CN113382042B - Data transmission method and device - Google Patents

Data transmission method and device Download PDF

Info

Publication number
CN113382042B
CN113382042B CN202110528928.7A CN202110528928A CN113382042B CN 113382042 B CN113382042 B CN 113382042B CN 202110528928 A CN202110528928 A CN 202110528928A CN 113382042 B CN113382042 B CN 113382042B
Authority
CN
China
Prior art keywords
server
target file
file
information
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110528928.7A
Other languages
Chinese (zh)
Other versions
CN113382042A (en
Inventor
孔德洋
黄永兆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LCFC Hefei Electronics Technology Co Ltd
Original Assignee
LCFC Hefei Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LCFC Hefei Electronics Technology Co Ltd filed Critical LCFC Hefei Electronics Technology Co Ltd
Priority to CN202110528928.7A priority Critical patent/CN113382042B/en
Publication of CN113382042A publication Critical patent/CN113382042A/en
Application granted granted Critical
Publication of CN113382042B publication Critical patent/CN113382042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a data transmission method and a device, comprising the following steps: the second server requests a target file information set from the first server periodically, the target file information set at least comprises information of a first target file, the first target file information is generated by the first electronic device and is sent to the first server, and the first server judges that the first target file does not exist in the first server and then stores the first target file; the second server judges whether the first target file exists or not according to the information of the first target file; if the first target file does not exist in the second server, the second server requests the third server for the first target file; the second server sends the requested first target file to the first server.

Description

Data transmission method and device
Technical Field
The present invention relates to data transmission technologies, and in particular, to a data transmission method and apparatus.
Background
In the field of data transmission, software pre-installation or update of the existing electronic equipment is performed manually to search for missing files and inform corresponding personnel of uploading. In the face of a large number of different files, the problems of low efficiency and more errors are inevitable when the files are manually searched, the consistency and the safety of the files cannot be guaranteed when the files are manually uploaded, and the files are infected and tampered, so that a safe and efficient data transmission method is urgently needed in the field.
Disclosure of Invention
The invention provides a data transmission method and a data transmission device, which at least solve the technical problems in the prior art.
One aspect of the present invention provides a data transmission method, which is applied to a file transmission system, where the file transmission system includes: a first electronic device, a first server communicatively coupled to the first electronic device, a second server communicatively coupled to the first server, and a third server communicatively coupled to the second server, comprising:
the second server requests a target file information set from the first server periodically, wherein the target file information set at least comprises information of a first target file, and the first target file information is generated by first electronic equipment and sent to the first server and is stored after the first server judges that the first target file does not exist;
the second server judges whether the first target file exists or not according to the information of the first target file;
if the first target file does not exist in the second server, the second server requests a third server for the first target file;
and the second server sends the requested first target file to the first server.
The third server stores the first target file, and the read-write permission of the first target file in the third server is read-only.
Wherein, if the first target file exists in the second server, the method further comprises:
and the second server sends the first target file to the first server.
The second server sends the first target file to the first server, so that the first server encrypts the first target file and sends the encrypted first target file to the first electronic device.
The file system further comprises a second electronic device in communication connection with a second server, and the method further comprises:
when the second server receives a request of information of a second target file sent by second electronic equipment, the second server judges whether the second server has the second target file according to the information of the second target file;
if the second target file does not exist in the second server, the second server requests a third server for the second target file;
and the second server sends the second target file to the second electronic equipment.
Another aspect of the present invention provides a data transmission apparatus, including:
the request module is used for the second server to request a target file information set from the first server periodically, the target file information set at least comprises information of a first target file, and the first target file information is generated by the first electronic device and sent to the first server and is stored after the first server judges that the first target file does not exist;
the judging module is used for judging whether the second server has the first target file according to the information of the first target file;
the request module is further configured to, if the first target file does not exist in the second server, request the first target file from a third server by the second server;
and the sending module is used for sending the requested first target file to the first server by the second server.
The third server stores the first target file, and the read-write permission of the first target file in the third server is read-only.
The sending module is further configured to send, by the second server, the first target file to the first server.
The sending module is further configured to send the first target file to the first server by the second server, so that the first server encrypts the first target file and sends the encrypted first target file to the first electronic device.
The judging module is further configured to, when the second server receives a request for information of a second target file sent by the second electronic device, judge, by the second server, whether the second target file exists in the second server according to the information of the second target file;
the request module is further configured to, if the second target file does not exist in the second server, request the second target file from a third server by the second server;
the sending module is further configured to send, by the second server, a second target file to the second electronic device.
In the scheme, whether the first server and the second server have the first target file to replace the file which is originally judged to be lacking manually or not is judged by the first server, the second server requests the third server for the first target file to replace the file which is originally judged to be lacking manually, the consistency of the file is ensured, the efficiency of acquiring the required file is increased, the first server encrypts the first target file before sending the first target file to the first electronic equipment, the risk of leakage and infection of the file is prevented, the first server does not send the first target file to the second server immediately after judging that the first target file does not exist, but the second server regularly requests the information of the first target file, a large number of requests generated at the same time can be avoided, server resources are excessively consumed, and the electronic equipment is divided into the first electronic equipment and the second electronic equipment according to an external network and an internal network, the first electronic equipment can only access the first server, and the second electronic equipment can access the second server, so that the safety of the file transmission system is greatly improved.
Drawings
Fig. 1 is a flow chart illustrating a data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The existing method for pre-installing or updating the software of the electronic equipment is to manually search for missing files and inform corresponding personnel to upload required files. In the face of a large amount of required different files, manual searching is inevitable, the problems of low efficiency and more errors occur, the consistency and the safety of the files cannot be guaranteed by manually uploading the files, and the files have the risk of being infected.
In order to improve the efficiency and accuracy of searching for files in a file transmission process book, the consistency and safety of the files and reduce the risk of file infection, an embodiment of the invention provides a data transmission method, which is applied to a file transmission system, wherein the file transmission system comprises: a first electronic device, a first server communicatively connected to the first electronic device, a second server communicatively connected to the first server, and a third server communicatively connected to the second server, as shown in fig. 1, the method comprising:
step 101, a second server periodically requests a target file information set from a first server, wherein the target file information set at least comprises information of a first target file, and the first target file information is generated by first electronic equipment and sent to the first server, and the first server judges that the first target file does not exist in the first server and then stores the first target file.
The second server requests a target file information set from the first server periodically, the target file information set at least comprises information of a first target file, the information of the first target file is generated by the first electronic device according to the required first target file, the first electronic device sends the information of the first target file to the first server after generating the information of the first target file, the first server searches whether the first target file exists in the first server or not by a file traversing method according to the information of the first target file, if the first target file does not exist, the information of the first target file is stored, and the information is sent to the second server when the second server requests the first server.
And 102, judging whether the second server has the first target file according to the information of the first target file by the second server.
And the second server searches whether the first target file exists in the second server or not by a file traversing method according to the information of the first target file.
Step 103, if the first target file does not exist in the second server, the second server requests a third server for the first target file.
And if the first target file does not exist in the second server, the second server requests the third server for the first target file.
And 104, the second server sends the requested first target file to the first server.
And after the second server requests the first target file, the first target file is sent to the first server.
The third server stores the first target file, and the read-write permission of the first target file in the third server is read-only.
The third server stores a first target file required by the first electronic device, the read-write permission of the first target file in the third server is read-only, and read-only means that the content or attribute of the first target file in the third server can only be read and cannot be written or modified.
In step 103, in an embodiment, if the first target file exists in the second server,
and the second server sends the first target file to the first server.
If the first target file exists in the second server, the second server directly sends the first target file to the first server.
In step 104, in an implementation manner, the second server sends the first target file to the first server, so that the first server sends the encrypted first target file to the first electronic device.
After the second server sends the first target file to the first server, the first server encrypts the first target file and then sends the first target file to the first electronic device, and therefore the safety of the file is enhanced.
In one embodiment, the file system further comprises a second electronic device communicatively connected to a second server,
when the second server receives a request of information of a second target file sent by second electronic equipment, the second server judges whether the second server has the second target file according to the information of the second target file;
the second server receives the information of the second target file sent by the second electronic device, and the information of the second target file is generated by the second electronic device according to the required second target file.
If the second target file does not exist in the second server, the second server requests a third server for the second target file;
and if the first target file does not exist in the second server, the second server requests the third server for the first target file.
And the second server sends the second target file to the second electronic equipment.
And after the second server requests the first target file, the first target file is sent to the first server.
In the scheme, whether the first server and the second server have the first target file to replace the file which is originally judged to be lacking manually or not is judged by the first server, the second server requests the third server for the first target file to replace the file which is originally judged to be lacking manually, the consistency of the file is ensured, the efficiency of acquiring the required file is increased, the first server encrypts the first target file before sending the first target file to the first electronic equipment, the risk of leakage and infection of the file is prevented, the first server does not send the first target file to the second server immediately after judging that the first target file does not exist, but the second server regularly requests the information of the first target file, a large number of requests generated at the same time can be avoided, server resources are excessively consumed, and the electronic equipment is divided into the first electronic equipment and the second electronic equipment according to an external network and an internal network, the first electronic equipment can only access the first server, and the second electronic equipment can access the second server, so that the safety of the file transmission system is greatly improved.
An embodiment of the present invention further provides a data transmission device, as shown in fig. 2, the data transmission device includes:
a generating module 10, configured to generate first, second, and third file request data;
a transmission module 20, configured to send the first file request data to a first server, where a second server requests the second file request data from the first server, the second server requests a third server for a required file, the second server sends the required file to the first server, and the first server receives the required file and sends the required file to an electronic device;
a judging module 30, configured to judge whether the required file exists in the first server and the second server;
an encryption module 40, configured to encrypt the required file;
the transmission module 20 is further configured to send the required file to the electronic device by the first server.
The transmission module 20 is further configured to send the required file to the first server by the second server, and the first server receives the required file and sends the required file to the electronic device.
The generating module 10 is further configured to generate third file request data;
the transmission module 20 is further configured to send the third file request data to a second server by the electronic device, where the second server requests the third server for the required file, and the second server sends the required file to the electronic device.
Wherein, the transmission module 20 is further configured to send the required file to the electronic device by the second server.
An embodiment of the present invention further provides a data transmission device, including:
the request module is used for the second server to request a target file information set from the first server periodically, the target file information set at least comprises information of a first target file, and the first target file information is generated by the first electronic device and sent to the first server and is stored after the first server judges that the first target file does not exist;
the judging module is used for judging whether the second server has the first target file according to the information of the first target file;
the request module is further configured to, if the first target file does not exist in the second server, request the first target file from a third server by the second server;
and the sending module is used for sending the requested first target file to the first server by the second server.
The third server stores the first target file, and the read-write permission of the first target file in the third server is read-only.
The sending module is further configured to send, by the second server, the first target file to the first server.
The sending module is further configured to send the first target file to the first server by the second server, so that the first server encrypts the first target file and sends the encrypted first target file to the first electronic device.
The judging module is further configured to, when the second server receives a request for information of a second target file sent by the second electronic device, judge, by the second server, whether the second target file exists in the second server according to the information of the second target file;
the request module is further configured to, if the second target file does not exist in the second server, request the second target file from a third server by the second server;
the sending module is further configured to send, by the second server, a second target file to the second electronic device.
In addition to the above-described methods and apparatus, embodiments of the present application may also be a computer program product comprising computer program instructions that, when executed by a processor, cause the processor to perform the steps in the methods according to the various embodiments of the present application described in the "exemplary methods" section of this specification, above.
The computer program product may be written with program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform steps in a method according to various embodiments of the present application described in the "exemplary methods" section above of this specification.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (10)

1. A data transmission method is characterized in that the method is applied to a file transmission system, and the file transmission system comprises the following steps: a first electronic device, a first server communicatively coupled to the first electronic device, a second server communicatively coupled to the first server, and a third server communicatively coupled to the second server, the method comprising:
the second server requests a target file information set from the first server periodically, wherein the target file information set at least comprises information of a first target file, and the first target file information is generated by first electronic equipment and sent to the first server and is stored after the first server judges that the first target file does not exist;
the second server judges whether the first target file exists or not according to the information of the first target file;
if the first target file does not exist in the second server, the second server requests a third server for the first target file;
and the second server sends the requested first target file to the first server.
2. The data transmission method according to claim 1, wherein the third server stores the first target file, and the read-write permission of the first target file in the third server is read-only.
3. The data transmission method according to claim 1, wherein if the first target file exists in the second server, the method further comprises:
and the second server sends the first target file to the first server.
4. The data transmission method according to claim 1 or 3, wherein the second server sends the first object file to the first server, so that the first server sends the first object file to the first electronic device after encrypting the first object file.
5. The data transmission method according to claim 1, wherein the file system further comprises a second electronic device communicatively connected to a second server, and the method further comprises:
when the second server receives a request of information of a second target file sent by second electronic equipment, the second server judges whether the second server has the second target file according to the information of the second target file;
if the second target file does not exist in the second server, the second server requests a third server for the second target file;
and the second server sends the second target file to the second electronic equipment.
6. A data transmission apparatus, comprising:
the request module is used for the second server to request a target file information set from the first server periodically, the target file information set at least comprises information of a first target file, and the first target file information is generated by the first electronic device and sent to the first server and is stored after the first server judges that the first target file does not exist;
the judging module is used for judging whether the second server has the first target file according to the information of the first target file;
the request module is further configured to, if the first target file does not exist in the second server, request the first target file from a third server by the second server;
and the sending module is used for sending the requested first target file to the first server by the second server.
7. The data transmission apparatus according to claim 6, wherein the third server stores the first object file, and the read-write permission of the first object file in the third server is read-only.
8. The data transmission apparatus of claim 6,
the sending module is further configured to send, by the second server, the first target file to the first server.
9. The data transmission apparatus according to claim 6 or 8,
the sending module is further configured to send the first target file to the first server by the second server, so that the first server encrypts the first target file and sends the encrypted first target file to the first electronic device.
10. The data transmission apparatus of claim 6,
the judging module is further used for judging whether the second server has a second target file according to the information of the second target file when the second server receives a request of the information of the second target file sent by the second electronic device;
the request module is further configured to, if the second target file does not exist in the second server, request the second target file from a third server by the second server;
the sending module is further configured to send, by the second server, a second target file to the second electronic device.
CN202110528928.7A 2021-05-14 2021-05-14 Data transmission method and device Active CN113382042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110528928.7A CN113382042B (en) 2021-05-14 2021-05-14 Data transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110528928.7A CN113382042B (en) 2021-05-14 2021-05-14 Data transmission method and device

Publications (2)

Publication Number Publication Date
CN113382042A CN113382042A (en) 2021-09-10
CN113382042B true CN113382042B (en) 2022-04-15

Family

ID=77570996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110528928.7A Active CN113382042B (en) 2021-05-14 2021-05-14 Data transmission method and device

Country Status (1)

Country Link
CN (1) CN113382042B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811323A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 Data requesting method, data requesting device, node server and CDN (content delivery network) system
CN111447248A (en) * 2019-01-16 2020-07-24 网宿科技股份有限公司 File transmission method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102810138B (en) * 2012-06-19 2015-12-02 北京奇虎科技有限公司 A kind of restorative procedure of user side file and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811323A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 Data requesting method, data requesting device, node server and CDN (content delivery network) system
CN111447248A (en) * 2019-01-16 2020-07-24 网宿科技股份有限公司 File transmission method and device

Also Published As

Publication number Publication date
CN113382042A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN110414268B (en) Access control method, device, equipment and storage medium
US9336406B2 (en) Multiprotocol access control list with guaranteed protocol compliance
CN109391673B (en) Method, system and terminal equipment for managing update file
CN110324416B (en) Download path tracking method, device, server, terminal and medium
US10956383B2 (en) Device backup and wipe
CN112214519B (en) Data query method, device, equipment and readable medium
CN114598520B (en) Method, device, equipment and storage medium for controlling resource access
CN114676419A (en) Method, system, equipment and medium for real-time early warning of tampering of application program file
WO2012129684A1 (en) Transforming http requests into web services trust messages for security processing
CN109858285B (en) Block chain data processing method, device, equipment and medium
WO2019169771A1 (en) Electronic device, access instruction information acquisition method and storage medium
CN113382042B (en) Data transmission method and device
US10754748B2 (en) System and method for constructing extensible event log with javascript object notation (JSON) encoded payload data
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
CN105760532B (en) Resource sharing system and method based on Web Service
US20170286440A1 (en) Method, business processing server and data processing server for storing and searching transaction history data
CN109635558B (en) Access control method, device and system
CN114143308A (en) File uploading information processing method and device, computer equipment and storage medium
CN114201370A (en) Webpage file monitoring method and system
CN110309365B (en) Openstack data query method and device based on Mybatis
CN113282550A (en) File preview method and device, computer equipment and storage medium
CN112835854A (en) File storage method and device, electronic equipment and storage medium
CN110826078A (en) Data storage method, device and system
CN111143291A (en) Encrypted file searching method and device and electronic equipment
CN112114739A (en) Method, apparatus and computer program product for managing data objects

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant