[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106599708A - Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof - Google Patents

Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof Download PDF

Info

Publication number
CN106599708A
CN106599708A CN201710091842.6A CN201710091842A CN106599708A CN 106599708 A CN106599708 A CN 106599708A CN 201710091842 A CN201710091842 A CN 201710091842A CN 106599708 A CN106599708 A CN 106599708A
Authority
CN
China
Prior art keywords
communication
visitor
computer
transceiver
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710091842.6A
Other languages
Chinese (zh)
Inventor
康正海
黄馨庆
李彪
阳昌珠
覃娟媚
李海涛
谭良波
吴金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liuzhou Guitong Technology Co Ltd
Original Assignee
Liuzhou Guitong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liuzhou Guitong Technology Co Ltd filed Critical Liuzhou Guitong Technology Co Ltd
Priority to CN201710091842.6A priority Critical patent/CN106599708A/en
Publication of CN106599708A publication Critical patent/CN106599708A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to a real-time access system for preventing visitors from maliciously destroying original data when exchange-accessing between networks. The system comprises an accessing computer, a communication transceiver and an accessed computer, wherein the communication transceiver includes a communication transmitter I, a communication receiver I, a communication transmitter II and a communication receiver II; the communication transmitter I and the communication receiver I are connected with the accessing computer; the communication transmitter I and the communication receiver I are connected with the accessed computer; the communication transmitter I and the communication receiver II are paired with each other; and the communication transmitter II and the communication receiver I are paired with each other. The system can satisfy the requirement of real-time accessing, eliminates a command which generates an operation of modifying, adding, deleting, pasting and covering the original data and thus prevents penetration of a malicious code.

Description

It is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data real time access Method and its system
Technical field
The present invention relates to a kind of real time access method for guaranteeing initial data safety, particularly one kind are prevented between network mutually The real time access method and its system of visitor's malicious sabotage initial data during visit.
Background technology
In OA Automatic work systems and MIS information management systems, in the OA and MIS particularly in public security system, often The access seen with operation is:1. data are inquired about;2. data are changed;3. interpolation data;4. data are deleted;5. replicate data;6. glue Patch data.
Current processing method and shortcoming:
Cause OA or mis system to be destroyed to prevent the infringement of external malicious act, generally believe that on-mechanical connects at present Tactile interconnection is safe, and the use for then simply restricting Ethernet card and ethernet line is just slept without any anxiety, under hardly realizing These interconnection accessing methods of face still still have open defect:
1st, CD is crossed:In needing to access, perhaps referred to as the data carving of instruction, information, to read-write CD, then leads to again Cross the optical disc read-write mechanism of accessed system to obtain the requirement of visitor and write back on this CD the data of the response, visitor Again CD is put on the equipment for can read this optical disc information the corresponding requirements for reading that its information for needing can reach access .
Shortcoming:Because the readable writing optical disk for obtaining on the market is general, other compatible read-write CD-ROM drive can also be to which Be written and read, thus CD when leaking its information also and then can leak, and when being written and read to which, malicious code also can be with Propagation, do not reach needs isolation take precautions against purpose.
2nd, the USB flash disk and other electronic storage mediums of published common store form:User is desired for and its exists Defect and CD to cross be the same.
3rd, the on-mechanicals such as the radio and optoelectronic transceivers of data exchange or electric are carried out using published communications protocol The access mode of directly contact:As the versatility of agreement, the propagation of malicious code just have opportunity, user is to its phase It is the same that the defect hoped and its exist also is crossed with CD.
4th, make the desire carrier of visitor using papery, conducted interviews agency by operator and human translation, and result Give original visitor after being printed upon on paper carrier again.Although this method can prevent the infringement of malicious code, visit Ask that speed is but severely impacted, and paper consuming amount is also big, does not meet the requirement of low-carbon environment-friendly.
5th, above-mentioned listed rete mirabile access method, all away from the requirement of real-time, takes larger.
6th, the safety product such as electronic warfare before use, although solve real time problems, but from some media reports Learn, some servers still can Jing often by assault.
The content of the invention
It is an object of the invention to provide preventing the real time access of visitor's malicious sabotage initial data during exchanging visit between network Method and its system, using access protocal privately owned or that title is special, and only allow limited access instruction, using existing on the market Communications transceiver realize the requirement of real time access, prevent to exist initial data can be produced modification, addition, deletion, stickup, The instruction of overlapping operation, so as to prevent penetrating for malicious code.
To solve the above problems, the technical solution used in the present invention is:Visitor's malice when one kind prevents from exchanging visits between network The real time access method of destruction initial data, it is characterised in that:The method is, using privately owned access protocal, and only to allow limited Access instruction, realizes the requirement of real time access by using existing communications transceiver on the market, prevents to exist to initial data The instruction of modification, addition, deletion, stickup, overlapping operation can be produced, so as to prevent the method for penetrating of malicious code;The method Mainly comprise the steps:
Step one:The requirement of visitor is directly sent out by the communication being connected with access computer by the proprietary protocol run on access computer Device I is sent to be transmitted directly to the communication receiver II being connected on accessed computer;
Step 2:Accessed computer captures the visiting demand of visitor again by the communication receiver II being connected thereto, then Again result is sent directly to by the communication transmitter II being connected on accessed computer according to specific requirement and accesses computer On the communication receiver I being connected;
Step 3:Access computer to send from the communication being connected with accessed computer by connected communication receiver I again The result of response is obtained on device II.
Its further technical scheme is:The communications transceiver is optoelectronic transceivers, or is radio transceiver, or is Wire communication transceiver, or be one or two of transceiver with mechanical wave as media;The communication transmitter I is connect with communication Receive device II to be mutually paired, communication transmitter II is mutually paired with communication receiver I.
Its further technical scheme is:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared Transceiver.
The radio transceiver includes radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment.
The wire communication transceiver includes that wired network adapter, photoelectronic coupler, CAN, RS-485 buses, RS-422 are total Line, RS-232 interface communication apparatus, IIC and SPI interface communication apparatus.
The transceiver with mechanical wave as media includes the audible common sound wave transmitting-receiving of ultrasonic transmitter-receiver and human ear Device.
Related another technical scheme is:A kind of visitor malicious sabotage initial data when preventing from exchanging visits between network is System, the system include:Access computer, communications transceiver, accessed computer;The communications transceiver includes communication transmitter I, leads to News receptor I, communication transmitter II and communication receiver II;The communication transmitter I and communication receiver I with access computer Connection;The communication transmitter II and communication receiver II are connected with accessed computer;The communication transmitter I is connect with communication Receive device II to be mutually paired, communication transmitter II is mutually paired with communication receiver I;
It is described to access the man machine interface that computer is available to visitor, conducted interviews by proprietary protocol for visitor, according to visit Objective requirement, is given and meets computer data, the command information collection of message reference for requiring, the computer data, message reference Command information collection be referred to as require information;
The communication transmitter I is used to send visitor's requirement information;
The communication receiver II is used to receive visitor's requirement information, and passes to accessed computer;
The accessed computer is the storage device for storing initial data, for providing initial data access service for visitor, i.e., Visitor's requirement is answered, and provides echo message;
The communication transmitter II is used to send the echo message that visitor claims;
The communication receiver I is used to receive the echo message that visitor claims, and passes to access computer, is returned visitor The result answered.
Its further technical scheme is:The communication transmitter I to access computer screen, take the photograph for accessed by communication receiver II As head, the communication transmitter II is accessed computer screen, and communication receiver I is access photographic head.
Its further technical scheme or:The communications transceiver is optoelectronic transceivers, or is radio transceiver, Or be wire communication transceiver, or be transceiver with mechanical wave as media one or two.
Its further technical scheme is:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared Transceiver;The radio transceiver includes radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment;It is described wired Communications transceiver includes that wired network adapter, photoelectronic coupler, CAN, RS-485 buses, RS-422 buses, RS-232 interface are led to News equipment, IIC and SPI interface communication apparatus;The transceiver with mechanical wave as media includes ultrasonic transmitter-receiver and human ear Audible common sound wave transceiver.
Due to taking above technical scheme, visitor's malicious sabotage original number when one kind of the present invention prevents from exchanging visits between network According to real time access method and its system compared with prior art, have the characteristics that and beneficial effect:
Visitor's malicious sabotage initial data is prevented when the 1st, exchanging visits between network;
2nd, the speed of real-time exchanging visit is reached while initial data is protected;
3rd, to the existing hardware device for remaining to normally use need not be changed during the network rebuilding.
Below, when preventing from conjunction with the accompanying drawings and embodiments exchanging visits between network to one kind of the present invention, visitor's malicious sabotage is original The technical characteristic of the real time access method and its system of data is further described.
Description of the drawings
Fig. 1 is the system structure block diagram of visitor's malicious sabotage initial data when the present invention prevents from exchanging visits between network;
Fig. 2 is system structure block diagram described in embodiment one;
Fig. 3 is system structure block diagram described in embodiment two;
Fig. 4 is system structure block diagram described in embodiment three;
Fig. 5 is system structure block diagram described in example IV;
Fig. 6 is system structure block diagram described in embodiment five;
Fig. 7 is system structure block diagram described in embodiment six.
In figure:
1- accesses computer;
2- communication transmitters I, 21- access computer screen, and 22- photoelectric senders I, 23- transmitting sets I, 24- wire communications are sent out Send device I, 25- mechanical wave generators I, 26- infrared transmitters;
3- communication receivers I, 31- access photographic head, and 32- photelectric receivers I, 33- radio receivers I, 34- wire communications connect Receive device I, 35- mechanical wave receivers I, 36- ultrasonic receivers;
4- communication receivers II, 41- are accessed photographic head, 42- photelectric receivers II, 43- radio receivers II, and 44- is wired Communication receiver II, 45- mechanical wave receivers II, 46- infrared light receivers;
5- communication transmitters II, 51- are accessed computer screen, 52- photoelectric senders II, 53- transmitting sets II, and 54- is wired Communication transmitter II, 55- mechanical wave generators II, 56- supersonic generators;
6- is accessed computer.
Specific embodiment
As shown in figure 1, it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, the system bag Include:Access computer 1, communications transceiver, accessed computer 6;The communications transceiver includes communication transmitter I 2, communication receiver I 3, communication transmitter II 5 and communication receiver II 4;The communication transmitter I 2 and communication receiver I 3 are connected with access computer 1 Connect;The communication transmitter II 5 and communication receiver II 4 are connected with accessed computer 6;The communication transmitter I 2 and communication Receptor II 4 is mutually paired, and communication transmitter II 5 is mutually paired with communication receiver I 3.
It is described to access the man machine interface that computer 1 is available to visitor, conducted interviews by proprietary protocol for visitor, root According to visitor's requirement, be given and meet computer data, the command information collection of message reference for requiring, after so similar lifting manipulation Abbreviation require information;
The communication transmitter I 2 is used to send visitor's requirement information;
The communication receiver II 4 is used to receive visitor's requirement information, and passes to accessed computer 6;
The accessed computer 6 be store initial data storage device, insider custom be called data server, be used for Initial data access service is provided for visitor, that is, is answered visitor's requirement, and is provided echo message;
The communication transmitter II 5 is used to send the echo message that visitor claims;
The communication receiver I 3 is used to receive the echo message that visitor claims, and passes to access computer 1, obtains visitor The result of response.
The method of the real time access of visitor's malicious sabotage initial data when carrying out preventing from exchanging visits between network using the system It is:Using privately owned access protocal, and limited access instruction is only allowed, realized by using existing communications transceiver on the market The requirement of real time access, prevents the presence of the instruction that modification, addition, deletion, stickup, overlapping operation can be produced to initial data, from And prevent the method for penetrating of malicious code;The method mainly comprises the steps:
Step one:The requirement of visitor directly by access on computer 1 proprietary protocol that runs by with access the communication that computer 1 is connected Transmitter I 2 is transmitted directly to the communication receiver II 4 being connected on accessed computer 6;
Step 2:Accessed computer 6 captures the visiting demand of visitor again by the communication receiver II 4 being connected thereto, so Again result is sent directly to and access by the communication transmitter II 5 being connected on accessed computer 6 according to specific requirement afterwards On the communication receiver I 3 that computer 1 is connected;
Step 3:Access computer 1 to send out from the communication being connected with accessed computer 6 by connected communication receiver I 3 again Send the result that response is obtained on device II 5.
According to selecting different communications transceivers to constitute different systems, there is following different embodiment.
Embodiment one:
The system of the present embodiment as shown in Fig. 2 in the present embodiment, respectively visit by communication transmitter I 2 and communication transmitter II 5 Ask that computer screen 21 and accessed computer screen 51, the communication receiver I 3 and communication receiver II 4 respectively access photographic head 31 With accessed photographic head 41;
The requirement of visitor is represented on computer screen 21 is accessed by accessing the proprietary protocol run on computer 1, is accessed computer 6 and leads to Cross connected accessed photographic head 41 and capture the visiting demand represented computer screen 21 is accessed, then according to specific requirement Again result is answered on coupled accessed computer screen 51, the access computer 1 of visitor is again by connected visit Ask that photographic head 31 obtains the result of response from accessed computer screen 51.
Represent that the require information and result of visitor answer the side of information by the output of computer display screen curtain in the present embodiment The method that method answers information with require information and result that visitor is obtained by photographic head is corresponding, if the acquisition of information Method is the recognition methodss by image to word(It is referred to as in the industry OCR), then the interactive information being displayed on computer display screen curtain It is exactly graph text information;If the acquisition methods of information are identified by Quick Response Code agreement, computer display screen is displayed in Interactive information on curtain is with regard to 2 D code information.For example, when the require information of visitor is displayed in access computer in the form of Quick Response Code When on screen 21, accessed computer 6 captures the Quick Response Code A for accessing computer screen 21 by being accessed photographic head 41(Require information), Then answer message result to be equally displayed on accessed computer screen 51 in the form of Quick Response Code, then by accessing photographic head 31 Capture the Quick Response Code B on accessed computer screen 51(As a result answer message)Pass on the access computer screen 21 for accessing computer 1, make Visitor obtains the result responded.
Embodiment two:
As shown in figure 3, in the present embodiment, communications transceiver adopts optoelectronic transceivers to the system of the present embodiment.Photoelectric sender I 22 used as communication transmitter I 2, and photoelectric sender II 52 is used as communication transmitter II 5;Photelectric receiver I 32 is received as communication Device I 3, photelectric receiver II 42 is used as communication receiver II 4.The requirement of visitor is directly by the privately owned association run on access computer 1 View is media transmission to the opto-electronic receiver that be connected to accessed computer on 6 with light by connected photoelectric sender I 22 again Device II 42, accessed computer 6 capture the visiting demand of visitor, Ran Hougen again by the photelectric receiver II 42 being connected thereto Again result is sent to by the photoelectric sender II 52 being connected on accessed computer 6 according to specific requirement and accesses 1 phase of computer On the photelectric receiver I 32 of connection, access computer 1 again by connected photelectric receiver I 32 from 6 phase of accessed computer The result of response is obtained on the photoelectric sender II 52 of connection.
Optoelectronic transceivers or fiber optical transceiver or photoelectronic coupler or infrared transceiver in the present embodiment.
Embodiment three:
As shown in figure 4, in the present embodiment, communications transceiver adopts radio transceiver to the system of the present embodiment;Radio is sent out , used as communication transmitter I 2, transmitting set II 53 is used as communication transmitter II 5 for emitter I 23;I 33 conduct of radio receiver Communication receiver I 3, radio receiver II 43 is used as communication receiver II 4.The requirement of visitor is directly by fortune on access computer 1 Capable proprietary protocol is accessed electric to being connected to by media transmission of electromagnetic wave by connected transmitting set I 23 again Radio receiver II 43 on brain 6, accessed computer 6 catch visiting by the radio receiver II 43 being connected thereto again The visiting demand of visitor, then according to specific requirement again result by the transmitting set II that is connected on accessed computer 6 53 are sent to as media with electromagnetic wave and are accessed on the radio receiver I 33 that is connected of computer 1, access computer 1 again by with The radio receiver I 33 of its connection obtains the knot of response from the transmitting set II 53 being connected with accessed computer 6 Really.
Radio transceiver or conventionally used radio set in the present embodiment or at present on the market wireless Data transmission equipment or WIFI equipment or bluetooth equipment.
Example IV:
As shown in figure 5, in the present embodiment, communications transceiver is using the wire communication for needing Mechanical Contact for the system of the present embodiment Transceiver;, used as communication transmitter I 2, wire communication transmitter II 54 is used as communication transmitter II 5 for wire communication transmitter I 24; , used as communication receiver I 3, wire communication receptor II 44 is used as communication receiver II 4 for wire communication receptor I 34.Visitor's Require directly directly to be transmitted by connected wire communication transmitter I 24 by the proprietary protocol run on access computer 1 again To the wire communication receptor II 44 being connected on accessed computer 6, accessed computer 6 cable modem again by being connected thereto News receptor II 44 captures the visiting demand of visitor, then according to specific requirement again result by being connected to accessed computer Wire communication transmitter II 54 on 6 is sent directly to and accesses on the wire communication receptor I 34 that computer 1 is connected, and accesses Computer 1 is again by connected wire communication receptor I 34 from the wire communication transmitter II being connected with accessed computer 6 The result of response is obtained on 54.
It is total that wire communication transceiver in the present embodiment includes but be not limited solely to wired network adapter, photoelectronic coupler, CAN Line, RS-485 buses, RS-422 buses, RS-232 interface communication apparatus, IIC and SPI interface communication apparatus.
Embodiment five:
As shown in fig. 6, in the present embodiment, communications transceiver adopts the transmitting-receiving with mechanical wave as media to the system of the present embodiment Device;, used as communication transmitter I 2, mechanical wave generator II 55 is used as communication transmitter II 5 for mechanical wave generator I 25;Mechanical wave connects Device I 35 is received as communication receiver I 3, mechanical wave receiver II 45 is used as communication receiver II 4.The requirement of visitor is directly by visiting Ask that the proprietary protocol run on computer 1 is transmitted directly to be connected to by connected mechanical wave generator I 25 again accessed Mechanical wave receiver II 45 on computer 6, accessed computer 6 are captured by the mechanical wave receiver II 45 being connected thereto again The visiting demand of visitor, then according to specific requirement again result by the mechanical wave generator that is connected on accessed computer 6 II 55 are sent directly to and access on the mechanical wave receiver I 35 that computer 1 is connected, and access computer 1 again by connected Mechanical wave receiver I 35 obtains the result of response from the mechanical wave generator II 55 being connected with accessed computer 6.Such as Fig. 6 It is shown.
The transceiver with mechanical wave as media described in the present embodiment includes but is not limited solely to ultrasonic transmitter-receiver, people The audible common sound wave transceiver of ear, the latter include microphone(MIC)And its acoustic receiver that amplifier is constituted(Also be commonly called as Pick up)The sonic generator constituted with audio frequency power amplifier and loudspeaker.
Embodiment six:
As shown in fig. 7, in the present embodiment, infrared transmitter 26 is used as communication transmitter I 2, ultrasound for the system of the present embodiment Wave producer 56 is used as communication transmitter II 5;Ultrasonic receiver 36 is used as communication receiver I 3,46 conduct of infrared light receiver Communication receiver II 4.The requirement of visitor directly passes through connected infrared light again by the proprietary protocol run on access computer 1 Emitter 26 is transmitted directly to the infrared light receiver 46 being connected on accessed computer 6, and accessed computer 6 is again by being connected to Infrared light receiver 46 thereon captures the visiting demand of visitor, then according to specific requirement again result by be connected to by Access the supersonic generator 56 on computer 6 to be sent directly to and access on the ultrasonic receiver 36 that computer 1 is connected, access Computer 1 is obtained from the supersonic generator 56 being connected with accessed computer 6 by connected ultrasonic receiver 36 again Fetch the result answered.
In the present embodiment, we referred to as access transceiver the communications transceiver of transmission visiting demand(As communication is sent out Send device I 2 and communication receiver I 3), the referred to as accessed transceiver of communications transceiver for answering visiting demand(As communication sends Device II 5 and communication receiver II 4), described access transceiver and accessed transceiver be not necessarily by the use of identical media as The transceiver of the similar media of carrier wave, as long as the communication transmitter I 2 is mutually paired with communication receiver II 4, communication transmitter II 5 are mutually paired with communication receiver I 3.
Used as one kind conversion of the present embodiment, described access transceiver and accessed transceiver may each be but not only office It is limited to embodiment one to any one transceiver being mutually paired described in embodiment five.The transmitting-receiving that can be used is enumerated now Device, but it is not limited solely to any pair product of following pairing:1st, ultrasonic transmitter-receiver;2nd, the audible common sound wave of human ear is received Send out device(Common are by microphone(MIC)And its acoustic receiver that amplifier is constituted(Also it is commonly called as pick up)And audio frequency power amplifier And the sound transmitter that loudspeaker are constituted);3rd, optoelectronic transceivers;4th, fiber optical transceiver;5th, bluetooth equipment;6th, WIFI equipment;7th, have Gauze card;8th, wireless network card;9th, twoway radio;10th, display screen and photographic head;11st, wire communication equipment:Such as wired network Card, the communication of CAN interface communication apparatus, RS-485 bus interface equipments, RS-422 bus interface equipments, RS-232 interface set Standby, IIC and SPI interface communication apparatus, other buses or parallel interface communication apparatus.
Using the technical scheme of the present embodiment, communications transceiver adopts two kinds of different types, internetwork physical isolation More preferably, initial data is just less by the probability of visitor's malicious sabotage for effect.
Privately owned access protocal in the present invention can be regarded as:The agreement of initial data can be directly accessed, is also included:When the 3rd When square application program provides access service for visitor using interface function, the function is removing the letter of the accessed data safety of harm This privately owned access protocal is reused after breath and transmits remaining visiting demand information, so as to reach the visit for visitor being met to desired data Ask requirement.
Above content is with reference to specific preferred implementation further description made for the present invention, it is impossible to assert The present invention be embodied as be confined to the record of the various embodiments described above, for the ordinary skill people of the technical field of the invention For member, without departing from the inventive concept of the premise, some simple deduction or replace can also be made, should be all considered as belonging to The scope of patent protection that the present invention is determined by the claims submitted to.

Claims (10)

1. it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data real time access method, it is characterised in that:Should Method is, using privately owned access protocal, and only to allow limited access instruction, by using existing communications transceiver on the market The requirement of real time access is realized, prevents the presence of the finger that modification, addition, deletion, stickup, overlapping operation can be produced to initial data Order, so as to prevent the method for penetrating of malicious code;The method mainly comprises the steps:
Step one:The requirement of visitor is directly by access computer(1)The proprietary protocol of upper operation by with access computer(1)Connection Communication transmitter I(2)It is transmitted directly to be connected to accessed computer(6)On communication receiver II(4);
Step 2:Accessed computer(6)Pass through the communication receiver II being connected thereto again(4)The access for capturing visitor will Ask, then according to specific requirement again result by being connected to accessed computer(6)On communication transmitter II(5)Directly transmit To with access computer(1)The communication receiver I being connected(3)On;
Step 3:Access computer(1)Pass through connected communication receiver I again(3)From with accessed computer(6)It is connected Communication transmitter II(5)It is upper to obtain the result responded.
2. it is according to claim 1 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side Method, it is characterised in that:The communications transceiver is optoelectronic transceivers, or is radio transceiver, or is received and dispatched for wire communication Device, or be one or two of transceiver with mechanical wave as media;The communication transmitter I(2)With communication receiver II(4) It is mutually paired, communication transmitter II(5)With communication receiver I(3)It is mutually paired.
3. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side Method, it is characterised in that:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared transceiver.
4. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side Method, it is characterised in that:The radio transceiver includes radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment.
5. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side Method, it is characterised in that:The wire communication transceiver include wired network adapter, photoelectronic coupler, CAN, RS-485 buses, RS-422 buses, RS-232 interface communication apparatus, IIC and SPI interface communication apparatus.
6. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side Method, it is characterised in that:The transceiver with mechanical wave as media includes the audible conventional acoustic of ultrasonic transmitter-receiver and human ear Ripple transceiver.
7. it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, it is characterised in that:The system includes: Access computer(1), communications transceiver, accessed computer(6);The communications transceiver includes communication transmitter I(2), communication connect Receive device I(3), communication transmitter II(5)With communication receiver II(4);The communication transmitter I(2)With communication receiver I(3) With access computer(1)Connection;The communication transmitter II(5)With communication receiver II(4)With accessed computer(6)Even Connect;The communication transmitter I(2)With communication receiver II(4)It is mutually paired, communication transmitter II(5)With communication receiver I (3)It is mutually paired;
The access computer(1)The man machine interface of visitor is available to, is conducted interviews by proprietary protocol for visitor, according to Visitor's requirement, is given and meets computer data, the command information collection of message reference for requiring, the computer data, information are visited The command information collection asked is referred to as require information;
The communication transmitter I(2)For sending visitor's requirement information;
The communication receiver II(4)For receiving visitor's requirement information, and pass to accessed computer(6);
The accessed computer(6)It is the storage device for storing initial data, for providing initial data access service for visitor, Visitor's requirement is answered, and provides echo message;
The communication transmitter II(5)For sending the echo message that visitor claims;
The communication receiver I(3)For receiving the echo message that visitor claims, and pass to access computer(1), make visitor Obtain the result responded.
8. it is according to claim 7 it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, its It is characterised by:The communication transmitter I(2)To access computer screen, communication receiver II(4)It is to be accessed photographic head, described logical News transmitter II(5)To be accessed computer screen, communication receiver I(3)To access photographic head.
9. it is according to claim 7 it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, its It is characterised by:The communications transceiver is optoelectronic transceivers, or is radio transceiver, or is wire communication transceiver, or Be transceiver with mechanical wave as media one or two.
10. it is according to claim 9 it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, its It is characterised by:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared transceiver;The radio transceiver Including radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment;The wire communication transceiver include wired network adapter, The communication of photoelectronic coupler, CAN, RS-485 buses, RS-422 buses, RS-232 interface communication apparatus, IIC and SPI interface Equipment;The transceiver with mechanical wave as media includes the audible common sound wave transceiver of ultrasonic transmitter-receiver and human ear.
CN201710091842.6A 2017-02-21 2017-02-21 Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof Pending CN106599708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710091842.6A CN106599708A (en) 2017-02-21 2017-02-21 Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710091842.6A CN106599708A (en) 2017-02-21 2017-02-21 Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof

Publications (1)

Publication Number Publication Date
CN106599708A true CN106599708A (en) 2017-04-26

Family

ID=58587641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710091842.6A Pending CN106599708A (en) 2017-02-21 2017-02-21 Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof

Country Status (1)

Country Link
CN (1) CN106599708A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444742A (en) * 2000-05-28 2003-09-24 梅耶·亚隆 General comprehensive computer safety protection system and method aiming at information stealing and destructive behaviors of bad programs
CN101800757A (en) * 2010-02-03 2010-08-11 国家保密科学技术研究所 No-feedback one-way data transmission method based on single fiber structure
CN102970317A (en) * 2012-03-27 2013-03-13 广州市国迈科技有限公司 Safety design scheme of private cloud storage system
CN104798355A (en) * 2012-09-18 2015-07-22 思杰系统有限公司 Mobile device management and security
CN105282107A (en) * 2014-07-04 2016-01-27 北京信威通信技术股份有限公司 Authorization method of visiting external data by XMPP system and communication network
CN105373745A (en) * 2015-11-12 2016-03-02 深圳市华德安科技有限公司 Data access control method and device for site enforcement recorder and site enforcement recorder
CN106230870A (en) * 2016-10-13 2016-12-14 成都东方盛行电子有限责任公司 Proprietary protocol document transmission system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444742A (en) * 2000-05-28 2003-09-24 梅耶·亚隆 General comprehensive computer safety protection system and method aiming at information stealing and destructive behaviors of bad programs
CN101800757A (en) * 2010-02-03 2010-08-11 国家保密科学技术研究所 No-feedback one-way data transmission method based on single fiber structure
CN102970317A (en) * 2012-03-27 2013-03-13 广州市国迈科技有限公司 Safety design scheme of private cloud storage system
CN104798355A (en) * 2012-09-18 2015-07-22 思杰系统有限公司 Mobile device management and security
CN105282107A (en) * 2014-07-04 2016-01-27 北京信威通信技术股份有限公司 Authorization method of visiting external data by XMPP system and communication network
CN105373745A (en) * 2015-11-12 2016-03-02 深圳市华德安科技有限公司 Data access control method and device for site enforcement recorder and site enforcement recorder
CN106230870A (en) * 2016-10-13 2016-12-14 成都东方盛行电子有限责任公司 Proprietary protocol document transmission system and method

Similar Documents

Publication Publication Date Title
US6864779B2 (en) Method and apparatus for transmitting data from a remote location to a desired device
CN101315706A (en) Attendance checking method, attendance sending terminal, attendance server and mobile terminal
CN105429905A (en) Method, device and system for monitoring advertisement putting terminal
DE60221113D1 (en) PROCESS AND SYSTEM FOR THE REMOTE AND MANAGEMENT OF PERSONNEL SECURITY DEVICES
CN104796322B (en) A kind of message treatment method and its equipment
CN104811652A (en) Conference system based on electronic white board
CN107222711A (en) Monitoring system, method and the client of warehoused cargo
CN106781763A (en) A kind of university's applied mathematics Teaching System
CN206515825U (en) A kind of system of visitor's malicious sabotage initial data when preventing exchanging visit between network
CN106599708A (en) Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof
JP2011145802A (en) Message mediation apparatus and control method therefor
CN106919530A (en) A kind of one-way transmission component based on visible ray
CN206584350U (en) A kind of one-way transmission component based on visible ray
JP2005354233A5 (en)
CN109639443A (en) A kind of intelligence microphone conference system
CN205644664U (en) Fingerprint attendance checking system
CN105511988B (en) Encrypted data management method and device and electronic equipment
CN109767528A (en) Information determining method and device
CN107404627A (en) A kind of computer based conference system
CN109151408B (en) Full-duplex window intercom device, system and intercom method thereof
CN111224987B (en) Short-wave multimedia communication method
CN103295358A (en) Warning method for access control system and embedded mainboard for implementing warning method
CN106507038A (en) full duplex window talkback system
CN107346563A (en) A kind of attendance system and method based on face recognition
CN107885809A (en) File transmission method and device, intelligent tablet and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426