Data interception and conversion method and system

A technology of data interception and data packet, applied in the field of data interception and conversion and system, to achieve the effect of strong security

Inactive Publication Date: 2014-03-26
上海普华诚信软件技术有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the sake of data security, some sensitive data is not allowed to leave the internal network and be transmitted to the external network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interception and conversion method and system
  • Data interception and conversion method and system
  • Data interception and conversion method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0039] see figure 1 , the first embodiment of the method for intercepting and converting uplink data in the present application includes the following steps:

[0040] Step a1, intercepting the data packet sent from the client to the server;

[0041] Step a2, find the data item that needs to be replaced from the intercepted data packet, that is, the original data item; if no original data item is found, the intercepted data packet is directly sent to the server; if one or more original data items are found item, go to step a3;

[0042] Step a3, for each original data item, generate a random number as the label value; add a prefix and a suffix to each label value respectively to form a label; replace each original data item with each label, in Save the original data item locally and replace the label of the original data item;

[0043] The intercepted data packet usually consists of two parts: the data item that needs to be replaced (the original data item) and the data item ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data interception and conversion method. The method includes the steps that when data are transmitted from a client to a server, sensitive data are replaced by non-sensitive data, then the non-sensitive data leave an intranet, and when the data are transmitted from the server to the client, the non-sensitive data are restored into the sensitive data after entering the intranet. Therefore, the invention further discloses a data interception and conversion system. The data interception and conversion method and system can guarantee requirements of intranet users such as governments and entrepreneurs involving sensitive data for protecting and controlling the sensitive data, and very high safety is achieved.

Description

technical field [0001] This application relates to a method of intercepting sensitive data and storing it in the internal network during the data transmission process from the internal network to the external network, converting the sensitive data into non-sensitive data and continuing to transmit it to the external network; and correspondingly from In the process of data transmission from the external network to the internal network, the converted non-sensitive data is restored to sensitive data after it enters the internal network. Background technique [0002] Intranet refers to a proprietary computer network built by a government, enterprise, or other institution. The extranet refers to the public computer network, that is, the Internet. Information exchanges in modern society are becoming more and more frequent, and two-way transmission of data between internal and external networks is very common. However, for the sake of data security, some sensitive data is not all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/723H04L45/50
Inventor 顾青谢超梁佐泉田文晋赵艳红胡凯冯四风王宁宁贾伟峰倪庆洋梁艳敏
Owner 上海普华诚信软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products