Unlock instant, AI-driven research and patent intelligence for your innovation.

Optical network security interaction device and its operation method

An interactive device and optical network technology, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of inconvenience, easy to be attacked by criminals, and laborious, and achieve the effect of improving the efficiency of data interaction.

Inactive Publication Date: 2017-12-15
南京云设智能科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The U disk is a carrier with software, and there are also security holes, which are easy to be attacked by criminals.
CD recording is currently recognized as a safe storage method, but it is inconvenient to use, requires manual operation, and is time-consuming and labor-intensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical network security interaction device and its operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1: as figure 1 As shown, an optical network security interaction device includes a first network component 1 and a second network component 2, the first network component 1 and the second network component 2 are connected in a network isolation state, and the first network Component 1 includes a first host 3, a first display device 4 and a first optical collector 5, the first host 3 is connected to the first display device 4 and the first optical collector 5 respectively; the second The network component 2 includes a second host 6 , a second display device 7 and a second optical collector 8 , and the second host 6 is connected to the second display device 7 and the second optical collector 8 respectively.

[0037] An operation method of an optical network security interaction device, according to the following steps:

[0038] (1) Structural analysis:

[0039] The first display device displays the encrypted data on the first host that needs to be transmitted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an interactive device, in particular to an optical network security interaction device and its operation method. The optical network security interaction device includes a first network component and a second network component, the first network component and the second network component are connected in a network isolation mode, the first network component includes a first mainframe, a first display equipment and a first optical collector, and the first mainframe is connected with the first display equipment and the first optical collector respectively, the second network component includes a second mainframe, a second display equipment and a second optical collector, and the second mainframe is connected with the second display equipment and the second optical collector. According to the optical network security interaction device and its operation method, the efficiency of data interaction between isolated networks is greatly improved, and physical isolation is completely achieved.

Description

technical field [0001] The invention relates to an interaction device, in particular to an optical network security interaction device and an operation method thereof. Background technique [0002] With the rapid development of computer communication and network technology, human society has entered a rapidly changing information age. Computers have become the most important means for people to communicate with each other and obtain information. However, when people obtain information, how to prevent computer viruses and The intrusion of network hackers to ensure the data security of the computer itself has become the most urgent problem to be solved in today's society. At present, the security measures taken by the computers on the Internet mainly include the following: 1. Use firewall software to filter the IP packets passing through the firewall to ensure that only authorized users can access. Since the firewall is only a software product, there are security holes and it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/74
CPCG06F21/602G06F21/606G06F21/74
Inventor 章斌吴春标朱志安颜肃
Owner 南京云设智能科技有限公司