CN106599708A - Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof - Google Patents
Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof Download PDFInfo
- Publication number
- CN106599708A CN106599708A CN201710091842.6A CN201710091842A CN106599708A CN 106599708 A CN106599708 A CN 106599708A CN 201710091842 A CN201710091842 A CN 201710091842A CN 106599708 A CN106599708 A CN 106599708A
- Authority
- CN
- China
- Prior art keywords
- communication
- visitor
- computer
- transceiver
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 31
- 238000004891 communication Methods 0.000 claims abstract description 194
- 230000005693 optoelectronics Effects 0.000 claims description 13
- 230000003287 optical effect Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 8
- 239000000835 fiber Substances 0.000 claims description 6
- 238000007792 addition Methods 0.000 claims description 4
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 230000000149 penetrating effect Effects 0.000 claims description 4
- 230000035515 penetration Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 7
- 230000007547 defect Effects 0.000 description 3
- 230000006378 damage Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 208000019901 Anxiety disease Diseases 0.000 description 1
- 230000036506 anxiety Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention relates to a real-time access system for preventing visitors from maliciously destroying original data when exchange-accessing between networks. The system comprises an accessing computer, a communication transceiver and an accessed computer, wherein the communication transceiver includes a communication transmitter I, a communication receiver I, a communication transmitter II and a communication receiver II; the communication transmitter I and the communication receiver I are connected with the accessing computer; the communication transmitter I and the communication receiver I are connected with the accessed computer; the communication transmitter I and the communication receiver II are paired with each other; and the communication transmitter II and the communication receiver I are paired with each other. The system can satisfy the requirement of real-time accessing, eliminates a command which generates an operation of modifying, adding, deleting, pasting and covering the original data and thus prevents penetration of a malicious code.
Description
Technical field
The present invention relates to a kind of real time access method for guaranteeing initial data safety, particularly one kind are prevented between network mutually
The real time access method and its system of visitor's malicious sabotage initial data during visit.
Background technology
In OA Automatic work systems and MIS information management systems, in the OA and MIS particularly in public security system, often
The access seen with operation is:1. data are inquired about;2. data are changed;3. interpolation data;4. data are deleted;5. replicate data;6. glue
Patch data.
Current processing method and shortcoming:
Cause OA or mis system to be destroyed to prevent the infringement of external malicious act, generally believe that on-mechanical connects at present
Tactile interconnection is safe, and the use for then simply restricting Ethernet card and ethernet line is just slept without any anxiety, under hardly realizing
These interconnection accessing methods of face still still have open defect:
1st, CD is crossed:In needing to access, perhaps referred to as the data carving of instruction, information, to read-write CD, then leads to again
Cross the optical disc read-write mechanism of accessed system to obtain the requirement of visitor and write back on this CD the data of the response, visitor
Again CD is put on the equipment for can read this optical disc information the corresponding requirements for reading that its information for needing can reach access
.
Shortcoming:Because the readable writing optical disk for obtaining on the market is general, other compatible read-write CD-ROM drive can also be to which
Be written and read, thus CD when leaking its information also and then can leak, and when being written and read to which, malicious code also can be with
Propagation, do not reach needs isolation take precautions against purpose.
2nd, the USB flash disk and other electronic storage mediums of published common store form:User is desired for and its exists
Defect and CD to cross be the same.
3rd, the on-mechanicals such as the radio and optoelectronic transceivers of data exchange or electric are carried out using published communications protocol
The access mode of directly contact:As the versatility of agreement, the propagation of malicious code just have opportunity, user is to its phase
It is the same that the defect hoped and its exist also is crossed with CD.
4th, make the desire carrier of visitor using papery, conducted interviews agency by operator and human translation, and result
Give original visitor after being printed upon on paper carrier again.Although this method can prevent the infringement of malicious code, visit
Ask that speed is but severely impacted, and paper consuming amount is also big, does not meet the requirement of low-carbon environment-friendly.
5th, above-mentioned listed rete mirabile access method, all away from the requirement of real-time, takes larger.
6th, the safety product such as electronic warfare before use, although solve real time problems, but from some media reports
Learn, some servers still can Jing often by assault.
The content of the invention
It is an object of the invention to provide preventing the real time access of visitor's malicious sabotage initial data during exchanging visit between network
Method and its system, using access protocal privately owned or that title is special, and only allow limited access instruction, using existing on the market
Communications transceiver realize the requirement of real time access, prevent to exist initial data can be produced modification, addition, deletion, stickup,
The instruction of overlapping operation, so as to prevent penetrating for malicious code.
To solve the above problems, the technical solution used in the present invention is:Visitor's malice when one kind prevents from exchanging visits between network
The real time access method of destruction initial data, it is characterised in that:The method is, using privately owned access protocal, and only to allow limited
Access instruction, realizes the requirement of real time access by using existing communications transceiver on the market, prevents to exist to initial data
The instruction of modification, addition, deletion, stickup, overlapping operation can be produced, so as to prevent the method for penetrating of malicious code;The method
Mainly comprise the steps:
Step one:The requirement of visitor is directly sent out by the communication being connected with access computer by the proprietary protocol run on access computer
Device I is sent to be transmitted directly to the communication receiver II being connected on accessed computer;
Step 2:Accessed computer captures the visiting demand of visitor again by the communication receiver II being connected thereto, then
Again result is sent directly to by the communication transmitter II being connected on accessed computer according to specific requirement and accesses computer
On the communication receiver I being connected;
Step 3:Access computer to send from the communication being connected with accessed computer by connected communication receiver I again
The result of response is obtained on device II.
Its further technical scheme is:The communications transceiver is optoelectronic transceivers, or is radio transceiver, or is
Wire communication transceiver, or be one or two of transceiver with mechanical wave as media;The communication transmitter I is connect with communication
Receive device II to be mutually paired, communication transmitter II is mutually paired with communication receiver I.
Its further technical scheme is:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared
Transceiver.
The radio transceiver includes radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment.
The wire communication transceiver includes that wired network adapter, photoelectronic coupler, CAN, RS-485 buses, RS-422 are total
Line, RS-232 interface communication apparatus, IIC and SPI interface communication apparatus.
The transceiver with mechanical wave as media includes the audible common sound wave transmitting-receiving of ultrasonic transmitter-receiver and human ear
Device.
Related another technical scheme is:A kind of visitor malicious sabotage initial data when preventing from exchanging visits between network is
System, the system include:Access computer, communications transceiver, accessed computer;The communications transceiver includes communication transmitter I, leads to
News receptor I, communication transmitter II and communication receiver II;The communication transmitter I and communication receiver I with access computer
Connection;The communication transmitter II and communication receiver II are connected with accessed computer;The communication transmitter I is connect with communication
Receive device II to be mutually paired, communication transmitter II is mutually paired with communication receiver I;
It is described to access the man machine interface that computer is available to visitor, conducted interviews by proprietary protocol for visitor, according to visit
Objective requirement, is given and meets computer data, the command information collection of message reference for requiring, the computer data, message reference
Command information collection be referred to as require information;
The communication transmitter I is used to send visitor's requirement information;
The communication receiver II is used to receive visitor's requirement information, and passes to accessed computer;
The accessed computer is the storage device for storing initial data, for providing initial data access service for visitor, i.e.,
Visitor's requirement is answered, and provides echo message;
The communication transmitter II is used to send the echo message that visitor claims;
The communication receiver I is used to receive the echo message that visitor claims, and passes to access computer, is returned visitor
The result answered.
Its further technical scheme is:The communication transmitter I to access computer screen, take the photograph for accessed by communication receiver II
As head, the communication transmitter II is accessed computer screen, and communication receiver I is access photographic head.
Its further technical scheme or:The communications transceiver is optoelectronic transceivers, or is radio transceiver,
Or be wire communication transceiver, or be transceiver with mechanical wave as media one or two.
Its further technical scheme is:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared
Transceiver;The radio transceiver includes radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment;It is described wired
Communications transceiver includes that wired network adapter, photoelectronic coupler, CAN, RS-485 buses, RS-422 buses, RS-232 interface are led to
News equipment, IIC and SPI interface communication apparatus;The transceiver with mechanical wave as media includes ultrasonic transmitter-receiver and human ear
Audible common sound wave transceiver.
Due to taking above technical scheme, visitor's malicious sabotage original number when one kind of the present invention prevents from exchanging visits between network
According to real time access method and its system compared with prior art, have the characteristics that and beneficial effect:
Visitor's malicious sabotage initial data is prevented when the 1st, exchanging visits between network;
2nd, the speed of real-time exchanging visit is reached while initial data is protected;
3rd, to the existing hardware device for remaining to normally use need not be changed during the network rebuilding.
Below, when preventing from conjunction with the accompanying drawings and embodiments exchanging visits between network to one kind of the present invention, visitor's malicious sabotage is original
The technical characteristic of the real time access method and its system of data is further described.
Description of the drawings
Fig. 1 is the system structure block diagram of visitor's malicious sabotage initial data when the present invention prevents from exchanging visits between network;
Fig. 2 is system structure block diagram described in embodiment one;
Fig. 3 is system structure block diagram described in embodiment two;
Fig. 4 is system structure block diagram described in embodiment three;
Fig. 5 is system structure block diagram described in example IV;
Fig. 6 is system structure block diagram described in embodiment five;
Fig. 7 is system structure block diagram described in embodiment six.
In figure:
1- accesses computer;
2- communication transmitters I, 21- access computer screen, and 22- photoelectric senders I, 23- transmitting sets I, 24- wire communications are sent out
Send device I, 25- mechanical wave generators I, 26- infrared transmitters;
3- communication receivers I, 31- access photographic head, and 32- photelectric receivers I, 33- radio receivers I, 34- wire communications connect
Receive device I, 35- mechanical wave receivers I, 36- ultrasonic receivers;
4- communication receivers II, 41- are accessed photographic head, 42- photelectric receivers II, 43- radio receivers II, and 44- is wired
Communication receiver II, 45- mechanical wave receivers II, 46- infrared light receivers;
5- communication transmitters II, 51- are accessed computer screen, 52- photoelectric senders II, 53- transmitting sets II, and 54- is wired
Communication transmitter II, 55- mechanical wave generators II, 56- supersonic generators;
6- is accessed computer.
Specific embodiment
As shown in figure 1, it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, the system bag
Include:Access computer 1, communications transceiver, accessed computer 6;The communications transceiver includes communication transmitter I 2, communication receiver
I 3, communication transmitter II 5 and communication receiver II 4;The communication transmitter I 2 and communication receiver I 3 are connected with access computer 1
Connect;The communication transmitter II 5 and communication receiver II 4 are connected with accessed computer 6;The communication transmitter I 2 and communication
Receptor II 4 is mutually paired, and communication transmitter II 5 is mutually paired with communication receiver I 3.
It is described to access the man machine interface that computer 1 is available to visitor, conducted interviews by proprietary protocol for visitor, root
According to visitor's requirement, be given and meet computer data, the command information collection of message reference for requiring, after so similar lifting manipulation
Abbreviation require information;
The communication transmitter I 2 is used to send visitor's requirement information;
The communication receiver II 4 is used to receive visitor's requirement information, and passes to accessed computer 6;
The accessed computer 6 be store initial data storage device, insider custom be called data server, be used for
Initial data access service is provided for visitor, that is, is answered visitor's requirement, and is provided echo message;
The communication transmitter II 5 is used to send the echo message that visitor claims;
The communication receiver I 3 is used to receive the echo message that visitor claims, and passes to access computer 1, obtains visitor
The result of response.
The method of the real time access of visitor's malicious sabotage initial data when carrying out preventing from exchanging visits between network using the system
It is:Using privately owned access protocal, and limited access instruction is only allowed, realized by using existing communications transceiver on the market
The requirement of real time access, prevents the presence of the instruction that modification, addition, deletion, stickup, overlapping operation can be produced to initial data, from
And prevent the method for penetrating of malicious code;The method mainly comprises the steps:
Step one:The requirement of visitor directly by access on computer 1 proprietary protocol that runs by with access the communication that computer 1 is connected
Transmitter I 2 is transmitted directly to the communication receiver II 4 being connected on accessed computer 6;
Step 2:Accessed computer 6 captures the visiting demand of visitor again by the communication receiver II 4 being connected thereto, so
Again result is sent directly to and access by the communication transmitter II 5 being connected on accessed computer 6 according to specific requirement afterwards
On the communication receiver I 3 that computer 1 is connected;
Step 3:Access computer 1 to send out from the communication being connected with accessed computer 6 by connected communication receiver I 3 again
Send the result that response is obtained on device II 5.
According to selecting different communications transceivers to constitute different systems, there is following different embodiment.
Embodiment one:
The system of the present embodiment as shown in Fig. 2 in the present embodiment, respectively visit by communication transmitter I 2 and communication transmitter II 5
Ask that computer screen 21 and accessed computer screen 51, the communication receiver I 3 and communication receiver II 4 respectively access photographic head 31
With accessed photographic head 41;
The requirement of visitor is represented on computer screen 21 is accessed by accessing the proprietary protocol run on computer 1, is accessed computer 6 and leads to
Cross connected accessed photographic head 41 and capture the visiting demand represented computer screen 21 is accessed, then according to specific requirement
Again result is answered on coupled accessed computer screen 51, the access computer 1 of visitor is again by connected visit
Ask that photographic head 31 obtains the result of response from accessed computer screen 51.
Represent that the require information and result of visitor answer the side of information by the output of computer display screen curtain in the present embodiment
The method that method answers information with require information and result that visitor is obtained by photographic head is corresponding, if the acquisition of information
Method is the recognition methodss by image to word(It is referred to as in the industry OCR), then the interactive information being displayed on computer display screen curtain
It is exactly graph text information;If the acquisition methods of information are identified by Quick Response Code agreement, computer display screen is displayed in
Interactive information on curtain is with regard to 2 D code information.For example, when the require information of visitor is displayed in access computer in the form of Quick Response Code
When on screen 21, accessed computer 6 captures the Quick Response Code A for accessing computer screen 21 by being accessed photographic head 41(Require information),
Then answer message result to be equally displayed on accessed computer screen 51 in the form of Quick Response Code, then by accessing photographic head 31
Capture the Quick Response Code B on accessed computer screen 51(As a result answer message)Pass on the access computer screen 21 for accessing computer 1, make
Visitor obtains the result responded.
Embodiment two:
As shown in figure 3, in the present embodiment, communications transceiver adopts optoelectronic transceivers to the system of the present embodiment.Photoelectric sender I
22 used as communication transmitter I 2, and photoelectric sender II 52 is used as communication transmitter II 5;Photelectric receiver I 32 is received as communication
Device I 3, photelectric receiver II 42 is used as communication receiver II 4.The requirement of visitor is directly by the privately owned association run on access computer 1
View is media transmission to the opto-electronic receiver that be connected to accessed computer on 6 with light by connected photoelectric sender I 22 again
Device II 42, accessed computer 6 capture the visiting demand of visitor, Ran Hougen again by the photelectric receiver II 42 being connected thereto
Again result is sent to by the photoelectric sender II 52 being connected on accessed computer 6 according to specific requirement and accesses 1 phase of computer
On the photelectric receiver I 32 of connection, access computer 1 again by connected photelectric receiver I 32 from 6 phase of accessed computer
The result of response is obtained on the photoelectric sender II 52 of connection.
Optoelectronic transceivers or fiber optical transceiver or photoelectronic coupler or infrared transceiver in the present embodiment.
Embodiment three:
As shown in figure 4, in the present embodiment, communications transceiver adopts radio transceiver to the system of the present embodiment;Radio is sent out
, used as communication transmitter I 2, transmitting set II 53 is used as communication transmitter II 5 for emitter I 23;I 33 conduct of radio receiver
Communication receiver I 3, radio receiver II 43 is used as communication receiver II 4.The requirement of visitor is directly by fortune on access computer 1
Capable proprietary protocol is accessed electric to being connected to by media transmission of electromagnetic wave by connected transmitting set I 23 again
Radio receiver II 43 on brain 6, accessed computer 6 catch visiting by the radio receiver II 43 being connected thereto again
The visiting demand of visitor, then according to specific requirement again result by the transmitting set II that is connected on accessed computer 6
53 are sent to as media with electromagnetic wave and are accessed on the radio receiver I 33 that is connected of computer 1, access computer 1 again by with
The radio receiver I 33 of its connection obtains the knot of response from the transmitting set II 53 being connected with accessed computer 6
Really.
Radio transceiver or conventionally used radio set in the present embodiment or at present on the market wireless
Data transmission equipment or WIFI equipment or bluetooth equipment.
Example IV:
As shown in figure 5, in the present embodiment, communications transceiver is using the wire communication for needing Mechanical Contact for the system of the present embodiment
Transceiver;, used as communication transmitter I 2, wire communication transmitter II 54 is used as communication transmitter II 5 for wire communication transmitter I 24;
, used as communication receiver I 3, wire communication receptor II 44 is used as communication receiver II 4 for wire communication receptor I 34.Visitor's
Require directly directly to be transmitted by connected wire communication transmitter I 24 by the proprietary protocol run on access computer 1 again
To the wire communication receptor II 44 being connected on accessed computer 6, accessed computer 6 cable modem again by being connected thereto
News receptor II 44 captures the visiting demand of visitor, then according to specific requirement again result by being connected to accessed computer
Wire communication transmitter II 54 on 6 is sent directly to and accesses on the wire communication receptor I 34 that computer 1 is connected, and accesses
Computer 1 is again by connected wire communication receptor I 34 from the wire communication transmitter II being connected with accessed computer 6
The result of response is obtained on 54.
It is total that wire communication transceiver in the present embodiment includes but be not limited solely to wired network adapter, photoelectronic coupler, CAN
Line, RS-485 buses, RS-422 buses, RS-232 interface communication apparatus, IIC and SPI interface communication apparatus.
Embodiment five:
As shown in fig. 6, in the present embodiment, communications transceiver adopts the transmitting-receiving with mechanical wave as media to the system of the present embodiment
Device;, used as communication transmitter I 2, mechanical wave generator II 55 is used as communication transmitter II 5 for mechanical wave generator I 25;Mechanical wave connects
Device I 35 is received as communication receiver I 3, mechanical wave receiver II 45 is used as communication receiver II 4.The requirement of visitor is directly by visiting
Ask that the proprietary protocol run on computer 1 is transmitted directly to be connected to by connected mechanical wave generator I 25 again accessed
Mechanical wave receiver II 45 on computer 6, accessed computer 6 are captured by the mechanical wave receiver II 45 being connected thereto again
The visiting demand of visitor, then according to specific requirement again result by the mechanical wave generator that is connected on accessed computer 6
II 55 are sent directly to and access on the mechanical wave receiver I 35 that computer 1 is connected, and access computer 1 again by connected
Mechanical wave receiver I 35 obtains the result of response from the mechanical wave generator II 55 being connected with accessed computer 6.Such as Fig. 6
It is shown.
The transceiver with mechanical wave as media described in the present embodiment includes but is not limited solely to ultrasonic transmitter-receiver, people
The audible common sound wave transceiver of ear, the latter include microphone(MIC)And its acoustic receiver that amplifier is constituted(Also be commonly called as
Pick up)The sonic generator constituted with audio frequency power amplifier and loudspeaker.
Embodiment six:
As shown in fig. 7, in the present embodiment, infrared transmitter 26 is used as communication transmitter I 2, ultrasound for the system of the present embodiment
Wave producer 56 is used as communication transmitter II 5;Ultrasonic receiver 36 is used as communication receiver I 3,46 conduct of infrared light receiver
Communication receiver II 4.The requirement of visitor directly passes through connected infrared light again by the proprietary protocol run on access computer 1
Emitter 26 is transmitted directly to the infrared light receiver 46 being connected on accessed computer 6, and accessed computer 6 is again by being connected to
Infrared light receiver 46 thereon captures the visiting demand of visitor, then according to specific requirement again result by be connected to by
Access the supersonic generator 56 on computer 6 to be sent directly to and access on the ultrasonic receiver 36 that computer 1 is connected, access
Computer 1 is obtained from the supersonic generator 56 being connected with accessed computer 6 by connected ultrasonic receiver 36 again
Fetch the result answered.
In the present embodiment, we referred to as access transceiver the communications transceiver of transmission visiting demand(As communication is sent out
Send device I 2 and communication receiver I 3), the referred to as accessed transceiver of communications transceiver for answering visiting demand(As communication sends
Device II 5 and communication receiver II 4), described access transceiver and accessed transceiver be not necessarily by the use of identical media as
The transceiver of the similar media of carrier wave, as long as the communication transmitter I 2 is mutually paired with communication receiver II 4, communication transmitter
II 5 are mutually paired with communication receiver I 3.
Used as one kind conversion of the present embodiment, described access transceiver and accessed transceiver may each be but not only office
It is limited to embodiment one to any one transceiver being mutually paired described in embodiment five.The transmitting-receiving that can be used is enumerated now
Device, but it is not limited solely to any pair product of following pairing:1st, ultrasonic transmitter-receiver;2nd, the audible common sound wave of human ear is received
Send out device(Common are by microphone(MIC)And its acoustic receiver that amplifier is constituted(Also it is commonly called as pick up)And audio frequency power amplifier
And the sound transmitter that loudspeaker are constituted);3rd, optoelectronic transceivers;4th, fiber optical transceiver;5th, bluetooth equipment;6th, WIFI equipment;7th, have
Gauze card;8th, wireless network card;9th, twoway radio;10th, display screen and photographic head;11st, wire communication equipment:Such as wired network
Card, the communication of CAN interface communication apparatus, RS-485 bus interface equipments, RS-422 bus interface equipments, RS-232 interface set
Standby, IIC and SPI interface communication apparatus, other buses or parallel interface communication apparatus.
Using the technical scheme of the present embodiment, communications transceiver adopts two kinds of different types, internetwork physical isolation
More preferably, initial data is just less by the probability of visitor's malicious sabotage for effect.
Privately owned access protocal in the present invention can be regarded as:The agreement of initial data can be directly accessed, is also included:When the 3rd
When square application program provides access service for visitor using interface function, the function is removing the letter of the accessed data safety of harm
This privately owned access protocal is reused after breath and transmits remaining visiting demand information, so as to reach the visit for visitor being met to desired data
Ask requirement.
Above content is with reference to specific preferred implementation further description made for the present invention, it is impossible to assert
The present invention be embodied as be confined to the record of the various embodiments described above, for the ordinary skill people of the technical field of the invention
For member, without departing from the inventive concept of the premise, some simple deduction or replace can also be made, should be all considered as belonging to
The scope of patent protection that the present invention is determined by the claims submitted to.
Claims (10)
1. it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data real time access method, it is characterised in that:Should
Method is, using privately owned access protocal, and only to allow limited access instruction, by using existing communications transceiver on the market
The requirement of real time access is realized, prevents the presence of the finger that modification, addition, deletion, stickup, overlapping operation can be produced to initial data
Order, so as to prevent the method for penetrating of malicious code;The method mainly comprises the steps:
Step one:The requirement of visitor is directly by access computer(1)The proprietary protocol of upper operation by with access computer(1)Connection
Communication transmitter I(2)It is transmitted directly to be connected to accessed computer(6)On communication receiver II(4);
Step 2:Accessed computer(6)Pass through the communication receiver II being connected thereto again(4)The access for capturing visitor will
Ask, then according to specific requirement again result by being connected to accessed computer(6)On communication transmitter II(5)Directly transmit
To with access computer(1)The communication receiver I being connected(3)On;
Step 3:Access computer(1)Pass through connected communication receiver I again(3)From with accessed computer(6)It is connected
Communication transmitter II(5)It is upper to obtain the result responded.
2. it is according to claim 1 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side
Method, it is characterised in that:The communications transceiver is optoelectronic transceivers, or is radio transceiver, or is received and dispatched for wire communication
Device, or be one or two of transceiver with mechanical wave as media;The communication transmitter I(2)With communication receiver II(4)
It is mutually paired, communication transmitter II(5)With communication receiver I(3)It is mutually paired.
3. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side
Method, it is characterised in that:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared transceiver.
4. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side
Method, it is characterised in that:The radio transceiver includes radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment.
5. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side
Method, it is characterised in that:The wire communication transceiver include wired network adapter, photoelectronic coupler, CAN, RS-485 buses,
RS-422 buses, RS-232 interface communication apparatus, IIC and SPI interface communication apparatus.
6. it is according to claim 2 prevent between network exchange visits when visitor's malicious sabotage initial data real time access side
Method, it is characterised in that:The transceiver with mechanical wave as media includes the audible conventional acoustic of ultrasonic transmitter-receiver and human ear
Ripple transceiver.
7. it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, it is characterised in that:The system includes:
Access computer(1), communications transceiver, accessed computer(6);The communications transceiver includes communication transmitter I(2), communication connect
Receive device I(3), communication transmitter II(5)With communication receiver II(4);The communication transmitter I(2)With communication receiver I(3)
With access computer(1)Connection;The communication transmitter II(5)With communication receiver II(4)With accessed computer(6)Even
Connect;The communication transmitter I(2)With communication receiver II(4)It is mutually paired, communication transmitter II(5)With communication receiver I
(3)It is mutually paired;
The access computer(1)The man machine interface of visitor is available to, is conducted interviews by proprietary protocol for visitor, according to
Visitor's requirement, is given and meets computer data, the command information collection of message reference for requiring, the computer data, information are visited
The command information collection asked is referred to as require information;
The communication transmitter I(2)For sending visitor's requirement information;
The communication receiver II(4)For receiving visitor's requirement information, and pass to accessed computer(6);
The accessed computer(6)It is the storage device for storing initial data, for providing initial data access service for visitor,
Visitor's requirement is answered, and provides echo message;
The communication transmitter II(5)For sending the echo message that visitor claims;
The communication receiver I(3)For receiving the echo message that visitor claims, and pass to access computer(1), make visitor
Obtain the result responded.
8. it is according to claim 7 it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, its
It is characterised by:The communication transmitter I(2)To access computer screen, communication receiver II(4)It is to be accessed photographic head, described logical
News transmitter II(5)To be accessed computer screen, communication receiver I(3)To access photographic head.
9. it is according to claim 7 it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, its
It is characterised by:The communications transceiver is optoelectronic transceivers, or is radio transceiver, or is wire communication transceiver, or
Be transceiver with mechanical wave as media one or two.
10. it is according to claim 9 it is a kind of prevent between network exchange visits when visitor's malicious sabotage initial data system, its
It is characterised by:The optoelectronic transceivers include fiber optical transceiver, photoelectronic coupler and infrared transceiver;The radio transceiver
Including radio set, wireless data transmission equipment, WIFI equipment and bluetooth equipment;The wire communication transceiver include wired network adapter,
The communication of photoelectronic coupler, CAN, RS-485 buses, RS-422 buses, RS-232 interface communication apparatus, IIC and SPI interface
Equipment;The transceiver with mechanical wave as media includes the audible common sound wave transceiver of ultrasonic transmitter-receiver and human ear.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710091842.6A CN106599708A (en) | 2017-02-21 | 2017-02-21 | Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710091842.6A CN106599708A (en) | 2017-02-21 | 2017-02-21 | Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106599708A true CN106599708A (en) | 2017-04-26 |
Family
ID=58587641
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710091842.6A Pending CN106599708A (en) | 2017-02-21 | 2017-02-21 | Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106599708A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1444742A (en) * | 2000-05-28 | 2003-09-24 | 梅耶·亚隆 | General comprehensive computer safety protection system and method aiming at information stealing and destructive behaviors of bad programs |
CN101800757A (en) * | 2010-02-03 | 2010-08-11 | 国家保密科学技术研究所 | No-feedback one-way data transmission method based on single fiber structure |
CN102970317A (en) * | 2012-03-27 | 2013-03-13 | 广州市国迈科技有限公司 | Safety design scheme of private cloud storage system |
CN104798355A (en) * | 2012-09-18 | 2015-07-22 | 思杰系统有限公司 | Mobile device management and security |
CN105282107A (en) * | 2014-07-04 | 2016-01-27 | 北京信威通信技术股份有限公司 | Authorization method of visiting external data by XMPP system and communication network |
CN105373745A (en) * | 2015-11-12 | 2016-03-02 | 深圳市华德安科技有限公司 | Data access control method and device for site enforcement recorder and site enforcement recorder |
CN106230870A (en) * | 2016-10-13 | 2016-12-14 | 成都东方盛行电子有限责任公司 | Proprietary protocol document transmission system and method |
-
2017
- 2017-02-21 CN CN201710091842.6A patent/CN106599708A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1444742A (en) * | 2000-05-28 | 2003-09-24 | 梅耶·亚隆 | General comprehensive computer safety protection system and method aiming at information stealing and destructive behaviors of bad programs |
CN101800757A (en) * | 2010-02-03 | 2010-08-11 | 国家保密科学技术研究所 | No-feedback one-way data transmission method based on single fiber structure |
CN102970317A (en) * | 2012-03-27 | 2013-03-13 | 广州市国迈科技有限公司 | Safety design scheme of private cloud storage system |
CN104798355A (en) * | 2012-09-18 | 2015-07-22 | 思杰系统有限公司 | Mobile device management and security |
CN105282107A (en) * | 2014-07-04 | 2016-01-27 | 北京信威通信技术股份有限公司 | Authorization method of visiting external data by XMPP system and communication network |
CN105373745A (en) * | 2015-11-12 | 2016-03-02 | 深圳市华德安科技有限公司 | Data access control method and device for site enforcement recorder and site enforcement recorder |
CN106230870A (en) * | 2016-10-13 | 2016-12-14 | 成都东方盛行电子有限责任公司 | Proprietary protocol document transmission system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6864779B2 (en) | Method and apparatus for transmitting data from a remote location to a desired device | |
CN101315706A (en) | Attendance checking method, attendance sending terminal, attendance server and mobile terminal | |
CN105429905A (en) | Method, device and system for monitoring advertisement putting terminal | |
DE60221113D1 (en) | PROCESS AND SYSTEM FOR THE REMOTE AND MANAGEMENT OF PERSONNEL SECURITY DEVICES | |
CN104796322B (en) | A kind of message treatment method and its equipment | |
CN104811652A (en) | Conference system based on electronic white board | |
CN107222711A (en) | Monitoring system, method and the client of warehoused cargo | |
CN106781763A (en) | A kind of university's applied mathematics Teaching System | |
CN206515825U (en) | A kind of system of visitor's malicious sabotage initial data when preventing exchanging visit between network | |
CN106599708A (en) | Real-time access method for preventing visitors from maliciously destroying original data when exchange-accessing between networks and system thereof | |
JP2011145802A (en) | Message mediation apparatus and control method therefor | |
CN106919530A (en) | A kind of one-way transmission component based on visible ray | |
CN206584350U (en) | A kind of one-way transmission component based on visible ray | |
JP2005354233A5 (en) | ||
CN109639443A (en) | A kind of intelligence microphone conference system | |
CN205644664U (en) | Fingerprint attendance checking system | |
CN105511988B (en) | Encrypted data management method and device and electronic equipment | |
CN109767528A (en) | Information determining method and device | |
CN107404627A (en) | A kind of computer based conference system | |
CN109151408B (en) | Full-duplex window intercom device, system and intercom method thereof | |
CN111224987B (en) | Short-wave multimedia communication method | |
CN103295358A (en) | Warning method for access control system and embedded mainboard for implementing warning method | |
CN106507038A (en) | full duplex window talkback system | |
CN107346563A (en) | A kind of attendance system and method based on face recognition | |
CN107885809A (en) | File transmission method and device, intelligent tablet and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |