Network safety isolation file transmission control method

A network security and data transmission method technology, which is applied in the field of file transmission control between taxation network security isolation systems, can solve problems such as slowing down access speed, hidden dangers of product security, and long switching time, so as to ensure network security, content security, and high-speed The effect of safety information exchange

Inactive Publication Date: 2015-02-18
QINGDAO WEIZHIHUI INFORMATION
View PDF5 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some of these isolation products still require network cabling to be a dual-network cable structure, and the product has a relatively large security risk.
The third generation of isolation technology - data broadcast isolation: use the method of time-sharing copying files by the broadcast system to achieve isolation, the switching time is very long, and even needs to be done manually, which not only significantly slows down the access speed, but also does not support common network applications , lost the meaning of network existence
The fourth generation of isolation technology - air switch isolation: it uses single-pole double-throw switches to enable intern

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety isolation file transmission control method
  • Network safety isolation file transmission control method
  • Network safety isolation file transmission control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention is described in further detail below in conjunction with accompanying drawing:

[0030] figure 1 It is a network architecture diagram of the present invention, including an external network control terminal, an external network sending terminal, an external network receiving terminal, an internal network receiving terminal, an internal network transmitting terminal, an internal network control terminal, an external network isolation firewall and an internal network isolation firewall.

[0031] The external network control terminal and the internal network control terminal work in an industrial computer with multiple network ports. As the core server, it is specifically responsible for the analysis and execution of the entire transmission control protocol, and undertakes the storage and forwarding of shared files, making file interaction more efficient. Controllable and efficient.

[0032] figure 2 It is the network architecture of the sending en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety isolation file transmission control method, in particular to a file transmission control method between taxation network safety isolation systems. A transmission control system comprises an external network isolation firewall, an external network control end, an external network transmitting end, an external network receiving end, an internal network transmitting end, an internal network receiving end, an internal network control end and an internal network isolation firewall. A computer system, a virtual machine system and the isolation firewalls are combined to achieved a relatively universal safety data transmission manner, safe and reliable bidirectional data transmission is achieved by the control method with a special safety protocol, confidentiality, completeness and non-repudiation during information transmission are achieved by safety techniques such as data encryption, digital signatures and information authentication codes, data exchanging performance is increased while safety of internal and external network systems is guaranteed, and the whole system can work reliably and stably.

Description

technical field [0001] The invention relates to a network security isolation control method, in particular to a file transmission control method between taxation network security isolation systems. It is suitable for transferring data between networks with different confidentiality levels, and realizes the efficient transmission of files between different networks while ensuring network security. Background technique [0002] The concept of isolation was created in order to protect a high-level security network environment, during which it experienced five generations of isolation technology changes. The first generation of isolation technology - complete isolation: This method makes the network in an information island state, achieving complete physical isolation, requiring at least two sets of networks and systems, and more importantly, the inconvenience of information exchange and the increase in cost. Maintenance and use have brought great inconvenience. The second gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L9/0838H04L9/3247H04L63/205H04L67/06H04L2209/72
Inventor 董晓春刘培顺赵长江任传祥高继鹏
Owner QINGDAO WEIZHIHUI INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products