Check patentability & draft patents in minutes with Patsnap Eureka AI!

Safe communication distributed data extraction method and implementing system based on PSTN

A distributed data and secure communication technology, applied in the field of PSTN-based secure communication distributed remote data extraction method and implementation system, can solve the problems of inability to address the monitoring terminal, insolvable problems, complex implementation, etc., and achieve easy-to-use interfaces. , the interface is clear, the effect of strong adaptability

Active Publication Date: 2008-12-10
SHANGHAI SOFTLINE INFORMATION TECH
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (1) Network security requires a heavyweight solution. For example, the monitoring terminal (server side) must adopt a network security system including firewall, intrusion detection (defense), etc., which is complex and costly to implement;
[0014] (2) The monitored end must be connected to the Internet in some way; if there is a clear business requirement that the monitored end (such as financial software) must not be connected to the Internet, the problem cannot be solved;
[0015] (3) If the monitored terminal is allowed to access the Internet, it must have an accessible Internet IP address, such as access through dedicated lines, VPN, modem, ADSL, etc.; in order to meet the requirements of the monitored terminal for real-time data collection, the monitored terminal It must be online 24 hours a day. In this way, the above methods have the problem of high cost to varying degrees; in VPN, modem, ADSL and other methods, there is still a problem that once a connection is interrupted due to a fault, the IP address will change dynamically after reconnection, resulting in The problem that the monitoring terminal cannot address

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe communication distributed data extraction method and implementing system based on PSTN
  • Safe communication distributed data extraction method and implementing system based on PSTN
  • Safe communication distributed data extraction method and implementing system based on PSTN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075]Enforcement of the present invention needs monitoring end and monitored end all to have fixed-line telephone number, digital equipment (running the host machine of distributed data extraction middleware and financial software etc., comprises server, PC machine etc.) by Modem and fixed-line connection Access to the PSTN network, and it is required to keep the access unblocked, that is, the telephone line is always connected to the Modem, and the Modem is always connected to the digital device, so that the monitoring terminal can initiate addressing and connection in real time according to needs; in addition, it is required to distribute The DI, CA, DEC and other components of the formula extraction middleware run on the corresponding host machine respectively, and the different financial software to be extracted, and the different software versions are within the range supported by DEC.

[0076] The method and implementation system proposed by the present invention have be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of computer system remote supervisory technology, which specially is a security communication distributed data extraction method based on PSTN and realization system. In this invention, the user can send connection command from the server end, perform addressing to plural clients accessing to PSTN network, acknowledge legal access to client using certificate, real-time extract and data on plural clients and package using distributed data extraction middleware after addressing is succeeded, and encrypts the data and command during the transmitting process. The realization system includes an addressing and security communication module and a distributed data extraction module. The previous one consists of a central node digital apparatus, N sub node digital apparatus, a modulation demodulation apparatus and a central encipher etc. The latter one consists of a data integrating component, a client application component and a data extraction component etc. The method and the realization system can ensure the completeness and security of the data during the transmitting process.

Description

technical field [0001] The invention belongs to the technical field of computer system remote monitoring, and in particular relates to a PSTN (Public Switched Telephone Network)-based safe communication distributed remote data extraction method and an implementation system. Background technique [0002] 1. Encryption technology [0003] There are two types of encryption techniques: symmetric encryption and asymmetric encryption. The principle of asymmetric encryption (RSA, DSA, DH asymmetriccryptography) is as follows: [0004] Use a private key that must be kept secret from unauthorized users and a public key that can be made public to anyone. Both public and private keys are mathematically related; data encrypted with the public key can only be decrypted with the private key, and data signed with the private key can only be verified with the public key. The public key can be given to anyone; the public key is used to encrypt data to be sent to the holder of the private ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M11/00H04L9/32H04L9/30H04L29/06
Inventor 焦毅叶南荣袁磊葛孝堃
Owner SHANGHAI SOFTLINE INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More