Network security data interaction method, system and device and storage medium

A data interaction and network security technology, applied in the field of data interaction, can solve the problems of lack of boundary protection, lack of data management and control, effective approval, security encryption, data flow control, etc. in the office intranet and office extranet, so as to achieve compliance, Increase approval and control, increase the effect of encrypted transmission

Pending Publication Date: 2022-05-06
CENT CHINA BRANCH OF CHINA DATANG CORP SCI & TECH RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the process of data interaction between the internal network and the external network, there is a lack of data control, effective approval, security encryption, and controllable data transfer. At the same time, there is a lack of effective boundary protection between the office internal network and the office external network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security data interaction method, system and device and storage medium
  • Network security data interaction method, system and device and storage medium
  • Network security data interaction method, system and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of this application clearer, the following in conjunction with the attached Figure 1-6 And embodiment, this application is described in further detail. It should be understood that the specific embodiments described here are used to explain the present application, not to limit the present application.

[0054] A network security data interaction method provided by this application mainly solves the problem of data security interaction between the office intranet and the office extranet, especially for the management and control of data or software interfaces that provide technical services to the outside world, and realizes effective approval of data, Data encryption and network perimeter protection.

[0055] refer to figure 1 A network security data interaction method provided in an embodiment of the present application specifically includes:

[0056] S1: Build a data transmission interface, the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data interaction, in particular to a network security data interaction method, system and device and a storage medium, the method comprises the following steps: constructing data transmission interfaces, the data transmission interfaces comprising a first data transmission interface and a second data transmission interface, and according to the first data transmission interface and the second data transmission interface, performing data interaction on the first data transmission interface and the second data transmission interface; unified reading, unified output and unified data format conversion of data sharing resources are realized; acquiring sharing demand information of each unit, and performing support management on the sharing demand information to realize paperless office of sharing demands; authorizing the sharing demand of each unit based on the authorization authority; carrying out encryption processing on the data sharing resource based on the data encryption rule; and carrying out exchange transmission on the data sharing resources based on the first data transmission interface and the second data transmission interface, and carrying out real-time monitoring on the exchange transmission process of the data sharing resources.

Description

technical field [0001] The present application relates to the field of data interaction, in particular to a network security data interaction method, system, device and storage medium. Background technique [0002] The internal network of enterprises and institutions must be physically isolated from the external network because it involves commercial secrets or sensitive data, but it is often necessary to obtain real-time data from the external network. Physically isolated data exchange technologies include network gates and optical gates. [0003] At present, according to the requirements of the National Energy on the network division of the power monitoring system, the network of each unit is divided into a production control area and a management information area. The management information area is further divided into an internal network office area and an external network office area. The office internal network in the district is logically isolated from the external ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/176G06F21/60G06Q10/10H04L9/40
CPCG06F16/176G06F21/602G06F21/606G06Q10/103H04L63/02H04L63/0428H04L63/10G06F2221/2107
Inventor 张之刚李若峰付卫宁王方玉杨杰
Owner CENT CHINA BRANCH OF CHINA DATANG CORP SCI & TECH RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products