Yleiskatsaus
Informationexchangereferstotheprocessofdatainteractionbetweendifferentinformationentities.Itsgoalistorealizedatasharinginaheterogeneousenvironment,therebyeffectivelyusingresources.Improvetheperformanceoftheentireinformationsystem,speedupdatacirculationbetweeninformationsystems,andrealizedataintegrationandsharing.Itisatheoreticalbasisforunderstandinganddevelopinginformationexchangebetweenheterogeneousdatasources,anditisalsoapowerfultoolforsolvinginformationislands.Inadistributednetworkenvironment,informationexchangeispresentedtoheterogeneoussystemsinaunifiedexchangestandardfordataindifferentlocations,platformsandformatsfordataexchangeandsystemintegration.
Tiedonvaihtotoiminto
Themainstreaminformationexchangesystemismainlycomposedofinformationexchangecenterandbusinesssideinformationexchangecomponents,anditsfunctionsareroughlyasfollows:
Informationexchangecenter:Theinformationexchangecenterreceivesthemessagesentfromtheclientandforwardsitthroughitsinformationexchangecenterserverorextractsthedatathatneedstobesentfromthebusiness-sideapplicationdatabase,andsavesittotheshareddatabase.Amongthem,theshareddatabaseisthecoreoftheinformationplatformoftheinformationsharingandexchangesystem.Itstorestheinformationreleasedbyeachunitandthedataexchangedfromotherunits.Theestablishmentoftheshareddatabasealsohasthefunctionofprotectingtheindependenceandsecurityofeachclientapplicationsystem.
Businesssideinformationexchangecomponents:Ifacustomerneedstoconnecthisbusinessapplicationsystemtoaunifiedinformationsharingandexchangesystem,heonlyneedstoinstalltheapplicationbusinesssidecomponentsoftheunifiedinformationexchangesystem.Withouttheneedtomodifyitsbusinessapplicationsystem,itcanrealizeinformationexchangewiththeunifiedinformationsharingandexchangecenter.Themainfunctionoftheplug-inisthemutualconversionbetweenthedataintherespectivebusinesssystemsandtheunifiedstandarddata,interactwiththeinformationexchangecenterserver,andsendandreceivedata.
kiinalainen merkkikoodaus
Inviewoftheimportanceofinformationexchangeandthecodingstandardofunifiedtextsymbols,computersofdifferentbrandsandmodelscanusethesamesetofstandardizedinformationexchangecodes,soTheAmericanNationalBureauofStandardshasspeciallyformulatedtheASCIIcode(AmericaStandardCodeforInformationInterchange)asthestandardcodefordatatransmission.Intheearlydays,7bitswereusedtorepresentEnglishletters,numbers0-9andothersymbols,while8bitswereusedtorepresentatotalof256differentcharactersandsymbols.ThisisthemostcommonandwidelyusedEnglishstandardcodeinvariouscomputersystems.ComparedwithASCIIcode,themostwidelyusedinternalcodeinChinesesystemisBig-5code.
ASCIIcodeisthemostwidelyusedstandardcodeusedbymosttypesofcomputers.Inaddition,theuniversalcode(UNICODE)developedbyseveralwell-knownsoftwareandhardwaremanufacturersisanewstandardfordatarepresentation.UNICODEuses2or4bytestorepresenteachsymbol,whichcanrepresent65536or16.77millioncharactersintotal.,InadditiontoEnglish,itcanalsocontainthelargestnumberofChinese,Japanese,andtextsymbolsfromallovertheworld,makingtheexchangeofinformationevenmoreborderless.
Tietojen vaihdon turvallisuusvaatimukset
Sincetheinformationexchangesystemismainlyalargenetworksystemplatformforinformationintegration,informationexchangeandsharingbetweenenterprisesinvariousindustries,itmayalsobealargenetworksystem.Alargecollectionofinsecurityfactors,especiallythecurrentnetworksecuritythreatsarebecomingmoreandmoreserious.Inthecurrentnetworksecurityenvironment,andbecausetheinformationexchangedintheinformationexchangesystemismainlyinternalinformationwithintheindustryorbetweenenterprisesanddepartments,thisinformationmaybesensitive,important,orevenItmaybeatradesecretrelatedtovitalinterests.Therefore,wedonotwanttheoutsideoritscompetitorstoknow,butitmustbeabletoensurethatnormalandlegitimateuserswithintheindustry,withintheenterpriseallianceandwithintheenterprisecanlearnaboutsharing,communicating,sending,andreceivinginformationinatimelymanner.Inadditiontoguaranteeingnormalbusinessfunctions,theinformationexchangesystemalsohastodointermsofsecurity:(1)Identityauthentication:onlythoseauthorizedandlegitimateusershavetherighttoaccesssystemresources,andTheuniquenessoftheuser'sidentitycanpreventdenialintheinformationexchangeprocess,andatthesametimedenyusersoutsidethesystemandpreventillegalusersfrompretendingtobelegitimateusersbyillegalmeanstodeceivethesystemtoachievesomegoals.Therefore,onlyafterthelegitimacyoftheuser'sidentityisconfirmedcaninformationexchangebecarriedout.Itcanbesaidthatidentityauthenticationisthesecurityfoundationoftheinformationexchangesystem.
(2)Permissioncontrol:Whenusersusethesystem,theirpermissionsmustbedeterminedandcontrolled.Accordingtodifferentlevelsofpermissions,usershavedifferentaccessandusesystemresourcesandservicestopreventusersfromaccidentallyorDeliberatelyoccupyandusesystemresourcesbeyondauthoritytoprotecttherightsofusersandthesecurityofinformation.Themainfunctionaldivisionsaretherighttosendinformation,therighttoreceiveinformation,andtherighttosourceandsinkinformation:
Sendinformationright.Ithasthefunctionsofacquiringlocaldataandsendinginformation.Usersofdifferentlevelsalsohavethefunctionsofdataencryption,datasignatureordigitalsignaturewhensendinginformation.Differentfunctions,suchasthequantity,type,numberoftargets,andthegranularityofencryptionEtc.;
Recipientauthority.Ithasthefunctionofreceivinginformation.Similarly,whenreceivingdata,theauthorityisdifferent,andthenumberandtypeofinformationthatthereceivingusercanreceivearealsodifferent;
Theauthorityofthesourceandsinkoftheinformation.Thedestination(receiver)oftheinformationsentandwhetheritcanaccepttheinformationfromthesource(sender)istoresolvethe"who"and"who"senttoreceive,controltheflowofinformation,andpreventthebroadcastanddisclosureofinformation.
Therefore,ensuringthesecurityofpermissionscanalsobesaidtoprotecttherightsofusers.
(3)Informationsecurity:ThetwoprocesseswheretheinformationissenttotheinformationexchangecenterandtheinformationexchangecenterisforwardedtothereceivingendarebothcarriedoutinthenetworktoensurethattheinformationinthesetwoprocessesisnotInformationsecurityissuessuchasstealing,tampering,counterfeiting,anddenialinsendingandreceivingaremainlyachievedthroughencryptionandsignatures.
(4)Secureinformationexchangecenter:becauseinformationismainlypassedthroughthiscenterAlargeamountofdataisstoredintheshareddatabasewhilebeingforwardedandaccessed.Therefore,thesecurityoftheinformationexchangecenteristhesecurityofthecenteroftheinformationexchangesystem.
(5)Securitymanagementofthekey:Thesecurityofthekeyisdirectlyrelatedtotheinformationsecurityintheexchange.
(6)Secureinformationtransmissionchannel:Althoughinformationtransmissioniscarriedoutinanopennetwork,networksecuritytechnologycanstillbeusedtostrengthentheSSLprotocol.
(7)Securitymanagement:Standardizedsecuritymanagementandraisingawarenessofnetworksecuritycanreducetheoccurrenceofsomesecurityincidents.Accordingtothe2008NationalInformationNetworkSecuritySituationandComputerVirusEpidemicInvestigationReportoftheMinistryofPublicSecurity,amongmorethan12,000informationnetworkusersandcomputerusers,theproportionofinformationnetworksecurityincidentsis62.7%;theproportionofmultiplenetworksecurityincidentsatthesametimeis50%,theproportionofmultipleinfectionsis66.8%;thecomputervirusinfectionrateis85.5%,indicatingthattheInternetusersinmycountryarestillrelativelyweakinnetworksecurityawarenessandnotpayingenoughattentiontotheoccurrenceofnetworksecurityincidents.Amongthem,theproportionofattacksorvirustransmissionfrominternalpersonnelincreasedby21%year-on-year,indicatingthattheinternalnetworksecuritymanagementoftheunitisnotyetinplace.