Intranet-extranet physical isolation high-safety data exchange method based on two-dimensional code

A high-security, physical isolation technology, applied in the field of information security, can solve problems such as data leakage, exchange efficiency impact, and limited storage capacity, and achieve high security, low operation and maintenance costs, and high reliability.

Pending Publication Date: 2018-07-10
JIANGSU IDEABANK MICROELECTRONICS TECH
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Two-dimensional code technology is widely used in forms, business cards, information query, tracking, inventory, etc., but it is rarely used in the field of government or enterprise intranet data exchange because of its limited storage capacity. In the case of large volume and high real-time requirements, the exchange efficiency will be greatly affected
[0004] Chinese patent CN103268461A discloses a two-dimensional code-based physical isolation data exchange method for internal and external networks. The acquisition of QR code, if the acquisition signal at the camera is attacked, there is still the possibility of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] A method for exchanging high-security data based on two-dimensional code-based physical isolation of internal and external networks. When data is exchanged from an internal network to an external network, the steps are as follows:

[0015] 1.1 Extract the data to be exchanged from the intranet database, encrypt the data with a key, and encode the data to produce two-dimensional code images, which are regularly arranged in the form of a two-dimensional code matrix and displayed on the display screen of the intranet system terminal equipment ;

[0016] 1.2 Use the camera of the terminal equipment of the external network system to collect the two-dimensional code images arranged in matrix regularly displayed on the display screen of the terminal equipment of the internal network system;

[0017] 1.3 Through parallel computing on the terminal equipment of the external network system, decode and decrypt the collected QR code sequence, sign the decrypted data, and finally obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, in particular to an intranet-extranet physical isolation high-safety data exchange method based on a two-dimensional code. When data is exchanged from an intranet to an extranet, the method comprises the following steps of 1.1.extracting data to be exchanged in an intranet database, encrypting the data through a key and encodingthe data to generate a plurality of two-dimensional code images, and regularly arranging and displaying the images on a display screen of intranet system terminal equipment in a form of a two-dimensional code matrix; 1.2.acquiring the matrix-type regularly arranged two-dimensional code images displayed on the display screen of the intranet system terminal equipment through a camera of extranet system terminal equipment; and 1.3.decoding and decrypting an acquired two-dimensional code sequence on the extranet system terminal equipment through parallel calculation, signing the decrypted data, and finally obtaining exchange data.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a two-dimensional code-based high-security data exchange method for physical isolation of internal and external networks. Background technique [0002] With the development of society, more and more attention has been paid to the informatization construction of various industries. In the process of informatization construction, for security reasons, government or enterprise networks often require the isolation of internal and external networks, but the exchange of external data is unavoidable and very important. The traditional method is to use the gatekeeper for data exchange, although this can improve automatic wake-up, but the construction cost is relatively high; and the way of generating intermediate files to disk or copying with a USB disk greatly reduces work efficiency, especially when real-time In the case of data exchange, it will affect the normal work. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06K17/00
CPCH04L9/3247H04L63/02G06K17/00
Inventor 蒋日友金钧华张翀
Owner JIANGSU IDEABANK MICROELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products