Data safety ferrying system and matched method thereof

A technology of data security and ferry system, applied in digital data protection, data exchange through path configuration, optical fiber transmission, etc. free embarrassing effect

Inactive Publication Date: 2017-12-05
南京水晶石数字科技有限公司
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the security device itself becomes unable to import files in time, so the meaning of the portable device itself is gone
[0004] 2. In the public security network of the public security system and the isolated network of the military industry system, the security requirements are extremely high, and no removable storage devices are allowed to be accessed.
However, the import of files in such a safe environment is often done by burning a CD, which wastes a lot of consumables and reduces work efficiency. to the file to be processed on site
[0005] 3. It is even more difficult for the staff of secret-related enterprises to handle the work together. Since the file transmission methods of each secret-related company are different, it often takes countless turns to transfer in and out of a file. It often takes a day to prepare for a meeting in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety ferrying system and matched method thereof
  • Data safety ferrying system and matched method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] like figure 1 A data security ferry system shown includes a security ferry box device, an interception server, and secret-related equipment. The security ferry box device is provided with an Ethernet interface for connecting to a public network, and the secure ferry box device is also provided with an Ethernet interface for connecting to a public network. The USB interface of the mobile storage device, the output terminal of the safety ferry box device is connected to the interception server, and the interception server is connected to the confidential equipment;

[0031] The safety ferry box device includes a customized computer, a first multi-mode photoelectric converter and a second multi-mode photoelectric converter. The mode photoelectric converter is connected through optical fiber, the optical fiber that the first multimode photoelectric converter sends data to the second multimode photoelectric converter is connected normally, and the optical fiber that the seco...

Embodiment 2

[0035] like figure 2 As shown, the data security ferry method supporting a data security ferry system is realized by a data security ferry system described in Embodiment 1, including the following steps:

[0036] Step 1: The user enters the data into the customized computer through Ethernet or mobile storage device;

[0037] Step 2: The customized computer automatically encrypts the data packet to generate a data packet;

[0038] Step 3: Customize the computer to customize the data packet into a protocol packet with reference to the physical address code, and generate a check code;

[0039] Step 4: The customized computer sends the protocol packet and check code to the first multimode photoelectric converter;

[0040] Step 5: the first multimode photoelectric converter sends the protocol packet to the second multimode photoelectric converter through an optical fiber;

[0041] Step 6: the second multimode photoelectric converter sends the protocol packet to the listening se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data safety ferrying system and a matched method thereof, and belongs to the technical field of data transmission safety. The method comprises a safety ferrying box device, an interception server and a secret-related device. The problem about confidential data transmission is solved, files can be easily imported in a self-service mode in secret-related enterprises, and queuing for CD burning is not needed any more; the system can become a safe one-way file obtaining access port in an unsafe environment where the portable secret-related device is located, and embarrassment that outside office work handling of the secret-related device is not free is changed.

Description

technical field [0001] The invention belongs to the technical field of data transmission security. Background technique [0002] With the popularity of USB storage devices, more and more file interaction work will use USB storage devices, but security issues follow. Therefore, many companies with high security requirements do not allow direct connection to USB storage devices. Next, I will describe several embarrassing scenarios: [0003] 1. When carrying a portable device to work outside, except for the device itself that has been marked in the security company, since the device itself is classified, it is not allowed to connect to any USB device. In this way, the security device itself becomes unable to import files in time, so the meaning of the portable device itself is gone. [0004] 2. In the public security network of the public security system and the isolated network of the military industry system, the security requirements of the system are extremely high, and n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/79G06F21/85H04B10/25H04L12/28
Inventor 李虹俞翔陆斐斐
Owner 南京水晶石数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products