Audit-based data secure transmission method and system from inside to outside, and electronic equipment

A technology of data security and transmission method, applied in the field of data transmission, can solve the problems of large number of devices, irregular interface management, random connection of external devices, etc., to achieve the effect of ensuring integrity and accuracy

Pending Publication Date: 2022-07-05
CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing rail transit system has a large number of equipment, and it is very easy to have a risk loophole in the external tran

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Audit-based data secure transmission method and system from inside to outside, and electronic equipment
  • Audit-based data secure transmission method and system from inside to outside, and electronic equipment
  • Audit-based data secure transmission method and system from inside to outside, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0067] As used herein, the terms "first," "second," and other similar words are not intended to imply any order, quantity, or importance, but are merely used to distinguish between different elements. As used herein, the terms "a", "an" and other similar words are not intended to mean that there is only one of the said things, but rather that the description is for only one of the said things, which may have one or more . As used herein, the terms "comprises," "includes," and oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an audit-based secure data transmission method and system from inside to outside and electronic equipment, and the method comprises the steps that an intranet module receives an internal data transmission instruction lifted by a user, and audits user information and internal data information; if the audit is passed, the intranet module transmits internal data; and if the audit is not passed, rejecting the internal data transmission instruction, and ending the operation. According to the data security transmission method, the risk vulnerability that sensitive data in the rail transit system is transmitted outwards can be avoided, so that the risk caused by the complex system structure of the rail transit system is effectively made up, and a technical support is provided for establishing and perfecting a data security migration protection system based on the rail transit system.

Description

technical field [0001] The invention belongs to the technical field of data transmission, and in particular relates to a method, system and electronic equipment for safe transmission of data from inside to outside based on auditing. Background technique [0002] Today, with the rapid development of information technology, the contact between the rail transit system and the outside world is more frequent, which more and more reflects the vulnerability of the rail transit system. With the continuous expansion of the network scale of the rail transit system, any attack or infringement on the rail transit system may cause greater loss of personnel and property, and have long-term and far-reaching adverse effects, which increasingly reflects the rail transit system. Importance of safe operation. [0003] The existing rail transit system has a large number of equipment, and is prone to risk loopholes in the external transmission of sensitive data within the rail transit system du...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L67/06H04L69/08H04L69/22
CPCH04L63/10H04L63/105H04L69/08H04L69/22H04L67/06H04L63/20
Inventor 陈永江侯斯尧李强邹奇良回沫盈
Owner CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products