Unlock instant, AI-driven research and patent intelligence for your innovation.

Information transmission method and terminal

An information transmission and terminal technology, applied in transmission systems, electrical components, etc., can solve the problems of virus bringing into the intranet, file insertion, virus entering the intranet, etc., to avoid potential security risks and improve security.

Active Publication Date: 2021-09-03
FUJIAN BOSS SOFTWARE
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually the virus is copied into the internal network: when an invoice from the external network is to be transmitted to the internal network, if the invoice file from the external network is transmitted to the internal network, the file is likely to be inserted by virus code, causing a virus Bring into the intranet
[0004] In the prior art, in order to prevent viruses from entering the intranet, two methods are usually used, one is to set up network security measures in the intranet, such as firewalls, antivirus walls or attack detection systems; the other is to filter the data packets exchanged , when necessary, forward the data packets to the ground, but there is still the possibility of viruses entering the intranet, and the security of information transmission is weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information transmission method and terminal
  • Information transmission method and terminal
  • Information transmission method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Please refer to figure 1 and image 3 , an information transmission method, comprising the steps of:

[0062] S1. Obtain a file to be transferred through an external network device, add a preset keyword to the file to be transferred, and display the file to be transferred to which the preset keyword has been added.

[0063] Wherein, said obtaining the file to be transferred through the external network device, and adding preset keywords to the file to be transferred includes:

[0064] Obtaining the file to be transferred and the review request of the file to be transferred through the external network device;

[0065] According to the review request of the file to be transmitted, a preset keyword for review is added to the file to be transmitted.

[0066] Specifically, in this embodiment, after the mobile terminal clicks the "Please review" button, the file to be transmitted is sent to the external network device, and the external network device obtains the file to b...

Embodiment 2

[0080] Please refer to image 3 , the difference between this embodiment and the first embodiment is that it further defines how to identify and filter the information of the shooting file:

[0081] Specifically, the identifying and filtering the preset illegal characters in the shooting file on the intranet includes:

[0082] Identifying the shooting file in the intranet, judging whether the shooting file contains the preset keyword, if so, judging whether the shooting file contains the preset dangerous keyword, and if so, deleting the shooting file , otherwise filter the preset illegal characters in the shooting file;

[0083] If the preset keyword is not included, the shooting file is saved.

[0084] In this embodiment, if the shooting file contains the keyword "need to be converted to text", it is judged whether the shooting file contains preset dangerous keywords, such as "http: / / www" and ".exe". The preset dangerous keywords directly delete the shooting file, otherwis...

Embodiment 3

[0087] Please refer to figure 2 , an information transmission terminal, including a memory, a processor, and a computer program stored in the memory and operable on the processor, and the processor implements the information in Embodiment 1 or Embodiment 2 when executing the computer program The individual steps of the transfer method.

[0088] To sum up, in the information transmission method and terminal provided by the present invention, after the external network device obtains the file to be transmitted, it adds the preset audit keyword and the preset identification and filtering keyword to the file to be transmitted, and then adds the added The files to be transferred with keywords are displayed on the external network device; the display content of the external network device is captured by the internal network camera, and the captured files are stored and identified for non-electronic invoice captured files, and the captured files with dangerous keywords are directly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information transmission method and a terminal, and the method comprises the steps: adding a preset keyword in a to-be-transmitted file after the to-be-transmitted file is obtained by external network equipment, and then displaying the to-be-transmitted file in the external network equipment; shooting the display content of the extranet equipment through an intranet camera, storing a shot file, identifying information in the shot file, filtering illegal characters in the shot file, and storing the shot file as a legal file; therefore, data transmission is carried out by shooting the display content of the extranet device through the intranet device, physical isolation of information transmission is achieved, one-way information transmission of information from the extranet to the intranet is achieved, potential safety hazards caused by the fact that the file to be transmitted carries viruses are avoided, illegal characters in the shot file are filtered, illegal information is prevented from being identified, and the security of information transmission is further improved.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an information transmission method and a terminal. Background technique [0002] Nowadays, information replication of network gatekeepers, laser gatekeepers, CDs and U disks may cause viruses to be copied into the intranet. Colonial Pipeline, the largest fuel pipeline operator in the United States, was once attacked by a network, causing the US government to declare a state of emergency in 17 US states and Washington, D.C. It can be seen that network security is now very important. [0003] Usually the virus is copied into the internal network: when an invoice from the external network is to be transmitted to the internal network, if the invoice file from the external network is transmitted to the internal network, the file is likely to be inserted by virus code, causing a virus into the intranet. [0004] In the prior art, in order to prevent viruses from entering th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/145
Inventor 毛时敏
Owner FUJIAN BOSS SOFTWARE