[go: up one dir, main page]

CN110351256A - Data back method and system - Google Patents

Data back method and system Download PDF

Info

Publication number
CN110351256A
CN110351256A CN201910560909.5A CN201910560909A CN110351256A CN 110351256 A CN110351256 A CN 110351256A CN 201910560909 A CN201910560909 A CN 201910560909A CN 110351256 A CN110351256 A CN 110351256A
Authority
CN
China
Prior art keywords
data
code
image
target data
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910560909.5A
Other languages
Chinese (zh)
Inventor
李华
夏全军
雍正
杨乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Energy Polytron Technologies Inc
Original Assignee
New Energy Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New Energy Polytron Technologies Inc filed Critical New Energy Polytron Technologies Inc
Priority to CN201910560909.5A priority Critical patent/CN110351256A/en
Publication of CN110351256A publication Critical patent/CN110351256A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present invention provides a kind of data back method and system, belongs to technical field of data transmission.Include: in separation net system target data is encoded, generate several image in 2 D code;Mobile terminal obtains target data based on the scanning result to every image in 2 D code, and target data is back to server.Data back method and system provided in an embodiment of the present invention, for no network or without the system of network, target data is obtained from the system since mobile terminal can be realized by two dimensional code, to solve, need could be by the data in separation net using external storage, the inconvenient problem of bring by way of passback again, while also avoiding the safety problem caused by the external storage because of link virus infection in separation net.

Description

Data back method and system
Technical field
The present invention relates to technical field of data transmission more particularly to a kind of data back method and system.
Background technique
At present in no network or isolation network, data back can not will be carried out by internet.In the related art, Data copy is gone out often through external storage, then is dealt into the server on internet by forms such as mails.Due to logical When crossing external storage progress data copy passback, requires manually to be attached external storage every time, copy, break It opens, reconnect Internet PC, copy, finally send, thus complex steps and inefficiency.In addition, using external storage There is also very big security risks will affect the equipment in separation net, cause huge after external storage infected virus Economic loss.
Summary of the invention
To solve the above-mentioned problems, the embodiment of the present invention provides one kind and overcomes the above problem or at least be partially solved State the data back method and system of problem.
According to a first aspect of the embodiments of the present invention, a kind of data back method is provided, comprising:
System encodes target data in separation net, generates several image in 2 D code;
Mobile terminal obtains target data based on the scanning result to every image in 2 D code, and target data is returned To server.
According to a second aspect of the embodiments of the present invention, provide a kind of data back system, comprising: in separation net system and Mobile terminal;System in separation net generates several image in 2 D code for encoding to target data;Mobile terminal is used In based on the scanning result to every image in 2 D code, target data is obtained, and target data is back to server.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising:
At least one processor;And
At least one processor being connect with processor communication, in which:
Memory is stored with the program instruction that can be executed by processor, and the instruction of processor caller is able to carry out first party Data back method provided by any possible implementation in the various possible implementations in face.
According to the fourth aspect of the invention, a kind of non-transient computer readable storage medium, non-transient computer are provided Readable storage medium storing program for executing stores computer instruction, and computer instruction makes the various possible implementations of computer execution first aspect In data back method provided by any possible implementation.
Data back method and system provided in an embodiment of the present invention, for no network or without the system of network, due to Mobile terminal can be realized by two dimensional code obtains target data from the system, needs to set using external storage to solve It is standby could be by the data in separation net, then the inconvenient problem of bring by way of passback, while also avoiding because of chain The external storage for connecing virus infection causes safety problem in separation net.
It should be understood that above general description and following detailed description be it is exemplary and explanatory, can not Limit the embodiment of the present invention.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of data back method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of data back system provided in an embodiment of the present invention;
Fig. 3 is the block diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Two dimensional code is with certain specific geometric figure according to certain rules in the black and white phase of plane (on two-dimensional directional) distribution Between graphic recording data symbol information, in code compilation dexterously using constitute computer-internal logical foundations " 0 ", The concept of " 1 " bit stream indicates text numerical information using several geometrical bodies corresponding with binary system, passes through image Input equipment or photoelectric scanning device automatically identifying and reading are to realize automatic processing of information.Two dimensional code has some total of barcode technology Property, such as every kind of code system have its specific character set, each character occupy certain width and have certain verifying function.Together When also have to the information automatic identification function do not gone together and the processing rotationally-varying point of figure.
For the problems in the relevant technologies and the above-mentioned explanation about two dimensional code, the embodiment of the invention provides a kind of data Retransmission method.This method can be applied to the scene of no network or isolation network, and the embodiment of the present invention does not limit this specifically It is fixed.Referring to Fig. 1, this method comprises: system encodes target data in 101, separation net, several two dimensional code figures are generated Picture;102, mobile terminal obtains target data based on the scanning result to every image in 2 D code, and target data is back to Server.
Method provided in an embodiment of the present invention, for no network or without the system of network, since mobile terminal can lead to It crosses two dimensional code realization and obtains target data from the system, need could be by separation net using external storage to solve Interior data, then the inconvenient problem of bring by way of passback, while also avoiding outside because of link virus infection It sets storage equipment and causes safety problem in separation net.
Content based on the above embodiment, as a kind of alternative embodiment, the embodiment of the present invention is not to system in separation net Target data is encoded, the mode for generating several image in 2 D code specifically limits, including but not limited to: in separation net Target data is converted into JSON character string by system, is compressed by default compression algorithm to JSON character string, by default Encryption Algorithm encrypts compressed data, encrypted data is split into several groups data, and every group of data are turned Change image in 2 D code into.Wherein, gzip algorithm can be used in compression algorithm, and the present invention is not especially limit this.
Method provided in an embodiment of the present invention, it is less so as to use due to can data be compressed and be encrypted Two dimensional code reaches passback purpose, and can guarantee the safety of return data.
Content based on the above embodiment, as a kind of alternative embodiment, the embodiment of the present invention does not turn to by every group of data The mode for changing image in 2 D code into specifically limits, including but not limited to: system is added in advance before every group of data in separation net If the checking mark of length, by every group of data conversion after addition checking mark at image in 2 D code.Wherein, preset length can be with Fixed, its length of the checking mark of addition can be identical before every group of data, and the embodiment of the present invention is not made this specifically It limits.
Method provided in an embodiment of the present invention, due to being added to check logic, thereby may be ensured that data integrality and Validity.
Content based on the above embodiment, as a kind of alternative embodiment, checking mark include total number packets, timestamp and The grouping label of every group of data.Wherein, grouping label can embody the order of packets of every group of data.By total number packets and divide Group sequence, it can be determined that whether the data that every group of data are constituted are complete with target data.It can be guaranteed by timestamp The validity of every group of data.
Content based on the above embodiment, as a kind of alternative embodiment, predetermined encryption algorithm is caesar cipher algorithm.Tool Body, can be used caesar cipher algorithm and is encrypted, and carries out data and reduce by half reversing of position, to achieve the purpose that encryption and not Data length can be changed.
Content based on the above embodiment, as a kind of alternative embodiment, the embodiment of the present invention is not based on mobile terminal To the scanning result of every image in 2 D code, the mode for obtaining target data is specifically limited, including but not limited to: mobile terminal According to the checking mark in the scanning result of every image in 2 D code, every group in the scanning result of every image in 2 D code is judged Whether data meet preset condition;If every group of data in the scanning result of every image in 2 D code meet preset condition, move Dynamic terminal is spliced, decrypted and is decompressed to every group of data in the scanning result of every image in 2 D code, and number of targets is obtained According to.
It should be noted that can be spliced in order according to grouping label, this hair when splicing to every group of data Bright embodiment is to this insufficient specific restriction.It should also be noted that, above-mentioned can be mobile whole to the process of every group of data splicing End side executes, and the process decrypted and decompressed can be executed in mobile terminal side, after can also being spliced by mobile terminal The data back arrived executes the process of decryption and decompression to server, and in server side, and the embodiment of the present invention does not make this It is specific to limit.
Content based on the above embodiment, as a kind of alternative embodiment, preset condition is sweeping for every image in 2 D code Retouch that every group of data in result are complete and the corresponding several groups data of all scanning results are complete.
Specifically, one image in 2 D code of the every scanning of mobile terminal, available scanning result, the scanning result In include the checking mark before one group of data and this group of data.It, can according to the grouping label and total number packets in checking mark It is whether complete with the corresponding several groups data of all scanning results of determination.According to the timestamp of checking mark, it can be determined that every group Whether data are effective.In addition, being isolated if every group of data in the scanning result of every image in 2 D code are unsatisfactory for preset condition System recompiles target data in netting, and regenerates several image in 2 D code, and mobile terminal can also be again Image is scanned the two-dimensional code, namely re-executes process above.
Content based on the above embodiment, the embodiment of the invention provides a kind of data back system, the data back systems System is for executing the data back method provided in above method embodiment.Referring to fig. 2, which includes: system in separation net 201 and mobile terminal 202;System 201 in separation net generate several image in 2 D code for encoding to target data; Mobile terminal 202, for obtaining target data based on the scanning result to every image in 2 D code,
System provided in an embodiment of the present invention, by for no network or without the system of network, since mobile terminal can To obtain target data from the system by two dimensional code realization, to solve, need could will be every using external storage Data in off-network, then the inconvenient problem of bring by way of passback, while also avoiding because linking virus infection External storage cause the safety problem in separation net.
Fig. 3 illustrates the entity structure schematic diagram of a kind of electronic equipment, as shown in figure 3, the electronic equipment may include: place Manage device (processor) 310, communication interface (Communications Interface) 320,330 He of memory (memory) Communication bus 340, wherein processor 310, communication interface 320, memory 330 complete mutual lead to by communication bus 340 Letter.Processor 310 can call the logical order in memory 330, and to execute following method: system is to number of targets in separation net According to being encoded, several image in 2 D code are generated;Mobile terminal obtains mesh based on the scanning result to every image in 2 D code Data are marked, and target data is back to server.
In addition, the logical order in above-mentioned memory 330 can be realized by way of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention The form of software product embodies, which is stored in a storage medium, including some instructions to So that a computer equipment (can be personal computer, electronic equipment or the network equipment etc.) executes each reality of the present invention Apply all or part of the steps of a method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random AccessMemory), magnetic or disk etc. it is various It can store the medium of program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program, The computer program is implemented to carry out the various embodiments described above offer method when being executed by processor, for example, in separation net System encodes target data, generates several image in 2 D code;Mobile terminal is based on sweeping every image in 2 D code It retouches as a result, obtaining target data, and target data is back to server.
System embodiment described above is only schematical, wherein unit can be as illustrated by the separation member Or may not be and be physically separated, component shown as a unit may or may not be physical unit, i.e., It can be located in one place, or may be distributed over multiple network units.It can select according to the actual needs therein Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor In the case where dynamic, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of data back method characterized by comprising
System encodes target data in separation net, generates several image in 2 D code;
Mobile terminal obtains the target data based on the scanning result to every image in 2 D code, and by the target data It is back to server.
2. data back method according to claim 1, which is characterized in that in the separation net system to target data into Row coding, generates several image in 2 D code, comprising:
Target data is converted into JSON character string by system in separation net, by default compression algorithm to the JSON character string into Row compression, encrypts compressed data by predetermined encryption algorithm, encrypted data is split into several groups data, And by every group of data conversion at image in 2 D code.
3. data back method according to claim 2, which is characterized in that it is described by every group of data conversion at two dimensional code figure Picture, comprising:
System adds the checking mark of preset length before every group of data in separation net, by every group of number after addition checking mark According to being converted into image in 2 D code.
4. data back method according to claim 3, which is characterized in that the checking mark include total number packets, when Between stab and every group of data grouping label.
5. data back method according to any one of claim 2 to 4, which is characterized in that the predetermined encryption algorithm For caesar cipher algorithm.
6. data back method according to claim 4, which is characterized in that the mobile terminal is based on to every two dimensional code The scanning result of image obtains the target data, comprising:
The mobile terminal judges every image in 2 D code according to the checking mark in the scanning result of every image in 2 D code Whether every group of data in scanning result meet preset condition;
If every group of data in the scanning result of every image in 2 D code meet preset condition, the mobile terminal is to every two The every group of data tieed up in the scanning result of code image are spliced, decrypted and are decompressed, and the target data is obtained.
7. data back method according to claim 6, which is characterized in that the preset condition is every image in 2 D code Scanning result in every group of data it is complete and the corresponding several groups data of all scanning results are complete.
8. a kind of data back system characterized by comprising system and mobile terminal in separation net;System in the separation net System, for encoding to target data, generates several image in 2 D code;The mobile terminal, for based on to every two The scanning result for tieing up code image, obtains the target data, and the target data is back to server.
9. a kind of electronic equipment characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in claim 1 to 7 is any.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 7 is any.
CN201910560909.5A 2019-06-26 2019-06-26 Data back method and system Pending CN110351256A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910560909.5A CN110351256A (en) 2019-06-26 2019-06-26 Data back method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910560909.5A CN110351256A (en) 2019-06-26 2019-06-26 Data back method and system

Publications (1)

Publication Number Publication Date
CN110351256A true CN110351256A (en) 2019-10-18

Family

ID=68183185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910560909.5A Pending CN110351256A (en) 2019-06-26 2019-06-26 Data back method and system

Country Status (1)

Country Link
CN (1) CN110351256A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995391A (en) * 2019-11-18 2020-04-10 国能日新科技股份有限公司 Data transmission method in isolated network, server and terminal
CN111740955A (en) * 2020-05-18 2020-10-02 上海市公安局出入境管理局 Certificate making control method, system, server and computer readable storage medium
CN112416642A (en) * 2020-11-25 2021-02-26 国能日新科技股份有限公司 Remote operation and maintenance method and device
CN114565066A (en) * 2021-12-24 2022-05-31 国能日新科技股份有限公司 Isolation network data acquisition method and device based on electric power market trading system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255914A (en) * 2011-07-19 2011-11-23 河南大学 Android network application program information verification method
CN105049425A (en) * 2015-06-28 2015-11-11 南威软件股份有限公司 Physical isolation transmission method based on two-dimension code
CN105208751A (en) * 2015-10-30 2015-12-30 南京汉森思物联网科技有限公司 Configuration management generation tool software system based on WEB configuration
CN107800758A (en) * 2017-03-28 2018-03-13 平安壹钱包电子商务有限公司 Air control data processing method, apparatus and system
CN109254955A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 Unidirectional file is ferried method and system between a kind of separation net based on two dimensional code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255914A (en) * 2011-07-19 2011-11-23 河南大学 Android network application program information verification method
CN105049425A (en) * 2015-06-28 2015-11-11 南威软件股份有限公司 Physical isolation transmission method based on two-dimension code
CN105208751A (en) * 2015-10-30 2015-12-30 南京汉森思物联网科技有限公司 Configuration management generation tool software system based on WEB configuration
CN107800758A (en) * 2017-03-28 2018-03-13 平安壹钱包电子商务有限公司 Air control data processing method, apparatus and system
CN109254955A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 Unidirectional file is ferried method and system between a kind of separation net based on two dimensional code

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995391A (en) * 2019-11-18 2020-04-10 国能日新科技股份有限公司 Data transmission method in isolated network, server and terminal
CN111740955A (en) * 2020-05-18 2020-10-02 上海市公安局出入境管理局 Certificate making control method, system, server and computer readable storage medium
CN112416642A (en) * 2020-11-25 2021-02-26 国能日新科技股份有限公司 Remote operation and maintenance method and device
CN114565066A (en) * 2021-12-24 2022-05-31 国能日新科技股份有限公司 Isolation network data acquisition method and device based on electric power market trading system

Similar Documents

Publication Publication Date Title
CN110351256A (en) Data back method and system
CN110750801B (en) Data processing method, data processing device, computer equipment and storage medium
CN110266682B (en) Data encryption method and device, mobile terminal and decryption method
CN104040552B (en) Safely distribute method, processor, computing device and the system for safely storing and performing application of software
CN109274642B (en) Inter-network data communication method and related device, system, equipment and storage medium
CN112784823B (en) Face image recognition method, face image recognition device, computing equipment and medium
US9652622B2 (en) Data security utilizing disassembled data structures
CN111008863A (en) Lottery drawing method and system based on block chain
CN105939284B (en) The matching process and device of message control strategy
Rahman et al. A novel steganography technique for digital images using the least significant bit substitution method
CN106790221A (en) A kind of safe ipsec protocol encryption method of internet protocol and the network equipment
CN106529643B (en) A kind of two dimensional code coding and decoding generating device and method
CN110399511A (en) Image cache method, equipment, storage medium and device based on Redis
CN110995391A (en) Data transmission method in isolated network, server and terminal
Galletta et al. On the applicability of secret share algorithms for saving data on iot, edge and cloud devices
CN105447404A (en) Method and system for protecting image privacy in cloud storage
CN109450960A (en) Processing method, device, equipment, system and the medium of IPsec agreement
CN112685055A (en) Cluster construction method and device
del Rey et al. A protocol to encrypt digital images using chaotic maps and memory cellular automata
CN114254353A (en) Data processing method and device based on privacy protection and server
CN113094739A (en) Data processing method and device based on privacy protection and server
CN109005187A (en) A kind of communication information guard method and device
CN113489770A (en) Inter-container communication method, electronic device, and computer-readable storage medium
WO2024222325A1 (en) Method for comparing traffic parameters, and device, system and storage medium
CN107508805B (en) A kind of data package processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191018

RJ01 Rejection of invention patent application after publication