image, sound, video and other application program.
4. the data transmission method implemented of data transmission system according to claim 1, is characterized in that message transmission mode between the Inside and outside network shielding system that system uses based on file transfer; Its course of work is as follows: first will receive message and split the multiple sequential file of generation by agreement prescribed level, finally add current time stamp and a HMAC file generated based on transmit leg and recipient's shared key, recipient can the source of authenticating documents by shared key, the validity of authenticating documents, gives each file designation again according to naming rule; Fractionation file designation rule: the serial number of session id number+split total number of files order+this file; Then the file after fractionation is sent buffer directory; Recipient, document handling unit is used for finishing receiving rear associative operation, will split file access pattern to original according to configuration information file.
5. the data transmission method implemented of data transmission system according to claim 1, is characterized in that comprising the steps:
Outer net main frame to intranet host request send file time, namely by outer net main frame human-computer interaction module from human-computer interaction module to intranet host send file, step is as follows:
The each unit of step 1, start up system, outer net control end to external user end, the certification of external network sending end and outer net receiving terminal, Intranet control end is to Intranet user end, the certification of Intranet transmitting terminal and Intranet receiving terminal, certification can consult a session key by rear both sides;
First step 2, transmitting terminal user need log file transmission system, carry out certification by outer net control end to the identity of user, and certification can see contacts list after passing through;
The recipient of step 3, transmitting terminal user select File from contacts list, sends file or message, and user side generates and sends message packet, and message content comprises recipient information, sender information, current time information, type of message, message body; Message packet uses the session key of user to protect, and message packet form uses S/MIME encapsulation, and message sends to outer net control end;
After step 4, outer net control end receive message, the legitimacy of checking message, carries out security inspection to message, forwards the message to external network sending end after being verified, and message uses session key to protect;
After step 5, external network sending end receipt message, first the legitimacy of session key checking message is used, by laggard row Document encapsulation, document handling unit process needs the file of transmission, if the size of file exceedes the threshold value of fractionation, then file declustering is become the file of multiple fixed size, by filename rule, each file is numbered, use pre-assigned key to carry out protection and generate HMAC file;
Step 6, file transfer: external network sending end main frame by split after data file, through Microsoft Loopback Adapter by being transferred to Intranet receiving terminal main frame;
Step 7, Piece file mergence: Intranet receiving terminal host receiving data file, and according to filename rule, file is merged, be repackaged into message, use session key to protect, and send Intranet control end to;
Step 8, message sink: after Intranet control end receives message, checking message legitimacy, security inspection is carried out to message, by after forward the message to receiving terminal, message use session key protect;
Step 9, user check: user side receives prompting message user and checks, if transmitting terminal requires to provide receipt, automatically send receipt to sender when user opens message, receipt uses the private key attest validity of recipient;
When the outside net host request of intranet host sends file, namely send file by the human-computer interaction module of the outside host's machine of the human-computer interaction module of intranet host, step is as follows:
The each unit of step 1, start up system, outer net control end to external user end, the certification of external network sending end and outer net receiving terminal, Intranet control end is to Intranet user end, the certification of Intranet transmitting terminal and Intranet receiving terminal, certification can consult a session key by rear both sides;
First step 2, transmitting terminal user need log file transmission system, carry out certification by Intranet control end to the identity of user, and certification can see contacts list after passing through;
The recipient of step 3, transmitting terminal user select File from contacts list, sends file or message, and user side generates and sends message packet, and message content comprises recipient information, sender information, current time information, type of message, message body; Message packet uses the session key of user to protect, and message packet form uses S/MIME encapsulation, and message sends to Intranet control end;
After step 4, Intranet control end receive message, the legitimacy of checking message, carries out security inspection to message, is verified rear forwarding messages Intranet transmitting terminal, and message uses session key to protect;
After step 5, Intranet transmitting terminal receipt message, first the legitimacy of session key checking message is used, by laggard row Document encapsulation, document handling unit process needs the file of transmission, if the size of file exceedes the threshold value of fractionation, then file declustering is become the file of multiple fixed size, by filename rule, each file is numbered, use pre-assigned key to carry out protection and generate HMAC file;
Step 6, file transfer: Intranet transmitting terminal main frame by split after data file, through Microsoft Loopback Adapter by being transferred to outer net receiving terminal main frame;
Step 7, Piece file mergence: outer net receiving terminal host receiving data file, and according to filename rule, file is merged, be repackaged into message, use session key to protect, and send outer net control end to;
Step 8, message sink: after outer net control end receives message, checking message legitimacy, security inspection is carried out to message, by after forward the message to receiving terminal, message use session key protect;
Step 9, user check: user side receives prompting message user and checks, if transmitting terminal requires to provide receipt, automatically send receipt to sender when user opens message, receipt uses the private key attest validity of recipient.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410629644.7A CN104363221A (en) | 2014-11-10 | 2014-11-10 | Network safety isolation file transmission control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410629644.7A CN104363221A (en) | 2014-11-10 | 2014-11-10 | Network safety isolation file transmission control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104363221A true CN104363221A (en) | 2015-02-18 |
Family
ID=52530447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410629644.7A Pending CN104363221A (en) | 2014-11-10 | 2014-11-10 | Network safety isolation file transmission control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104363221A (en) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104618214A (en) * | 2015-03-06 | 2015-05-13 | 北京深思数盾科技有限公司 | Method and system for transmitting information by constructing local area network |
CN104639418A (en) * | 2015-03-06 | 2015-05-20 | 北京深思数盾科技有限公司 | Method and system for information transmission by constructing local area network |
CN104753962A (en) * | 2015-04-23 | 2015-07-01 | 厦门雅迅网络股份有限公司 | OBD (On-board diagnostics) safety management method and system |
CN105516094A (en) * | 2015-11-27 | 2016-04-20 | 蓝网科技股份有限公司 | Industrial computer based internal-external network data exchange method and apparatus |
CN106230806A (en) * | 2016-07-26 | 2016-12-14 | 中国南方电网有限责任公司信息中心 | Blended data custom protocol communication system under tertiary-structure network environment and method |
CN106685992A (en) * | 2017-02-14 | 2017-05-17 | 厦门畅享信息技术有限公司 | Over-network safe exchange and interactive application system based on unidirectional transmission technology, and method thereof |
CN106790151A (en) * | 2016-12-29 | 2017-05-31 | 中铁信安(北京)信息安全技术有限公司 | A kind of data isolation Transmission system and method |
CN106973050A (en) * | 2017-03-23 | 2017-07-21 | 山东中创软件商用中间件股份有限公司 | A kind of method and device of inter-network lock information sharing |
CN106998333A (en) * | 2017-05-24 | 2017-08-01 | 山东省计算中心(国家超级计算济南中心) | A kind of bilateral network security isolation system and method |
CN107026850A (en) * | 2017-03-17 | 2017-08-08 | 江苏曙光信息技术有限公司 | A kind of intranet and extranet document exchange method |
CN107122474A (en) * | 2017-05-02 | 2017-09-01 | 山东浪潮通软信息科技有限公司 | System document docking technique implementation method under a kind of network physical isolation environment |
CN107172020A (en) * | 2017-04-28 | 2017-09-15 | 湖北微源卓越科技有限公司 | A kind of network data security exchange method and system |
CN107409139A (en) * | 2015-03-31 | 2017-11-28 | 西门子公司 | For feedback-less transmit single channel coupling device, inquiry mechanism and the method for data |
CN107438082A (en) * | 2017-09-04 | 2017-12-05 | 安徽爱她有果电子商务有限公司 | A kind of network safety system based on intranet and extranet separation |
CN108040122A (en) * | 2017-12-26 | 2018-05-15 | 迈普通信技术股份有限公司 | Document transmission method and device |
CN108769076A (en) * | 2018-07-06 | 2018-11-06 | 北京绪水互联科技有限公司 | Data collecting system, method and device with network isolation function |
CN108809975A (en) * | 2018-06-07 | 2018-11-13 | 北京网迅科技有限公司杭州分公司 | A kind of tertiary-structure network system and the method for realizing tertiary-structure network |
CN108833395A (en) * | 2018-06-07 | 2018-11-16 | 北京网迅科技有限公司杭州分公司 | A kind of outer net access authentication system and authentication method based on hardware access card |
CN108881270A (en) * | 2018-07-02 | 2018-11-23 | 浪潮软件股份有限公司 | A kind of software-based safety isolation network gate |
CN109660829A (en) * | 2018-12-20 | 2019-04-19 | 北京东土科技股份有限公司 | Media transmission method and system between a kind of close network of height |
CN109787986A (en) * | 2019-01-29 | 2019-05-21 | 黄策 | File fragmentation public network safe transmission method |
CN109800050A (en) * | 2018-11-22 | 2019-05-24 | 海光信息技术有限公司 | A kind of EMS memory management process of virtual machine, device, relevant device and system |
CN110166240A (en) * | 2019-06-25 | 2019-08-23 | 南方电网科学研究院有限责任公司 | Network isolation password board card |
CN110535722A (en) * | 2019-08-27 | 2019-12-03 | 江苏瑞中数据股份有限公司 | A kind of full link operation and monitoring method of the micro services in cross-safety zone domain |
CN111144159A (en) * | 2019-12-11 | 2020-05-12 | 中国电子科技集团公司第三十研究所 | One-way transmission system based on two-dimensional code |
CN111901418A (en) * | 2020-07-28 | 2020-11-06 | 北京中科麒麟信息工程有限责任公司 | External terminal protection equipment and system based on one-way file transfer protocol |
CN111935017A (en) * | 2020-10-14 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Cross-network application calling method and device and routing equipment |
CN112019542A (en) * | 2020-08-28 | 2020-12-01 | 航天科工网络信息发展有限公司 | Cross-network safety e-mail system |
CN112218269A (en) * | 2020-10-10 | 2021-01-12 | 中车青岛四方机车车辆股份有限公司 | Train information security gateway system, data transmission method and locomotive |
CN112367327A (en) * | 2020-11-13 | 2021-02-12 | 国网冀北电力有限公司唐山供电公司 | Power secondary equipment debugging safety access communication device and method |
CN112383395A (en) * | 2020-12-11 | 2021-02-19 | 海光信息技术股份有限公司 | Key agreement method and device |
CN112637149A (en) * | 2020-12-11 | 2021-04-09 | 广东电力通信科技有限公司 | Data communication method between asymmetric security policy partitions |
CN112637114A (en) * | 2019-09-24 | 2021-04-09 | 西门子股份公司 | Method and device for monitoring data exchange of industrial edge equipment |
CN112714124A (en) * | 2020-12-28 | 2021-04-27 | 格美安(北京)信息技术有限公司 | Cross-network and cross-border based data access security authentication method and system |
CN112866351A (en) * | 2020-12-31 | 2021-05-28 | 成都佳华物链云科技有限公司 | Data interaction method, device, server and storage medium |
CN113645248A (en) * | 2021-08-17 | 2021-11-12 | 公安部交通管理科学研究所 | Data exchange system and method under cross-network environment |
CN113704781A (en) * | 2021-07-23 | 2021-11-26 | 平安银行股份有限公司 | File secure transmission method and device, electronic equipment and computer storage medium |
CN113949523A (en) * | 2021-08-30 | 2022-01-18 | 国网安徽省电力有限公司电力科学研究院 | Cross-network transmission system and method for individual soldier |
CN113965395A (en) * | 2021-10-28 | 2022-01-21 | 绿盟科技集团股份有限公司 | Method, system and device for safely accessing intranet in real time |
CN113992372A (en) * | 2021-10-20 | 2022-01-28 | 国网辽宁省电力有限公司盘锦供电公司 | Optical isolation one-way network data transmission device |
CN114301643A (en) * | 2021-12-17 | 2022-04-08 | 苏州市保慧智能科技有限公司 | Electronic data authentication encryption transmission method |
CN114553528A (en) * | 2022-02-22 | 2022-05-27 | 成都睿智兴华信息技术有限公司 | Internal and external network data safety transmission system and transmission method thereof |
WO2022174509A1 (en) * | 2021-02-17 | 2022-08-25 | 黄策 | Method for designing firewall |
CN115065548A (en) * | 2022-07-19 | 2022-09-16 | 西安热工研究院有限公司 | Enhanced network security access area data management and control system and method |
CN115314323A (en) * | 2022-10-10 | 2022-11-08 | 深圳市华云中盛科技股份有限公司 | Information transmission method and system |
CN115834584A (en) * | 2022-11-23 | 2023-03-21 | 重庆紫光华山智安科技有限公司 | Cross-network data transmission method, device, equipment and medium |
CN116346391A (en) * | 2022-10-26 | 2023-06-27 | 广东省土地调查规划院 | Method, device and storage medium for information interaction between home and abroad survey data and internet |
CN116471103A (en) * | 2023-05-04 | 2023-07-21 | 深圳市显科科技有限公司 | Internal and external network data security exchange method, device and equipment based on boundary network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764768A (en) * | 2010-01-19 | 2010-06-30 | 北京锐安科技有限公司 | Data security transmission system |
CN101977188A (en) * | 2010-10-14 | 2011-02-16 | 中国科学院计算技术研究所 | Malicious program detection system |
CN102843352A (en) * | 2012-05-15 | 2012-12-26 | 广东电网公司茂名供电局 | Cross-physical isolation data transparent transmission system and method between intranet and extranet |
CN103491072A (en) * | 2013-09-06 | 2014-01-01 | 北京信息控制研究所 | Boundary access control method based on double one-way separation gatekeepers |
CN103812704A (en) * | 2014-02-25 | 2014-05-21 | 国云科技股份有限公司 | Public network IP (Internet Protocol) dynamic management method for virtual machine |
-
2014
- 2014-11-10 CN CN201410629644.7A patent/CN104363221A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764768A (en) * | 2010-01-19 | 2010-06-30 | 北京锐安科技有限公司 | Data security transmission system |
CN101977188A (en) * | 2010-10-14 | 2011-02-16 | 中国科学院计算技术研究所 | Malicious program detection system |
CN102843352A (en) * | 2012-05-15 | 2012-12-26 | 广东电网公司茂名供电局 | Cross-physical isolation data transparent transmission system and method between intranet and extranet |
CN103491072A (en) * | 2013-09-06 | 2014-01-01 | 北京信息控制研究所 | Boundary access control method based on double one-way separation gatekeepers |
CN103812704A (en) * | 2014-02-25 | 2014-05-21 | 国云科技股份有限公司 | Public network IP (Internet Protocol) dynamic management method for virtual machine |
Cited By (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104618214A (en) * | 2015-03-06 | 2015-05-13 | 北京深思数盾科技有限公司 | Method and system for transmitting information by constructing local area network |
CN104639418A (en) * | 2015-03-06 | 2015-05-20 | 北京深思数盾科技有限公司 | Method and system for information transmission by constructing local area network |
CN104618214B (en) * | 2015-03-06 | 2018-07-06 | 北京深思数盾科技股份有限公司 | The method and system that structure LAN is transmitted into row information |
CN104639418B (en) * | 2015-03-06 | 2018-04-27 | 北京深思数盾科技股份有限公司 | The method and system that structure LAN is transmitted into row information |
CN107409139A (en) * | 2015-03-31 | 2017-11-28 | 西门子公司 | For feedback-less transmit single channel coupling device, inquiry mechanism and the method for data |
CN107409139B (en) * | 2015-03-31 | 2020-08-21 | 西门子交通有限责任公司 | Single-path coupling device, interrogation device and method for the feedback-free transmission of data |
US11223657B2 (en) | 2015-03-31 | 2022-01-11 | Siemens Aktiengesellschaft | One-way coupling device, request apparatus and method for feedback-free transmission of data |
CN104753962A (en) * | 2015-04-23 | 2015-07-01 | 厦门雅迅网络股份有限公司 | OBD (On-board diagnostics) safety management method and system |
CN105516094A (en) * | 2015-11-27 | 2016-04-20 | 蓝网科技股份有限公司 | Industrial computer based internal-external network data exchange method and apparatus |
CN106230806A (en) * | 2016-07-26 | 2016-12-14 | 中国南方电网有限责任公司信息中心 | Blended data custom protocol communication system under tertiary-structure network environment and method |
CN106790151A (en) * | 2016-12-29 | 2017-05-31 | 中铁信安(北京)信息安全技术有限公司 | A kind of data isolation Transmission system and method |
CN106790151B (en) * | 2016-12-29 | 2023-02-10 | 中铁信安(北京)信息安全技术有限公司 | Data isolation transmission system and method |
CN106685992A (en) * | 2017-02-14 | 2017-05-17 | 厦门畅享信息技术有限公司 | Over-network safe exchange and interactive application system based on unidirectional transmission technology, and method thereof |
CN107026850A (en) * | 2017-03-17 | 2017-08-08 | 江苏曙光信息技术有限公司 | A kind of intranet and extranet document exchange method |
CN107026850B (en) * | 2017-03-17 | 2018-07-31 | 中科曙光南京研究院有限公司 | A kind of intranet and extranet document exchange method |
CN106973050A (en) * | 2017-03-23 | 2017-07-21 | 山东中创软件商用中间件股份有限公司 | A kind of method and device of inter-network lock information sharing |
CN107172020A (en) * | 2017-04-28 | 2017-09-15 | 湖北微源卓越科技有限公司 | A kind of network data security exchange method and system |
CN107122474A (en) * | 2017-05-02 | 2017-09-01 | 山东浪潮通软信息科技有限公司 | System document docking technique implementation method under a kind of network physical isolation environment |
CN106998333A (en) * | 2017-05-24 | 2017-08-01 | 山东省计算中心(国家超级计算济南中心) | A kind of bilateral network security isolation system and method |
CN107438082A (en) * | 2017-09-04 | 2017-12-05 | 安徽爱她有果电子商务有限公司 | A kind of network safety system based on intranet and extranet separation |
CN108040122A (en) * | 2017-12-26 | 2018-05-15 | 迈普通信技术股份有限公司 | Document transmission method and device |
CN108040122B (en) * | 2017-12-26 | 2020-06-19 | 迈普通信技术股份有限公司 | File transmission method and device |
CN108833395A (en) * | 2018-06-07 | 2018-11-16 | 北京网迅科技有限公司杭州分公司 | A kind of outer net access authentication system and authentication method based on hardware access card |
CN108809975B (en) * | 2018-06-07 | 2021-06-04 | 北京网迅科技有限公司杭州分公司 | Internal and external network isolation system and method for realizing internal and external network isolation |
CN108809975A (en) * | 2018-06-07 | 2018-11-13 | 北京网迅科技有限公司杭州分公司 | A kind of tertiary-structure network system and the method for realizing tertiary-structure network |
CN108881270A (en) * | 2018-07-02 | 2018-11-23 | 浪潮软件股份有限公司 | A kind of software-based safety isolation network gate |
CN108769076A (en) * | 2018-07-06 | 2018-11-06 | 北京绪水互联科技有限公司 | Data collecting system, method and device with network isolation function |
CN108769076B (en) * | 2018-07-06 | 2023-12-05 | 北京绪水互联科技有限公司 | Data acquisition system, method and device with network isolation function |
CN109800050A (en) * | 2018-11-22 | 2019-05-24 | 海光信息技术有限公司 | A kind of EMS memory management process of virtual machine, device, relevant device and system |
CN109660829A (en) * | 2018-12-20 | 2019-04-19 | 北京东土科技股份有限公司 | Media transmission method and system between a kind of close network of height |
CN109660829B (en) * | 2018-12-20 | 2021-08-17 | 北京东土科技股份有限公司 | Method and system for transmitting media between high-density and low-density networks |
CN109787986A (en) * | 2019-01-29 | 2019-05-21 | 黄策 | File fragmentation public network safe transmission method |
CN110166240A (en) * | 2019-06-25 | 2019-08-23 | 南方电网科学研究院有限责任公司 | Network isolation password board card |
CN110166240B (en) * | 2019-06-25 | 2024-05-03 | 南方电网科学研究院有限责任公司 | Network isolation password board card |
CN110535722A (en) * | 2019-08-27 | 2019-12-03 | 江苏瑞中数据股份有限公司 | A kind of full link operation and monitoring method of the micro services in cross-safety zone domain |
CN112637114B (en) * | 2019-09-24 | 2023-04-11 | 西门子股份公司 | Method and device for monitoring data exchange of industrial edge equipment |
US11652796B2 (en) | 2019-09-24 | 2023-05-16 | Siemens Aktiengesellschaft | Method and arrangement for control data exchange of an industrial edge device |
CN112637114A (en) * | 2019-09-24 | 2021-04-09 | 西门子股份公司 | Method and device for monitoring data exchange of industrial edge equipment |
CN111144159A (en) * | 2019-12-11 | 2020-05-12 | 中国电子科技集团公司第三十研究所 | One-way transmission system based on two-dimensional code |
CN111901418A (en) * | 2020-07-28 | 2020-11-06 | 北京中科麒麟信息工程有限责任公司 | External terminal protection equipment and system based on one-way file transfer protocol |
CN112019542A (en) * | 2020-08-28 | 2020-12-01 | 航天科工网络信息发展有限公司 | Cross-network safety e-mail system |
CN112019542B (en) * | 2020-08-28 | 2022-09-30 | 航天科工网络信息发展有限公司 | Cross-network safe e-mail system |
CN112218269B (en) * | 2020-10-10 | 2022-12-30 | 中车青岛四方机车车辆股份有限公司 | Train information security gateway system, data transmission method and locomotive |
CN112218269A (en) * | 2020-10-10 | 2021-01-12 | 中车青岛四方机车车辆股份有限公司 | Train information security gateway system, data transmission method and locomotive |
CN111935017A (en) * | 2020-10-14 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Cross-network application calling method and device and routing equipment |
CN111935017B (en) * | 2020-10-14 | 2021-01-15 | 腾讯科技(深圳)有限公司 | Cross-network application calling method and device and routing equipment |
CN112367327B (en) * | 2020-11-13 | 2022-05-27 | 国网冀北电力有限公司唐山供电公司 | Power secondary equipment debugging safety access communication device and method |
CN112367327A (en) * | 2020-11-13 | 2021-02-12 | 国网冀北电力有限公司唐山供电公司 | Power secondary equipment debugging safety access communication device and method |
CN112637149B (en) * | 2020-12-11 | 2023-09-01 | 广东电力通信科技有限公司 | Data communication method between asymmetric security policy partitions |
CN112383395B (en) * | 2020-12-11 | 2024-01-23 | 海光信息技术股份有限公司 | Key negotiation method and device |
CN112383395A (en) * | 2020-12-11 | 2021-02-19 | 海光信息技术股份有限公司 | Key agreement method and device |
CN112637149A (en) * | 2020-12-11 | 2021-04-09 | 广东电力通信科技有限公司 | Data communication method between asymmetric security policy partitions |
CN112714124A (en) * | 2020-12-28 | 2021-04-27 | 格美安(北京)信息技术有限公司 | Cross-network and cross-border based data access security authentication method and system |
CN112714124B (en) * | 2020-12-28 | 2023-04-18 | 格美安(北京)信息技术有限公司 | Cross-network and cross-border based data access security authentication method and system |
CN112866351A (en) * | 2020-12-31 | 2021-05-28 | 成都佳华物链云科技有限公司 | Data interaction method, device, server and storage medium |
CN112866351B (en) * | 2020-12-31 | 2023-08-04 | 成都佳华物链云科技有限公司 | Data interaction method, device, server and storage medium |
WO2022174509A1 (en) * | 2021-02-17 | 2022-08-25 | 黄策 | Method for designing firewall |
CN113704781A (en) * | 2021-07-23 | 2021-11-26 | 平安银行股份有限公司 | File secure transmission method and device, electronic equipment and computer storage medium |
CN113704781B (en) * | 2021-07-23 | 2023-05-26 | 平安银行股份有限公司 | File secure transmission method and device, electronic equipment and computer storage medium |
CN113645248A (en) * | 2021-08-17 | 2021-11-12 | 公安部交通管理科学研究所 | Data exchange system and method under cross-network environment |
CN113949523A (en) * | 2021-08-30 | 2022-01-18 | 国网安徽省电力有限公司电力科学研究院 | Cross-network transmission system and method for individual soldier |
CN113992372B (en) * | 2021-10-20 | 2024-06-18 | 国网辽宁省电力有限公司盘锦供电公司 | Optical isolation unidirectional network data transmission device |
CN113992372A (en) * | 2021-10-20 | 2022-01-28 | 国网辽宁省电力有限公司盘锦供电公司 | Optical isolation one-way network data transmission device |
CN113965395B (en) * | 2021-10-28 | 2024-02-09 | 绿盟科技集团股份有限公司 | Method, system and device for safely accessing intranet in real time |
CN113965395A (en) * | 2021-10-28 | 2022-01-21 | 绿盟科技集团股份有限公司 | Method, system and device for safely accessing intranet in real time |
CN114301643A (en) * | 2021-12-17 | 2022-04-08 | 苏州市保慧智能科技有限公司 | Electronic data authentication encryption transmission method |
CN114553528A (en) * | 2022-02-22 | 2022-05-27 | 成都睿智兴华信息技术有限公司 | Internal and external network data safety transmission system and transmission method thereof |
CN114553528B (en) * | 2022-02-22 | 2024-04-19 | 成都睿智兴华信息技术有限公司 | Internal and external network data safety transmission system and transmission method thereof |
CN115065548B (en) * | 2022-07-19 | 2024-04-26 | 西安热工研究院有限公司 | Enhanced network security access area data management and control system and method |
CN115065548A (en) * | 2022-07-19 | 2022-09-16 | 西安热工研究院有限公司 | Enhanced network security access area data management and control system and method |
CN115314323A (en) * | 2022-10-10 | 2022-11-08 | 深圳市华云中盛科技股份有限公司 | Information transmission method and system |
CN115314323B (en) * | 2022-10-10 | 2023-02-10 | 深圳市华云中盛科技股份有限公司 | Information transmission method and system |
CN116346391A (en) * | 2022-10-26 | 2023-06-27 | 广东省土地调查规划院 | Method, device and storage medium for information interaction between home and abroad survey data and internet |
CN116346391B (en) * | 2022-10-26 | 2023-11-10 | 广东省土地调查规划院 | Method, device and storage medium for information interaction between home and abroad survey data and internet |
CN115834584A (en) * | 2022-11-23 | 2023-03-21 | 重庆紫光华山智安科技有限公司 | Cross-network data transmission method, device, equipment and medium |
CN115834584B (en) * | 2022-11-23 | 2024-05-24 | 重庆紫光华山智安科技有限公司 | Cross-network data transmission method, device, equipment and medium |
CN116471103A (en) * | 2023-05-04 | 2023-07-21 | 深圳市显科科技有限公司 | Internal and external network data security exchange method, device and equipment based on boundary network |
CN116471103B (en) * | 2023-05-04 | 2023-09-22 | 深圳市显科科技有限公司 | Internal and external network data security exchange method, device and equipment based on boundary network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104363221A (en) | Network safety isolation file transmission control method | |
US11368437B2 (en) | Method and apparatus for repercussion-free unidirectional transfer of data to a remote application server | |
CN107018134B (en) | Power distribution terminal safety access platform and implementation method thereof | |
AU2016266557B2 (en) | Secure dynamic communication network and protocol | |
US20210176223A1 (en) | Apparatus and method for transmitting data between a first and a second network | |
US9237125B1 (en) | System and associated methods for secure communications | |
EP3387781A1 (en) | Key exchange through partially trusted third party | |
CN109413060A (en) | Message processing method, device, equipment and storage medium | |
EP3424178A1 (en) | Deterministic reproduction of client/server computer state or output sent to one or more client computers | |
TW200841682A (en) | Key exchange verification | |
CN102710759A (en) | Web server, business logging method and system | |
CN110798471A (en) | Air conditioner management method and related device | |
EP4270867A1 (en) | Secure communication method, apparatus, and system for dc interconnection | |
CN110177099B (en) | Data exchange method, transmitting terminal and medium based on asymmetric encryption technology | |
CN105282095A (en) | Login verification method and device of virtual desktop | |
CN104270347B (en) | The methods, devices and systems of security control | |
Nowlan et al. | Reducing latency in Tor circuits with unordered delivery | |
US20170223045A1 (en) | Method of forwarding data between computer systems, computer network infrastructure and computer program product | |
CN104394171A (en) | Data operating method and device | |
CN110474884B (en) | Ethernet network system, communication method, communication equipment and computer readable storage medium | |
CN105721274A (en) | Method and device for integrating variety of instant messaging | |
US12088569B1 (en) | Protocol free encrypting device | |
CN111953742B (en) | Page redirection method, terminal equipment, intermediate equipment and server | |
CN116980155A (en) | Data processing method, device, product, equipment and medium of block chain network | |
CN110995730B (en) | Data transmission method and device, proxy server and proxy server cluster |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150218 |
|
WD01 | Invention patent application deemed withdrawn after publication |