A method and system for secure data transmission based on dual hardware

A technology of data security and transmission method, which is applied in the field of data security and its safe transmission, can solve problems such as theft, tampering, hidden dangers of data security, inconvenient use, etc., and achieve the effect of ensuring data security and timeliness

Active Publication Date: 2017-02-08
JINAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the main defect of this method is: when encountering a strong virus, it may cause the system crash of the computer on the security network, and even affect other computers on the security network; Be detected; the attacker has direct access to the security network and can steal data on the security network through illegal means
However, the defect of this method is that when the middle machine system fails, the user has no other way to ensure the safe and timely transmission of information except for using a spare middle machine (purchasing a spare middle machine will increase user costs); when the user needs to transmit information to When in different places, you have to use a non-confidential network to transmit data to the target location, and there are security risks in the process of data transmission in a non-confidential network (such as data may be stolen, tampered with, etc.); the secure data transmission between the confidential network and the intermediate machine cannot be guaranteed The security of the dedicated mobile device itself
Although the confidentiality of this method is strong enough, the disadvantages are also obvious: disc resources are seriously wasted. When the amount of transmitted data is large, due to the limited storage capacity of discs, a large number of discs are required, which is inconvenient to use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for secure data transmission based on dual hardware
  • A method and system for secure data transmission based on dual hardware
  • A method and system for secure data transmission based on dual hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0059] Please refer to figure 1 , figure 1 It is a flowchart of a data security transmission method based on dual hardware, and the specific implementation process is as follows:

[0060] The user downloads the data from the non-confidential network to the mobile storage device (such as U disk, mobile hard disk, SD card, etc.);

[0061] The user connects the mobile storage device to the middle machine based on dual hardware;

[0062] The middle machine implements access control, and the implementation process can refer to image 3 . The operating system on the main function module prompts the user to input the account password, and then performs authority determination. If it is determined as a super administrator, use the "one-way recognition mechanism" to synchron...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure data transmission method based dual hardware and a secure data transmission system based dual hardware. The method includes the following steps: (S1) a user downloads data into a mobile storage device from an unclassified network; (S2) the user connects the mobile storage device with an intermediate machine, and the security of the mobile storage device is checked by the intermediate machine; (S3) the intermediate machine stores the secure data passing detection into the cache of a main functional module; (S4) the user downloads the secure data into a secure mobile storage device; (S5) the user connects the secure mobile storage device with a classified network computer and uploads the data. The system comprises the mobile storage device, the intermediate machine and the secure mobile storage device. The invention physically isolates the unclassified network from the classified network and securely transmits data without threats to the classified network computer only after the intermediate machine analyzes the data and checks security, consequently, malicious users and malicious programs including viruses and Trojans are effectively prevented from intruding a classified network, and the data security of the classified network is ensured.

Description

technical field [0001] The invention relates to the field of data security and its secure transmission in the field of information security, in particular to a method and system for secure data transmission based on dual hardware. Background technique [0002] With the improvement of data security requirements of government, military and other confidential departments, how to prevent confidential network data leakage and prevent non-secure data from attacking confidential network has become an important research direction for information security enterprises and scientific research institutions. It is generally believed that physically separating the confidential network and the non-confidential network can effectively guarantee the security of data. In this case, it is particularly critical to ensure the security of data transmission between two physically separated networks. [0003] At present, the existing secure data transmission methods between the confidential networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 姚国祥罗伟其胡舜魏林锋翁健官全龙朱淑华张焕明
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products