We have modified the communication protocol used by the program, so that the program can meet the needs of the shelf.
Our App is an encrypted client program, which is used to establish a data transmission tunnel with a dedicated the server. The server must be encrypted by the algorithm and verified by the special device. The program can not connect with the ordinary server.
We modified the structure of the communication signal sent by the protocol, adding 36 bytes of space before the data packet to fill the calculation result of a specific algorithm. When the application program is started, the communication signal sent by the application program passes through the network switch, and first reaches the isolation device connected to the server. The isolation device contains the same specific algorithm as the application program, which is used to verify the 36-byte calculation result added in the data packet header. After the verification, the communication signal will be sent to the server.
After the application successfully communicates with the server to establish a data transmission tunnel, the user can use the data tunnel to transfer data between the server and the application program.The data sent by the application is encrypted by another encryption algorithm (different from the algorithm of the isolated device), and the server uses the corresponding decryption algorithm to decrypt the communication information. Only after the decryption verification is passed can the data sent by the application be obtained.
If the server does not add encryption algorithm or isolation device, the application cannot connect to the server.
When using the application program to connect to the specified the server, it is necessary to ensure that the client and server can establish network communication segments in the same network.If you have already added the IP address of the server, you can establish a connection. If not, please add the IP address in the third interface, and return to the initial interface to establish a connection
Please refer to "Instructions for encrypting SMTLS client" for specific operation steps, or refer to the video link description in the remarks.