Network segment-crossing data security exchange device and exchange method

A data security and exchange device technology, applied in the field of data exchange, can solve problems such as the inability to complete data exchange automatically and quickly, the lack of guarantee for information security exchange, and the limitation of network application capabilities

Inactive Publication Date: 2013-08-28
SHANGHAI MEDIA TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] This is not only inefficient, but also lacks the guarantee of information security exchange, and it is very easy to cause major system losses due to human errors
At the same time, due to the inability to complete data exchange automatically and quickly, it also greatly limits the application capabilities of the network and affects the normal development of work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network segment-crossing data security exchange device and exchange method
  • Network segment-crossing data security exchange device and exchange method
  • Network segment-crossing data security exchange device and exchange method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Please refer to the accompanying drawings for a further description of the present invention.

[0043] USB uses multiple peripherals to share a peripheral bus. The key is the standardization and standardization of the interface characteristics (electrical and mechanical characteristics) and transmission information between each peripheral and the host. USB adopts the serial method to transmit data, which changes the chaotic state of the connection between the host and the peripheral, unifies the interface between the peripheral and the host, simplifies the setting, and increases the number of peripherals that the host can connect to, and provides Higher transmission efficiency.

[0044] There are four types of USB transfers: Control Transfer, Interrupt Transfer, Bulk Transfer and Isochronous Transfer. Each transport mode corresponds to a specific endpoint and a specific way to achieve data transmission. The present invention adopts batch type transmission.

[0045]Bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network segment-crossing data security exchange device. A point-to-point data communication pipeline can be used for realizing data security exchange in the form of a non-TCP (Transmission Control Protocol) / IP (Internet Protocol) by virtue of a plurality of USB (Universal Serial Bus) cable devices between host computers of different network segments. The network segment-crossing data security exchange device and the network segment-crossing data security exchange method have the advantages of preventing the existing network protocol, especially TCP / IP and totally private protocol from transmitting data in a security mode; and the data are filtered and verified, so that only the verified security data can be transmitted.

Description

technical field [0001] The invention relates to a data exchange method, in particular to a cross-network segment data security exchange device. Background technique [0002] With the popularization and application of the Internet and the gradual information networking of people's work and life, the outbreak of information network security problems with its geometric growth and increasingly serious consequences make people feel the threat at all times. In recent years, large-scale network security incidents have occurred one after another, and new attack methods such as worms, denial of service attacks, and network fraud have emerged one after another on the Internet, resulting in leaks, data destruction, and business failures. Paralyzed, the economic loss caused cannot be estimated. [0003] At present, the secret-related networks of most government agencies and the military in China have been "physically isolated" from the external Internet. In addition, there are many imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 谈新
Owner SHANGHAI MEDIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products