A secure network data interaction system and method

A data interaction and secure network technology, applied in the field of information transmission, can solve the problem that the transmission speed of the serial port line cannot meet the transmission speed, and achieve the effect of avoiding the problem of data leakage and safe interaction

Active Publication Date: 2021-07-02
北京仁光科技有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if you use a serial line to transmit instructions and information, although it has the characteristics of high real-time transmission, the transmission speed of the serial line cannot meet the transmission speed requirements when processing a large amount of data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure network data interaction system and method
  • A secure network data interaction system and method
  • A secure network data interaction system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings but not all structures.

[0048] In order to make the object, technical solution and advantages of the present invention clearer, specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0049] In addition, it should be noted that, for the convenience of description, only parts related to the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe network data interaction system, comprising: a control instruction output unit, a video encoder, and at least two subnets with mutual data isolation; each of the subnets includes an instruction receiving server and at least one client; The control instruction output unit is used to output the control instruction; the video encoder is used to encode the control instruction into image data; the image data is transmitted to the instruction receiving server of the subnet through a one-way video transmission line; The instruction receiving server in the subnet is used to receive the image data and decode the image data into the control instruction, and transmit the image data to the client corresponding to the control instruction. The present invention can realize the safe interaction of clients in multiple subnets, the whole interaction process will not change the original network security of each subnet, and avoid the interaction of each subnet due to receiving the same interactive terminal (or control command output unit) resulting in data leakage.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information transmission, and in particular to a system and method for enabling secure network data interaction. Background technique [0002] At present, complex command center interaction systems such as the government and the military need to build multiple subnets and perform data interaction on these subnets through a unified command management system. Due to security requirements, many subnets need to be isolated from the network environment. Most of the existing interactive technologies cannot interact with computers in different subnets through a unified interactive terminal, even if some can solve this interactive control problem. , but it is also realized at the expense of security by exposing these subnets and interactive terminals uniformly to the same network environment. [0003] In order to build a secure network environment, some technologies try to use unidirect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/18H04N21/2343H04N21/4402
CPCH04N7/18H04N21/2343H04N21/4402
Inventor 谭登峰其他发明人请求不公开姓名
Owner 北京仁光科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products