CN111131446B - Data sending method and device, computer equipment and medium - Google Patents
Data sending method and device, computer equipment and medium Download PDFInfo
- Publication number
- CN111131446B CN111131446B CN201911338391.7A CN201911338391A CN111131446B CN 111131446 B CN111131446 B CN 111131446B CN 201911338391 A CN201911338391 A CN 201911338391A CN 111131446 B CN111131446 B CN 111131446B
- Authority
- CN
- China
- Prior art keywords
- fragmented
- file
- transmission
- sending
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000005540 biological transmission Effects 0.000 claims abstract description 236
- 239000012634 fragment Substances 0.000 claims abstract description 64
- 238000012545 processing Methods 0.000 claims abstract description 9
- 238000004590 computer program Methods 0.000 claims description 14
- 230000015654 memory Effects 0.000 claims description 10
- 238000010295 mobile communication Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000013467 fragmentation Methods 0.000 description 4
- 238000006062 fragmentation reaction Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a method, a device, computer equipment and a medium for data transmission, wherein the method comprises the following steps: a sending end carries out fragment processing on a file to be transmitted so as to obtain at least two fragment files; the sending end determines a transmission strategy for each fragment file according to the comprehensive information; the sending end sends each fragment file to a receiving end according to the transmission strategy; and the sending end sends the transmission strategy to a receiving end. In the embodiment of the application, after a complete transmission file is fragmented, the corresponding transmission link is selected for each fragmented file according to the comprehensive information, and the fragmented files are transmitted to the receiving end through different transmission links, so that the complete transmission file cannot be obtained even if the fragmented files are intercepted, and data leakage caused by intercepting the data in the transmission process is reduced.
Description
Technical Field
The present application relates to the field of data transmission, and in particular, to a method, an apparatus, a computer device, and a medium for data transmission.
Background
Cloud storage is a new concept derived from cloud computing, is an emerging network storage technology, and is an online storage mode. In order to improve the running speed of the local device, a general user can select to store data through cloud storage, so that the data storage capacity of the local device is reduced, and the running speed of the local device is improved.
In the process of cloud storage, data to be stored is generally transmitted to a cloud storage server through a fixed transmission link, but in this unchangeable storage manner, a hacker or an adversary can easily acquire uploaded data, and the security of data transmission is reduced.
Disclosure of Invention
In view of this, an object of the present application is to provide a method, an apparatus, a computer device and a medium for data transmission, so as to solve the problem of how to improve security of data transmission in the prior art.
In a first aspect, an embodiment of the present application provides a method for data transmission, including:
a sending end carries out fragment processing on a file to be transmitted so as to obtain at least two fragment files;
the sending end determines a transmission strategy for each fragment file according to the comprehensive information;
the sending end sends each fragment file to the receiving end according to the transmission strategy;
and the sending end sends the transmission strategy to a receiving end.
Optionally, the comprehensive information includes one or more of the following information: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
Optionally, when the comprehensive information is sending environment information for a sending end to send fragmented files, the sending end determines a transmission policy for each fragmented file according to the comprehensive information, including:
and the sending end determines a transmission strategy for each fragmented file according to the sending environment information.
Optionally, when the comprehensive information is attribute information of the fragmented files, the sending end determines a transmission policy for each fragmented file according to the comprehensive information, where the transmission policy includes:
and the sending end determines a transmission strategy for each fragment file according to the attribute information of each fragment file.
Optionally, the attribute information includes any one or more of the following: the quality condition of the fragmented files, the confidentiality condition of the fragmented files and the classification condition of the fragmented files.
Optionally, the determining, by the sending end, a transmission policy for each fragmented file according to the attribute information of each fragmented file includes:
and aiming at each fragmented file, the sending end determines a transmission strategy for transmitting the fragmented file in a transmission link list according to the attribute information of the fragmented file.
Optionally, when the comprehensive information is attribute information of a fragmented file and sending environment information of a sending end sending the fragmented file, the sending end determines a transmission policy for each fragmented file according to the comprehensive information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information and the attribute information of each fragment file.
Optionally, the determining, by the sending end, a transmission policy for each fragmented file according to the sending environment information and the attribute information of each fragmented file includes:
the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
and aiming at each fragmented file, the sending end determines a transmission strategy for transmitting the fragmented file in a transmission link list according to the attribute information of the fragmented file.
In a second aspect, an embodiment of the present application provides an apparatus for data transmission, including:
the fragmentation module is used for fragmenting the file to be transmitted by the sending end to obtain at least two fragmentation files;
the first determining module is used for determining a transmission strategy for each fragmented file by the sending end according to the comprehensive information;
the first sending module is used for sending each fragment file to a receiving end by the sending end according to the transmission strategy;
and the second sending module is used for sending the transmission strategy to a receiving end by the sending end.
In a third aspect, an embodiment of the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the steps of the above method when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, performs the steps of the above method.
The embodiment of the application provides a data sending method, which comprises the steps that firstly, a sending end carries out fragment processing on a file to be transmitted to obtain at least two fragment files; secondly, the sending end determines a transmission strategy for each fragment file according to the comprehensive information; thirdly, the sending end sends each fragment file to a receiving end according to the transmission strategy; and finally, the transmitting end transmits the transmission strategy to a receiving end.
In the prior art, a complete file is sent to a receiving end through a fixed transmission link, and a hacker or an adversary can easily acquire the file in the transmission process, so that data in the file is leaked. In the method, after a complete transmission file is fragmented, the corresponding transmission link is selected for each fragmented file according to the environment information, and the fragmented files are transmitted to the receiving end through different transmission links, so that the complete transmission file cannot be obtained even if the fragmented files are intercepted, and data leakage caused by the intercepted data in the transmission process is reduced.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic basic flowchart of a method for sending data according to an embodiment of the present application;
fig. 2 is a schematic basic flowchart of a method for determining a transmission policy according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a computer device 400 according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as presented in the figures, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
In the prior art, in order to increase the security of data transmission, only data to be transmitted is encrypted, and the encrypted data is transmitted to a cloud storage server by using a fixed transmission link, however, when data transmission is performed by using the transmission method, the transmission link is unchanged, which easily causes the transmitted data to be acquired by hackers or enemies, especially, the data transmitted by troops or the data transmitted by public security authorities have high confidentiality, and once the data is leaked, a significant loss is caused.
Based on the above problem, as shown in fig. 1, an embodiment of the present application provides a method for data transmission, including:
s101, a sending end carries out fragment processing on a file to be transmitted to obtain at least two fragment files;
s102, the sending end determines a transmission strategy for each fragmented file according to the sending environment information;
s103, the sending end sends each fragment file to the receiving end according to the transmission strategy;
and S104, the sending end sends the transmission strategy to the receiving end.
In the step S101, the sending end may be a device that implements a data transceiving function, for example, a computer, a mobile phone, a tablet computer, and the like, which is not limited herein. The file to be transmitted may be data to be stored, such as a document, audio, video, picture, etc., and the application is not limited thereto. The fragment processing may be to cut the complete file by a preset cutting rule, where the preset cutting rule may be pre-stored in the sending end, and the preset cutting rule may be determined according to an actual situation, for example, the preset cutting rule may cut the complete file into n parts on average, or the preset cutting rule may cut the complete file according to a certain ratio (ratio is 1. When the file is fragmented, the complete file is obtained by cutting the complete file according to a preset rule, and if the complete file is cut into 3 parts according to the preset rule, a fragmented file 1, a fragmented file 2 and a fragmented file 3 are generated. In the application, data transmission is real-time transmission, and the condition of asynchronization does not exist between every two fragmented files.
Specifically, the leakage of transmission data can be caused by interception by a hacker or an enemy in the process of transmitting the complete file, the complete file to be transmitted can be cut into a plurality of fragments in order to improve the security of data transmission, even if the complete file to be transmitted is intercepted in the process of fragment transmission, the intercepted file is not the complete transmission file, and the leakage of the transmitted file is reduced because the intercepted file is incomplete. The file is fragmented, and a whole large file is divided into a plurality of small files, so that the transmission pressure of a transmission link can be reduced, and the data transmission efficiency is improved.
In the step S102, the integrated information may include one or more of the following information: and the sending end sends the sending environment information of the fragment files and the attribute information of the fragment files. The sending environment information may be information of an environment where the sending end sends the file to be transmitted, and the sending environment information may include any one or more of the following: the position of the sending end when sending the fragmented file and the time when the sending end sends the fragmented file. The transmission policy may be a transmission link selected by the transmitting end for each fragmented file according to the transmission environment information. A transmission link may be a path for a user to transmit data between a transmitting end and a receiving end. The transmission link may include a variety of forms, such as: the transmission link adopts a WiFi link, the transmission link adopts a mobile communication link, the transmission link adopts a satellite link and the like. The WiFi link needs to be provided with WiFi modules at the sending end and the receiving end, and the sending end and the receiving end are connected to the WiFi network through the WiFi modules, so that data interaction of the sending end and the receiving end is realized. The mobile communication link needs to install mobile communication modules at the sending end and the receiving end, the mobile communication modules can be 2G modules, 3G modules, 4G modules or 5G modules, and the like, and data interaction between the sending end and the receiving end is realized through a mobile communication technology. The satellite link needs to install satellite modules at the transmitting end and the receiving end, the satellite modules can achieve data interaction between the transmitting end and the receiving end through a satellite transmission technology, and the satellite transmission technology can achieve long-distance data transmission through an artificial satellite. Each form of transmission link may include at least one transmission link. The attribute information includes any one or more of the following: the quality condition of the fragmented files, the confidentiality condition of the fragmented files, and the classification condition of the fragmented files. The quality condition of the fragmented files can be the size of the fragmented files, the size of the fragmented files can be distinguished according to a preset numerical value, the quality of the fragmented files is high when the size of the fragmented files exceeds the preset numerical value, the quality of the fragmented files is low when the size of the fragmented files does not exceed the preset numerical value, the preset numerical value can be manually specified, and the fragmented files can be determined according to actual conditions. The secrecy of the fragmented files may be artificially defined, and the fragmented files may be divided into files with a high secrecy and files with a low secrecy. The fragment files may be classified according to the form of the fragment text, such as a voice file, a video file, a picture file, a text file, and the like, which is not limited herein.
Specifically, when the sending end sends the fragmented files, the sending end may select a corresponding transmission link according to the environment where the sending end is located. The sending end can select the corresponding transmission link according to the current position, or the sending end can select the corresponding transmission link according to the current time for sending the file to be transmitted.
The step S102 includes:
step 1021, aiming at each fragmented file, the sending end determines the transmission strategy for transmitting the fragmented file in the transmission link table according to the current sending environment information.
In step 1021, the sending environment information and the transmission link identifier in the transmission link table are stored in association with each other.
Specifically, after the sending end determines the sending environment information of the file to be sent currently, the transmission link corresponding to the sending environment information is found in the transmission link table, and then the transmission link of the fragmented file is determined.
For example, the current sending environment information is 10: 30, there are two fragment files, that is, fragment file 1 and fragment file 2, and the transmission link list is shown in table 1, then it is determined that the transmission link of fragment file 1 can be transmission link 4, and the transmission link of fragment file 2 can be transmission link 5, according to the current sending environment information.
TABLE 1
Time information | Transmission link |
8:00-10:00 | 1、2、3 |
10:00-12:00 | 4、5、6 |
12:00-14:00 | 7、8、9 |
14:00-16:00 | 10、11、12 |
In order to make the determination of the transmission link of the fragmented file more accurate, the transmission link of the fragmented file may also be determined by a combination of different transmission environment information.
For example, the sending environment information of the fragmented files includes a time when the fragmented files are sent and a position where the fragmented files are sent, there are two fragmented files, which are a fragmented file 1 and a fragmented file 2, respectively, the sending end sends the fragmented file 1 at a location a, the sending time is 8: 30 minutes, the sending end sends the fragmented file 2 at a location B, the sending time is 13: 20 minutes, and the transmission link list is shown in table 2, it is determined that the transmission link of the fragmented file 1 may be a transmission link 2, and the transmission link of the fragmented file 2 may be a transmission link 7, according to the sending environment information of each fragmented file.
TABLE 2
In the above step S103, after determining the transmission link of each fragmented file in step S102, the sending end sends the fragmented file to the receiving end through the corresponding transmission link according to the determined transmission link.
In step S104, after the sending end sends the fragmented files to the receiving end, the receiving end does not know which fragmented files can form a complete file, and therefore, the sending end needs to send the transmission policy to the receiving end, so that the receiving end integrates the corresponding fragmented files according to the transmission policy to obtain the complete file.
In the embodiment of the application, through the four steps, after a complete transmission file is fragmented, the corresponding transmission link is selected for each fragmented file according to the comprehensive information, the fragmented files are transmitted to the receiving end through different transmission links, even if the fragmented files are intercepted, the complete transmission file cannot be obtained, and data leakage caused by the fact that data in the transmission process are intercepted is reduced.
Besides considering the sending environment information of the sending end to determine the transmission strategy for the fragmented files, the method can also consider the attribute information of the fragmented files, and the application also provides another data sending method, which comprises the following steps:
and 105, the transmitting end determines a transmission strategy for each fragment file according to the attribute information of each fragment file.
In the above step 105, the meaning of the attribute information may refer to the meaning of the attribute information mentioned above.
Specifically, step 105 includes:
step 1051, aiming at each fragmented file, the sending end determines a transmission strategy for transmitting the fragmented file in a transmission link list according to the attribute information of the fragmented file.
In the above step 1051, the attribute information of the fragment file in the transmission link list and the transmission link identifier are stored in association.
Specifically, in the transmission link list, the sending end selects one transmission link from the transmission links corresponding to the attribute information of the fragmented file.
For example, the attribute information of the fragmented files is the confidentiality of the fragmented files, two fragmented files are provided, namely, fragmented file 1 and fragmented file 2, the confidentiality of fragmented file 1 is high, the confidentiality of fragmented file 2 is low, and the transmission link list is shown in table 3, so that it is determined that the transmission link of fragmented file 1 can be transmission link 1, and the transmission link of fragmented file 2 can be transmission link 4, according to the confidentiality of each fragmented file.
TABLE 3
Attribute information | Transmission link |
High security | 1、2、3 |
Low security | 4、5、6 |
In order to make the determination of the transmission link of the fragmented file more accurate, the transmission link of the fragmented file may also be determined by combining different attribute information.
For example, the attribute information of the fragmented file includes the confidentiality of the fragmented file and the quality of the fragmented file, there are two fragmented files, namely fragmented file 1 and fragmented file 2, the confidentiality of fragmented file 1 is high, the quality of fragmented file 1 is 1005KB, the confidentiality of fragmented file 2 is low, and the quality of fragmented file 2 is 300KB, and the transmission link list is shown in table 4, so that it is determined that the transmission link of fragmented file 1 can be transmission link 2, and the transmission link of fragmented file 2 can be transmission link 7, according to the confidentiality and the quality of each fragmented file.
TABLE 4
In addition to the determination of the transmission link through the combination of two attribute information and the determination of the transmission link through the combination of three attribute information given in the above example, the determination method may refer to the above step of determining the transmission link, and will not be described too much here.
In order to make the transmission of fragmented files more uncertain and to reduce the interception of fragmented files in the transmission link, a transmission policy may be determined for each fragmented file by sending a combination of environment information and attribute information of the fragmented file. The application provides another data transmission method, which comprises the following steps:
and 106, the sending end determines a transmission strategy for each fragmented file according to the sending environment information and the attribute information of each fragmented file.
In step 106, a corresponding transmission link is specifically determined for each fragmented file according to the sending status information and the attribute information corresponding to each fragmented file.
As shown in fig. 2, in step 106, an embodiment of the present application provides a method for determining a transmission policy, including:
s1061, the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
s1062, for each fragmented file, the sending end determines, according to the attribute information of the fragmented file, a transmission policy for transmitting the fragmented file in the transmission link list.
In the above step S1061, the transmission link library sends the environment information and the transmission link list for key storage, and the attribute information of the fragment file and the transmission link identifier in the transmission link list are stored in association.
Specifically, a transmission link list corresponding to the current sending environment information is found in a transmission link library according to the sending environment information of the current sending fragmented file of the sending end. By sending the combination of the environment information and the fragmented files, the transmission link can be timely changed, and the possibility of intercepting the fragmented files can be further reduced.
For example, when the sending environment information is the place a, a transmission link list for performing associated storage on the confidentiality of the fragmented file and the transmission link identifier can be determined in the transmission link library; when the sending environment information is the place B, a transmission link list for performing associated storage on the quality of the fragmented files and the transmission link identifiers can be determined in the transmission link library.
In the step S1062, after the transmission link list is determined in the step S1061, a transmission link of each fragmented file may be determined according to the attribute information of the fragmented file.
It will be appreciated from the above discussion that determining the transmission link for fragmented files may include any one or more of the following: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
The transmission link can be randomly selected to transmit the fragmented files, so that the unit ensures that the receiving end can arrange the fragmented files into a complete file, and the transmitting end is required to transmit the randomly determined transmission strategy to the receiving end. The random determination of the transmission link can also reduce the possibility of intercepting the transmission file, and further reduce the possibility of leaking the data corresponding to the complete file.
In the prior art, there may also be a transit node having a connection relationship with a transmission link, and the intermediate node may include a base station, a server, a terminal device, a router, and the like, which is not limited herein. The transit node may be used to cache data. When a transmission link and a transit node are in a one-to-one correspondence relationship, the transit node does not need to be selected in the process of transmitting fragmented files. However, when one transmission link corresponds to a plurality of relay nodes, in order to more effectively improve the security of data transmission, the relay nodes may be determined for each fragmented file according to the integrated information, that is, the determination of the transmission policy includes determining the transmission link and determining the relay nodes.
In the process of transmitting fragmented files, when one transmission link corresponds to a plurality of transfer nodes, for one fragmented file, a transmission link corresponding to the fragmented file is determined according to the data transmission method, and then a transfer node is determined from the transfer nodes corresponding to the determined transmission link according to the current sending environment information and/or the attribute information of the fragmented file to transmit the fragmented file.
As shown in fig. 3, an embodiment of the present application provides an apparatus for data transmission, including:
a fragmentation module 301, configured to perform fragmentation processing on a file to be transmitted by a sending end to obtain at least two fragmented files;
a first determining module 302, configured to determine, by the sending end, a transmission policy for each fragmented file according to the comprehensive information;
a first sending module 303, configured to send each fragmented file to a receiving end according to the transmission policy by a sending end;
a second sending module 304, configured to send the transmission policy to the receiving end by the sending end.
Optionally, the comprehensive information includes one or more of the following information: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
Optionally, when the comprehensive information is sending environment information for sending a fragmented file by a sending end, the first determining module 302 includes: a first determination unit;
the first determining unit is configured to determine, by the sending end, a transmission policy for each fragmented file according to the sending environment information.
Optionally, when the comprehensive information is attribute information of a fragmented file, the first determining module 302 includes: a second determination unit;
the second determining unit is configured to determine, by the sending end, a transmission policy for each fragmented file according to the attribute information of each fragmented file.
Optionally, the attribute information includes any one or more of the following: the quality condition of the fragmented files, the confidentiality condition of the fragmented files and the classification condition of the fragmented files.
Optionally, when the sending end determines the transmission policy for each fragmented file according to the attribute information of each fragmented file, the second determining unit includes:
and for each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
Optionally, when the comprehensive information is attribute information of a fragmented file and sending environment information of a fragmented file sent by a sending end, the first determining module 302 includes: a third determination unit;
the third determining unit is configured to determine, by the sending end, a transmission policy for each fragmented file according to the sending environment information and the attribute information of each fragmented file.
Optionally, when the sending end determines a transmission policy for each fragmented file according to the sending environment information and the attribute information of each fragmented file, the third determining unit includes:
the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
and for each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
Corresponding to the method of data transmission in fig. 1, an embodiment of the present application further provides a computer device 400, as shown in fig. 4, the device includes a memory 401, a processor 402, and a computer program stored on the memory 401 and executable on the processor 402, wherein the processor 402 implements the steps of the method of data transmission when executing the computer program.
Specifically, the memory 401 and the processor 402 can be general memories and processors, which are not specifically limited herein, and when the processor 402 runs a computer program stored in the memory 401, the method for sending data can be executed, so as to solve the problem of how to improve the security of data transmission in the prior art.
Corresponding to the method for data transmission in fig. 1, the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program performs the steps of the method for data transmission.
Specifically, the storage medium can be a general storage medium, such as a mobile disk, a hard disk, and the like, and when a computer program on the storage medium is executed, the method for sending data can be executed, so as to solve the problem of how to improve the security of data transmission in the prior art.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used to illustrate the technical solutions of the present application, but not to limit the technical solutions, and the scope of the present application is not limited to the above-mentioned embodiments, although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: those skilled in the art can still make modifications or changes to the embodiments described in the foregoing embodiments, or make equivalent substitutions for some features, within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of this application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (11)
1. A method of data transmission, comprising:
a sending end carries out fragment processing on a file to be transmitted so as to obtain at least two fragment files;
the sending end determines a transmission strategy for each fragment file according to the comprehensive information; the transmission strategy is that for each fragmented file, a transmission path matched with the comprehensive information of the fragmented file is determined in a plurality of transmission paths; the comprehensive information of the fragmented files comprises the time of sending the fragmented files and the positions of the fragmented files;
the sending end sends each fragment file to the receiving end according to the transmission strategy;
and the sending end sends the transmission strategy to a receiving end so that the receiving end combines the received multiple fragmented files into a complete transmission file according to the transmission strategy.
2. The method of claim 1, wherein the aggregated information comprises one or more of the following: and the sending end sends the sending environment information of the fragment files and the attribute information of the fragment files.
3. The method of claim 2, wherein when the integrated information is transmission environment information for a transmitting end to transmit fragmented files, the transmitting end determines a transmission policy for each fragmented file according to the integrated information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information.
4. The method of claim 2, wherein when the integrated information is attribute information of fragmented files, the sending end determines a transmission policy for each fragmented file according to the integrated information, including:
and the sending end determines a transmission strategy for each fragment file according to the attribute information of each fragment file.
5. The method of claim 4, wherein the attribute information comprises any one or more of: the quality condition of the fragmented files, the confidentiality condition of the fragmented files and the classification condition of the fragmented files.
6. The method of claim 4, wherein the determining, by the sender, a transmission policy for each fragmented file according to the attribute information of each fragmented file comprises:
and aiming at each fragmented file, the sending end determines a transmission strategy for transmitting the fragmented file in a transmission link list according to the attribute information of the fragmented file.
7. The method of claim 2, wherein when the integrated information is attribute information of fragmented files and transmission environment information of fragmented files transmitted by a transmitting end, the transmitting end determines a transmission policy for each fragmented file according to the integrated information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information and the attribute information of each fragment file.
8. The method of claim 7, wherein the determining, by the sender, a transmission policy for each fragmented file according to the sending environment information and attribute information of each fragmented file comprises:
the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
and aiming at each fragmented file, the sending end determines a transmission strategy for transmitting the fragmented file in a transmission link list according to the attribute information of the fragmented file.
9. An apparatus for data transmission, comprising:
the fragment module is used for carrying out fragment processing on the file to be transmitted by the transmitting end to obtain at least two fragment files;
the first determining module is used for determining a transmission strategy for each fragment file by the sending end according to the comprehensive information; the transmission strategy is that for each fragmented file, a transmission path matched with the comprehensive information of the fragmented file is determined in a plurality of transmission paths; the comprehensive information of the fragmented files comprises the time of sending the fragmented files and the positions of the fragmented files;
the first sending module is used for sending each fragment file to a receiving end by the sending end according to the transmission strategy;
and the second sending module is used for sending the transmission strategy to a receiving end by the sending end so that the receiving end combines the received multiple fragmented files into a complete transmission file according to the transmission strategy.
10. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any of the preceding claims 1-8 when executing the computer program.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of the claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911338391.7A CN111131446B (en) | 2019-12-23 | 2019-12-23 | Data sending method and device, computer equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911338391.7A CN111131446B (en) | 2019-12-23 | 2019-12-23 | Data sending method and device, computer equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111131446A CN111131446A (en) | 2020-05-08 |
CN111131446B true CN111131446B (en) | 2022-12-13 |
Family
ID=70501263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911338391.7A Active CN111131446B (en) | 2019-12-23 | 2019-12-23 | Data sending method and device, computer equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111131446B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2023576A2 (en) * | 2007-04-12 | 2009-02-11 | Siemens Aktiengesellschaft | Method and system for providing services tailored for subscribers |
CN104601826A (en) * | 2009-05-26 | 2015-05-06 | 苹果公司 | Space & time based device customization |
CN105245612A (en) * | 2015-10-27 | 2016-01-13 | 惠州Tcl移动通信有限公司 | File transmission method and system of terminal |
CN106557518A (en) * | 2015-09-29 | 2017-04-05 | 北大方正集团有限公司 | A kind of method for transmitting file, device and terminal |
CN107277837A (en) * | 2017-05-22 | 2017-10-20 | 南京邮电大学 | A kind of public network system of selection based on when and where |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330920A (en) * | 2016-08-26 | 2017-01-11 | 中国科学院半导体研究所 | A secure communication method based on multi-channel signal fragmentation transmission technology |
CN106559413A (en) * | 2016-10-19 | 2017-04-05 | 深圳众享互联科技有限公司 | The message fragment method and its system of P2P network data securities transmission |
US10701154B2 (en) * | 2017-05-22 | 2020-06-30 | Microsoft Technology Licensing, Llc | Sharding over multi-link data channels |
CN109120683B (en) * | 2018-08-01 | 2021-06-08 | Oppo广东移动通信有限公司 | Data transmission method and related product |
-
2019
- 2019-12-23 CN CN201911338391.7A patent/CN111131446B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2023576A2 (en) * | 2007-04-12 | 2009-02-11 | Siemens Aktiengesellschaft | Method and system for providing services tailored for subscribers |
CN104601826A (en) * | 2009-05-26 | 2015-05-06 | 苹果公司 | Space & time based device customization |
CN106557518A (en) * | 2015-09-29 | 2017-04-05 | 北大方正集团有限公司 | A kind of method for transmitting file, device and terminal |
CN105245612A (en) * | 2015-10-27 | 2016-01-13 | 惠州Tcl移动通信有限公司 | File transmission method and system of terminal |
CN107277837A (en) * | 2017-05-22 | 2017-10-20 | 南京邮电大学 | A kind of public network system of selection based on when and where |
Also Published As
Publication number | Publication date |
---|---|
CN111131446A (en) | 2020-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016095516A1 (en) | Complex event processing method, apparatus and system | |
CN110995513B (en) | Data sending and receiving method in Internet of things system, internet of things equipment and platform | |
EP2790358A1 (en) | Anonymous friend-making method, system, network server and storage medium | |
CN108881354B (en) | Push information storage method and device, server and computer storage medium | |
CN104994590A (en) | Data transmission method and device | |
US20220045875A1 (en) | Multicast message processing method and apparatus, storage medium and processor | |
EP2666318A1 (en) | Method, apparatus, and computer program product for managing unwanted traffic in a wireless network | |
CN104065540A (en) | Data monitoring system and method | |
EP2938144A1 (en) | Service announcement message transmission method and device | |
CN103391547A (en) | Information processing method and terminal | |
CA2911989C (en) | Method, system and apparatus for dectecting instant message spam | |
US20190207873A1 (en) | Techniques for batched bulk processing | |
CN107623643A (en) | A kind of data packet forwarding method and device | |
US20190065534A1 (en) | Method and device for data deduplication | |
CN103618733A (en) | Data filtering system and method applied to mobile internet | |
CN112817602A (en) | JSON format data sending and receiving method, device and medium | |
CN102098640B (en) | Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam | |
CN111465873A (en) | Data sending method and electronic equipment | |
CN109889312A (en) | Multilink data transmission method, device and computer readable storage medium | |
CN102905236B (en) | A kind of junk short message monitoring method, Apparatus and system | |
CN111131446B (en) | Data sending method and device, computer equipment and medium | |
CN103260187B (en) | The method of research content presynchronization, equipment and system | |
CN104933059A (en) | File reputation acquisition method, gateway equipment and file reputation server | |
CN115883538A (en) | Method and system for sharing and receiving files with one solution and multiple solutions | |
CN115834189A (en) | Privacy intersection method and device for low-bandwidth environment and related products |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |