Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of data transmission in enterprise network

An internal data and enterprise network technology, applied in the direction of digital transmission system, data exchange network, transmission system, etc., can solve problems such as interruption, inability to know data flow status, inability to verify user availability, etc., to achieve the effect of ensuring security

Active Publication Date: 2018-05-18
CHINA HELICOPTER RES & DEV INST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the process of transmitting network data, the enterprise network generally has encryption and decryption processes and network conversion processes at the bottom of the network. In this network environment, the data transmission rate is unstable and often interrupted, and the internal data of the enterprise network usually needs to be limited The range of awareness must ensure its security, so the above two problems must be solved when transferring data within the enterprise network
[0003] There are many existing data transfer methods, such as FTP, mail system, shared directory, website resources, website programs, etc. For the needs of data transfer within the enterprise network, the traditional data transfer methods usually have the following problems: a) The data connection lacks security, and the method of directly placing resources on the website or file server cannot prevent illegal users from downloading, receiving and using; b) It is impossible to verify the availability of users, as long as users get the address, they can download data. The security of the data of the object cannot be guaranteed; c) The viewing and usage rights management of data files is complicated. Using FTP or shared directory methods, the permission setting operation is very time-consuming, and it is not suitable for a large number of this type of operations on the server
f) The transmission tool developed directly based on the TCP connection can ensure data security after reasonable control, but it is difficult to deploy in the scenario where multiple factories work together
g) Using the SSL mode to transmit large data is very inefficient, and the bottom layer of the enterprise network is usually equipped with hardware encryption devices, making SSL unnecessary.
h) Common data transfer methods usually do not have enough detailed audit records to know the status of data transfer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of data transmission in enterprise network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0024] Implementation method: Build a data exchange system through the Web service model, use the desktop application framework to build a large data file receiving tool, receive the user to use the page to obtain the data file list, and receive the small data file defined by the threshold value, use the large data file to receive tool to obtain the content of the large data file defined by the threshold, the data transfer process is divided into the following steps:

[0025] The first step is to build an interactive interface in the data exchange system, which is used to import the source list of data files and set the receiving users of these data files. The business system sets the receiving users of the data files to be delivered through this interface.

[0026] In the second step, the receiving user enters the data exchange system on the server through account and password login verification.

[0027] In the third step, the data exchange system returns the data files that...

Embodiment 1

[0036] Taking the engineering data distribution system between a research institute and multiple manufacturing plants as an example, a research institute needs to transmit design data to multiple manufacturing plants through the enterprise network, so the research institute deploys an engineering data distribution system responsible for design data file distribution Distribution system, and use the ASP.NET application program framework to build the data exchange system responsible for data transfer according to the method in the present invention, and develop the big data file download tool that can meet the eighth step of the implementation plan in the present invention, and provide it to the manufacturing plant Use, now take this scenario as an example to illustrate the implementation process of this method:

[0037] In the first step, in the engineering data distribution system, the designers of the design department submit the design data, and according to the project requi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network data transmission, in particular to a data transmission method. The invention isolates the data file source from the data exchange system, ensuring that the data source is not accessed by anyone other than the system administrator. The present invention uses a one-time download token to download data to ensure that when the user does not have the right to use the data file, even if he knows the identifier of the data file, he cannot obtain the data file through technical means. The present invention obtains the second token when logging in, and binds it to terminal information, then the bound terminal can use the download token and the second token in the non-login state to obtain the complete data file content in the resume mode , and the second token is updated after each request, and the download token is abolished after the entire data file is acquired, so that the one-time data path is realized, thereby ensuring the security of data transmission.

Description

technical field [0001] The invention relates to the technical field of network data transmission, in particular to a data transmission method. Background technique [0002] In the process of transmitting network data, the enterprise network generally has encryption and decryption processes and network conversion processes at the bottom of the network. In this network environment, the data transmission rate is unstable and often interrupted, and the internal data of the enterprise network usually needs to be limited Knowing the scope must ensure its security, so the above two problems must be solved to transmit data within the enterprise network. [0003] There are many existing data transfer methods, common methods include FTP, mail system, shared directory, website resources, website programs, etc. For the needs of data transfer within the enterprise network, the traditional data transfer methods usually have the following problems: a) The data connection lacks security, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L12/58H04L9/00H04L29/06
Inventor 董岩江卓逞胡敏
Owner CHINA HELICOPTER RES & DEV INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products