Network invasion preventing safe data transmission system and network invasion preventing safe data transmission method

A data transmission and data security technology, which is applied in the field of data security transmission system, can solve the problem that the data speed cannot be accelerated, and achieve the effect of fast speed, improved speed and security

Active Publication Date: 2016-04-20
GREEN NET WORLD FUJIAN NETWORK TECH
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the two-dimensional code can only carry a limited amount of information, and the speed of data transmission cannot be accelerated by this method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network invasion preventing safe data transmission system and network invasion preventing safe data transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Such as figure 1 As shown, a data security transmission system for preventing network intrusion in the present invention includes a first data transmission receiving module MU1 set on an external network computer and a second data transmission receiving module MU2 set on an intranet computer; wherein, the first The data transmission receiving module MU1 includes a first control module C1, two-dimensional code generation modules SC1, SC2, a display screen S and a first radio frequency communication module RF1; the second data transmission receiving module MU2 includes a second control module C2, facing the display screen The QR code scanning camera CAM, interrupt module SW and second radio frequency communication module RF2 set by S;

[0027] The first control module C1 performs data interaction with the application program of the external network computer, including accepting user instructions to start the data transmission process, controlling the two-dimensional code ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network invasion preventing safe data transmission system and a network invasion preventing safe data transmission method. On condition that a network is physically isolated, data transmission between an internal-network computer and an external-network computer is realized through an RF communication module. In view of low safety in RF communication data transmission, identity authentication is performed between the internal-network computer and the external-network computer. Furthermore a data transmission manner with discontinuous RF communication intervals is used for frequently confirming the validity of the computer which transmits and receives data. Only under a precondition that the identity of the computer is valid, data transmission can be finished, thereby settling a problem of low safety in RF communication data transmission. Because high identity validity confirmation speed is realized in a two-dimensional code manner, speed and safety in data transmission are greatly improved. Data transmission speed in the network invasion preventing safe data transmission system and the network invasion preventing safe data transmission method is far higher than that of data transmission mode in which the two-dimensional code is utilized.

Description

technical field [0001] The invention relates to a data security transmission system and method for preventing network intrusion. Background technique [0002] The current conventional network communication technology can easily transmit data between two computers connected to the network. When a computer on the internal network is connected to the external network, external intruders can easily use operating system vulnerabilities to invade computers on the internal network. Physical isolation is required to achieve data transmission between the external network and the internal network. Someone in the industry proposed a two-dimensional code-based physical isolation transmission method (CN105049425A), in the case of physical isolation between the internal and external networks, data transmission is performed through the two-dimensional code. However, the two-dimensional code can only carry a limited amount of information, and the speed of data transmission cannot be accele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1441
Inventor 张锡聪李颖聪
Owner GREEN NET WORLD FUJIAN NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products