Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Non-inductive boundary data exchange method

A boundary data and boundary technology, applied in wireless communication, digital transmission system, secure communication device, etc., can solve problems such as time-consuming debugging, inability to connect internal and external networks, data packet size limitation, etc., to achieve efficient research and development, rapid deployment, The effect of increasing the development speed

Pending Publication Date: 2022-03-22
佛山市宏图数据有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are currently the following problems. In a relatively strict dual-network interactive platform, the service interface will be registered first, and access to the Internet is strictly restricted. In addition, there are strict restrictions on the size of the data packet, and data flow is not supported. On this basis, Scenarios where it is basically impossible to connect to the internal and external networks, the details are as follows:
[0004] 1. The server is fixed in both directions. The servers at both ends of the border must be two registered computer devices. To replace the server, you need to apply to the border administrator again
[0005] 2. The transmission content is limited. Since the transmission content can only transmit json strings, the transmission of binary files is limited
[0006] 3. The transmission length is limited. Since the transmission content limits the data packet size (generally 50K), large files cannot be transmitted through the interface.
[0007] Due to the above problems, in the process of software development, it is necessary to pay attention to the existence of boundaries at all times, which causes a lot of troubles to software development. Every call must pay attention to the boundary rules, which consumes a lot of debugging time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-inductive boundary data exchange method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0040] According to an embodiment of the present invention, a method for exchanging data without sensing boundaries is provided.

[0041] Such as figure 1 As shown, the non-inductive boundary data exchange method according to the embodiment of the present invention includes the following steps:

[0042] The architecture is divided into three parts in advance (mobile private network) mobile phone application, (mobile private network) mobile private network server group, (secure intranet) intr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-inductive boundary data exchange method, and relates to the technical field of security boundary exchange, and the method comprises the following steps: calibrating non-inductive boundary data exchange components which are respectively deployed at two ends of a boundary and comprise a CNetPort component and a BNetPort component, an initiating end of the non-inductive boundary data exchange components obtains services by accessing the BNetPort component, the BNetPort component accesses the CNetPort component through the boundary, and the BNetPort component obtains services by accessing the CNetPort component through the boundary; and the CNetPort component accesses the service provided by the server, the CNetPort returns a service result to the BNetPort component through the boundary, and the BNetPort component returns information to the initiator. According to the method, a non-inductive boundary exchange component is constructed through capabilities such as request subpackage / group package, file type identification and automatic ferrying, internal routing distribution and the like, so that boundary limitation is transparent to developers, the software developers are assisted in efficient research and development and rapid deployment, and the development efficiency is improved. The problems that the boundary exchange platform bidirectionally fixes the server IP of the service developer, the transmission content limits Json and the transmission length is limited are solved, and the research and development speed of the developer is greatly increased.

Description

technical field [0001] The present invention relates to the technical field of security border exchange, in particular to a method for exchanging data without sense border. Background technique [0002] The security boundary switching platform is generally used as the boundary between the low-security network and the high-security network. Data services are usually stored in the high-security network, and service consumption applications are generally deployed in the low-security network. Usually, the following configurations are made: register the IP addresses of computer devices at both ends of the boundary with the Mac address. Register the API interfaces and parameters of services at both ends of the boundary to configure the http ferry service. In the process of calling the API interface, only json strings are allowed to be transmitted, and the border platform will review the parameter content of the call. In the process of calling the API interface, the size of the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04W12/08
CPCH04L63/0209H04W12/08
Inventor 冯力潘裕华陆明典
Owner 佛山市宏图数据有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products