A method and system for data access between networks based on security isolation

A data access and security isolation technology, applied in the fields of information security and network data exchange, can solve the problems of high operation complexity and high operation cost, and achieve the effect of safe information sharing, simple operation, and resource saving

Active Publication Date: 2021-08-27
贵州华云创谷科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method for accessing data between networks based on security isolation, so as to solve the problems of high operating cost and high operating complexity of information sharing between multiple networks with different security levels in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for data access between networks based on security isolation
  • A method and system for data access between networks based on security isolation
  • A method and system for data access between networks based on security isolation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] Such as figure 1 As shown, it is a flow chart of a method for inter-network data access based on security isolation in an embodiment of the present invention. The method is applied to a first network and a second network with different security levels, including:

[0023] S101, generating virtual desktop information of the second network;

[0024] S102. Send the virtual desktop information to the first network through the first channel, and display it ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a method and system for inter-network data access based on security isolation. The method is applied to the first network and the second network with different security levels, including: generating virtual desktop information of the second network; The virtual desktop information is sent to the first network through the first channel, and displayed to the user in the form of a virtual desktop; the file transfer command input by the user through the virtual desktop is obtained, and the file transfer command is sent to the second network through the first channel network; the file transfer instruction includes an instruction to download a second network file; according to the instruction to download a second network file, the file downloaded by the second network according to the download instruction is sent to the first network through a second channel. The embodiment of the present invention provides a reliable channel for instruction and data transmission among multiple networks, realizes safe virtual desktop access and file resource exchange, and provides users with a convenient and safe information sharing method.

Description

technical field [0001] The invention belongs to the fields of information security and network data exchange, and in particular relates to a method and system for inter-network data access based on security isolation. Background technique [0002] Party, government and military organizations at all levels in the country are often faced with the situation of using two or even multiple sets of networks. For example, the government affairs system of the party and government departments has a dedicated government network, a government network, command network, etc., and according to security and confidentiality requirements, these networks usually need to be physically or logically isolated, causing users to frequently switch to use multiple sets of networks, which is not conducive to information sharing and network management, seriously affects work efficiency, and is likely to cause security problems. Hidden dangers and unnecessary waste of resources. Therefore, from the pers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0209H04L63/145H04L67/06H04L67/10H04L67/1095H04L67/1097
Inventor 鲍翊平
Owner 贵州华云创谷科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products