CN113746835A - Data transmission method, device, equipment and storage medium - Google Patents

Data transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN113746835A
CN113746835A CN202111028988.9A CN202111028988A CN113746835A CN 113746835 A CN113746835 A CN 113746835A CN 202111028988 A CN202111028988 A CN 202111028988A CN 113746835 A CN113746835 A CN 113746835A
Authority
CN
China
Prior art keywords
node
data
subscription message
data transmission
subscription
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111028988.9A
Other languages
Chinese (zh)
Inventor
周波
丁建
张君
杨张磊
张建业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Huifu Network Technology Co ltd
Original Assignee
Zhejiang Huifu Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Huifu Network Technology Co ltd filed Critical Zhejiang Huifu Network Technology Co ltd
Priority to CN202111028988.9A priority Critical patent/CN113746835A/en
Publication of CN113746835A publication Critical patent/CN113746835A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a data transmission method, a data transmission device, data transmission equipment and a storage medium. The method comprises the following steps: the intermediate node receives data sent by the first node; the intermediate node sends a subscription message to a second node so that the second node downloads the data from the intermediate node according to the subscription message; the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node. Through the embodiment of the invention, the intermediate node is arranged, the first node of the external system is prevented from being directly butted with the second node of the internal system, and the internal system autonomously acquires the document according to the requirement, so that the safety of the internal system is improved, and the external data is ensured to be received. The method conforms to the physical or logical isolation requirements of the internal system, and can perform document circulation in an interactive mode.

Description

Data transmission method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data transmission method, apparatus, device, and storage medium.
Background
When an internal system to be protected, such as a financial institution system or an internal system with an isolation requirement, is docked with an external system, due to the high requirements of the specificity and the safety environment level of the internal system, the external system is isolated from the internal environment of the system, and relevant documents are directly pushed into the internal system environment through the external system.
Disclosure of Invention
A primary object of the present application is to provide a data transmission method, apparatus, device and storage medium to solve the above problems.
In order to achieve the above object, according to an aspect of the present application, there is provided a data transmission method including:
the intermediate node receives data sent by the first node;
the intermediate node sends a subscription message to a second node so that the second node downloads the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In one embodiment, before the data is sent by the first node, the first node encrypts the data by using a pre-agreed encryption algorithm;
and after downloading the data from the intermediate node according to the subscription message, the second node decrypts the data by using a pre-agreed secret key.
In one embodiment, the subscription message includes a service type of the data; the method further comprises the following steps:
and after the second node decrypts the data, corresponding data processing is executed according to the service type of the data.
In one embodiment, when the second node belongs to a financial system internal node, the traffic type includes: client places order, signs contract and releases contract.
In one embodiment, when the number of the second nodes is multiple, the intermediate node determines a target second node corresponding to the data according to the content of the received data;
determining the address of the target second node according to a pre-stored address list of the second node;
and sending a subscription message to the target second node according to the address of the target second node so as to enable the target second node to download the data from the intermediate node.
In one embodiment, if a plurality of subscription messages are received by the second node, data corresponding to the plurality of subscription messages are downloaded from the intermediate node at a predetermined point in time.
In a second aspect, the present application further provides a data transmission method, applied to a second node, where the method includes:
the second node receives a subscription message sent by the intermediate node after receiving the data sent by the first node;
the second node downloads the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In one embodiment, after downloading the data from the intermediate node according to the subscription message, the second node decrypts the data by using a pre-agreed key.
In one embodiment, the subscription message includes a service type of the data; the method further comprises the following steps:
and after the second node decrypts the data, corresponding data processing is executed according to the service type of the data.
In one embodiment, if a plurality of subscription messages are received by the second node, data corresponding to the plurality of subscription messages are downloaded from the intermediate node at a predetermined point in time.
A third aspect, corresponding to the method of the first aspect, provides a data transmission apparatus, including:
the receiving module is used for receiving data sent by a first node;
a sending module, configured to send a subscription message to a second node, so that the second node downloads the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In a fourth aspect, corresponding to the method of the second aspect, the application provides a data transmission apparatus, including:
the receiving module is used for receiving subscription information sent by the intermediate node after receiving the data sent by the first node;
a download module, configured to download, by the second node, the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In a fifth aspect, the present application proposes an electronic device comprising at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform any of the above steps.
According to a sixth aspect of the present application, there is provided a computer readable storage medium having one or more program instructions embodied therein for performing the steps of any of the above.
In the embodiment of the application, an intermediate node receives data sent by a first node; the intermediate node sends a subscription message to a second node so that the second node downloads the data from the intermediate node according to the subscription message; the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node. Through the embodiment of the invention, the intermediate node is arranged, the first node of the external system is prevented from being directly butted with the second node of the internal system, and the internal system autonomously acquires the document according to the requirement, so that the safety of the internal system is improved, and the external data is ensured to be received. The method conforms to the physical or logical isolation requirements of the internal system, and can perform document circulation in an interactive mode.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a flow chart of a method of data transmission according to an embodiment of the present application;
FIG. 2 is a schematic diagram of data document transmission in an isolated environment according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a data transmission apparatus according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a data transmission apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the invention and its embodiments and are not intended to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meanings of these terms in the present invention can be understood by those skilled in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meanings of the above terms in the present invention can be understood by those of ordinary skill in the art according to specific situations.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
The present application proposes a data transmission method, which is referred to as a flow chart of a data transmission method shown in fig. 1; the method comprises the following steps:
step S102, the intermediate node receives the data sent by the first node.
Wherein the first node is external to the closed system.
Illustratively, the first node is a mobile terminal of the customer.
Step S104, the intermediate node sends a subscription message to the second node, so that the second node downloads the data from the intermediate node according to the subscription message.
Wherein the second node is in a relatively closed environment with respect to the first node, the first node having no direct access to the second node.
Referring to FIG. 2, a schematic diagram of data document transmission in an isolated environment is shown; wherein the intermediary service is located between the internal system and the external system. Protected internal systems: due to the particularities of business and environment, external systems cannot directly interface with the system, such as financial institution systems or internal systems with isolation requirements, referred to as internal systems for short.
Wherein the second node is within a relatively closed system; the first node is in an external system. The second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
Specifically, the second node is a node inside the system, the external first node cannot directly access the second node, and the second node is in an isolated state relative to the first node.
Illustratively, the second node may be a server or the like within a secure, confidential system. The confidential system includes, but is not limited to, a financial system, a system in an enterprise that is not intended to be disclosed, a system in a military unit, and the like. Taking the financial system as an example, the financial system may be a bank, insurance, security, etc.
The system does not allow external personnel to enter and access, and does not display the IP address to the outside. However, with the intermediate node, the outside can perform data transmission with the inside node through the intermediate node. The intermediate node has an IP address and the external node has access to the intermediate node. The data is sent to the intermediate node. The intermediate node has a network connection with a node internal to the system. The internal nodes receive data through the intermediate nodes. The method greatly improves the safety of the system, not only improves the safety of the system, but also enables the nodes in the system to be in data communication with the outside.
Security is very important, and data needs to be encrypted in order to improve the security of data transmission. Therefore, in one embodiment, before the data is sent by the first node, the first node encrypts the data by using a pre-agreed encryption algorithm;
and after downloading the data from the intermediate node according to the subscription message, the second node decrypts the data by using a pre-agreed secret key.
Specifically, the first node and the second node use a common encryption and decryption algorithm in advance. The first node encrypts using an encryption algorithm and the second node decrypts using a decryption algorithm. After the first node is encrypted by using the key, the second node is decrypted by using the same key. The key may be agreed upon manually in advance.
For example, the client makes a contract for loan with the bank, and after the client sends the contract document to the bank, the client encrypts the contract document by using the secret key and sends the encrypted contract document to the intermediate node. And after the nodes in the bank system acquire the file, decrypting the file by using the same secret key.
In one embodiment, the subscription message includes a service type of the data; and after the second node decrypts the data, corresponding data processing is executed according to the service type of the data.
The service types include, but are not limited to: client places order, signs contract and releases contract.
Illustratively, after receiving the subscription message, the node in the bank performs corresponding data processing according to the service type field carried in the message. If the service type is client ordering contract, then ordering relevant processing is carried out; if the service type is contract signing, processing the contract signing aspect; and if the service type is contract release, performing corresponding processing action of contract release.
In one embodiment, the subscription message further comprises a certificate type field of the client, which is used for indicating the type of the certificate used by the client; among the types of credentials are, but not limited to: identity card, business license.
In particular, other credentials related to the client, such as a driver's license, a degree license, a wedding license, etc., may be set according to the specific scenario. After the second node acquires the subscription message, the related identity attribute information of the user can be determined according to the type of the certificate carried in the subscription message. Thereby facilitating the development of corresponding services. For example, if the loan is made from a bank, an identification card is indispensable.
In one embodiment, when the number of the second nodes is multiple, the intermediate node determines a target second node corresponding to the data according to the content of the received data;
determining the address of the target second node according to a pre-stored address list of the second node;
and sending a subscription message to the target second node according to the address of the target second node so as to enable the target second node to download the data from the intermediate node.
Illustratively, if the bank internal system includes, Beijing division, Shanghai division, or even division multiple internal nodes; after receiving the data, the intermediate node first determines to which branch the data is sent, and specifically, may determine to which branch the data belongs according to the content in the data. For example, if the data content includes a keyword, the beijing division determines that the data should belong to the beijing division. IP addresses of Beijing division, Shanghai division and Shenzhen division are stored in the intermediate node in advance; and after determining that the data belongs to the Beijing affiliate, sending a subscription message of the data to a server of the Beijing affiliate according to the address of the Beijing affiliate, and downloading the data to the intermediate node after the server of the Beijing affiliate receives the subscription message.
After receiving the plurality of subscription messages, the second node can selectively download data according to the needs of the second node. In one embodiment, if a plurality of subscription messages are received by the second node, data corresponding to the plurality of subscription messages are downloaded from the intermediate node at a predetermined point in time. Alternatively, data is selectively downloaded.
In particular, it is assumed that the second node may not have to download data immediately after receiving a subscription message if it receives multiple subscription messages during the day. But rather wait until the end of the day, e.g., 7 o 'clock in the afternoon, or 8 o' clock to download the data. Since it can be determined that there is no more new data until after the time of the next shift, a plurality of data can be downloaded together at a time after the time of the next shift. Therefore, the data of a plurality of subscription messages can be downloaded without complicated downloading actions. It is possible to set a certain point in time after work each day for downloading.
Compared with the above-mentioned downloading of all the data corresponding to the subscription message, the second node may also download a part of the data. If the number of the subscription messages is multiple, after the second node receives the multiple subscription messages, the interested data can be selected according to the needs of the second node.
Illustratively, the second node is a node in a bank and receives data of a plurality of clients, wherein one client A is urgent to transact loan service; the other client B is not urgent and handles the loan-repayment service. The second node may selectively download data based on the degree of urgency. If the loan transaction is urgent, the data related to the loan transaction is preferentially downloaded to transact the loan transaction for the client A.
In specific implementation, service priority ranking can be set in the internal system, and the service with the highest priority is selected for priority processing. Therefore, after receiving a plurality of subscription messages, the data which is downloaded most preferentially can be determined to be downloaded preferentially according to the priority ranking and the service type of the data corresponding to each subscription message. And a plurality of data are downloaded according to the priority order, so that the service handling order is improved.
In a second aspect, a data transmission method is applied to a second node, and includes the following steps:
the second node receives a subscription message sent by the intermediate node after receiving the data sent by the first node;
the second node downloads the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In an embodiment, after downloading the data from the intermediate node according to the subscription message, the second node decrypts the data by using a pre-agreed key.
And after the second node decrypts the data, corresponding data processing is executed according to the service type of the data.
In one embodiment, when the number of the second nodes is multiple, the target second node receives a subscription message sent by the intermediate node; downloading the data from the intermediate node;
the intermediate node determines a target second node corresponding to the data according to the content of the received data;
determining the address of the target second node according to a pre-stored address list of the second node;
in one embodiment, if a plurality of subscription messages are received by the second node, data corresponding to the plurality of subscription messages are downloaded from the intermediate node at a predetermined point in time.
The application also proposes another data transmission method, with reference to fig. 2; the method comprises the following steps:
1. the external system encrypts the document data and uploads the document data to a document storage service of the intermediate service;
2. the external system stores the related service number or the related information of the document number of the uploaded encrypted document to the message service of the intermediate service;
3. the internal system needs to subscribe the message service in the intermediate service, once the message service has a message, the internal message consumes the message of the message service, and the consumed message contains the information of a new document needing to be downloaded;
4. and the internal system downloads the document corresponding to the consumption message from the document storage service of the intermediate service according to the consumed document message, and then performs related decryption and use on the document.
Illustratively, the internal system is a banking system, and needs to acquire a client contract or client certificate information from the outside, the step 1 external system needs to upload the contract or certificate information to a document storage system, the step 2 external system pushes related result information of a document to a message service, the step 3 internal system acquires and monitors the contract and the client certificate information from the message service, the step 4 internal system downloads the document according to the message, so that message and document transmission is completed, and sensitive data is encrypted in the transmission process, so that data security is protected.
In the embodiment of the invention, the external system and the internal system do not need to be directly butted, so that the condition that the internal system is passively butted with the outside is met; when a document needs to be downloaded, the internal system can be obtained at the first time; the internal system can download and decrypt the corresponding document according to the actual requirement; documents in the intermediary service are encrypted and have difficulty decrypting even if they are obtained by a third party.
The external system and the internal system can not be directly butted to transmit the document, so that the external system and the internal system can be prevented from being directly butted through the scheme, the internal system autonomously obtains the document according to needs, the physical or logical isolation requirements of the internal system are met, and the document circulation can be carried out according to an interactive mode.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In a third aspect, the present application provides a data transmission apparatus, referring to a schematic structural diagram of a data transmission apparatus shown in fig. 3; the device includes:
a receiving module 31, configured to receive data sent by a first node;
a sending module 32, configured to send a subscription message to a second node, so that the second node downloads the data according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
The above-described apparatus of the present invention may be a software program installed in a server located in an external system, and the server may be located in any external node. The server also has connections to internal nodes.
In a fourth aspect, corresponding to the method in the second aspect, the present application provides a data transmission device, see the schematic structural diagram of a data transmission device shown in fig. 4; applied to a second node, the apparatus comprising:
a receiving module 41, configured to receive a subscription message sent by an intermediate node after receiving data sent by a first node;
a downloading module 42, configured to download the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In an embodiment, the apparatus further includes a decryption module 43, configured to decrypt the data using a pre-agreed key after downloading the data from the intermediate node according to the subscription message.
In one embodiment, the subscription message includes a service type of the data;
the system further comprises a data processing module 44, configured to execute corresponding data processing according to the service type of the data after the decryption module 43 decrypts the data.
In one embodiment, the downloading module 42 is further configured to, if the second node receives a plurality of subscription messages, download data corresponding to the plurality of subscription messages from the intermediate node at a predetermined time point.
In a fifth aspect, the present application further provides an electronic device, referring to the schematic structural diagram of an electronic device shown in fig. 5; the method comprises the following steps: at least one processor 51 and at least one memory 52; the memory 52 is used to store one or more program instructions; the processor 51 is configured to execute one or more program instructions to perform the method according to any one of the above-mentioned embodiments.
When the electronic device is located in a second node inside the closed system, the processor 51 is configured to perform the following steps:
receiving a subscription message sent by an intermediate node after receiving data sent by a first node;
downloading the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In one embodiment, the subscription message includes a service type of the data; the method further comprises the following steps:
the processor 51 is further configured to perform corresponding data processing according to the service type of the data after performing decryption processing on the data.
In one embodiment, the processor 51 is further configured to, if a plurality of subscription messages are received, download data corresponding to the plurality of subscription messages from the intermediate node at a predetermined time point.
In one embodiment, the processor 51 is further configured to, if a plurality of subscription messages are received, download data corresponding to the plurality of subscription messages according to a preset priority of service types.
When the electronic device is located at an intermediate node outside the closed system, the processor 51 is configured to perform the following steps:
receiving data sent by a first node;
sending a subscription message to a second node to enable the second node to download the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
In one embodiment, when the number of the second nodes is multiple, determining a target second node corresponding to the data according to the content of the received data;
determining the address of the target second node according to a pre-stored address list of the second node;
and sending a subscription message to the target second node according to the address of the target second node so as to enable the target second node to download the data from the intermediate node.
In a fifth aspect, the present application also proposes a computer-readable storage medium having embodied therein one or more program instructions for executing the method according to any one of the above.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), SLDRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A method of data transmission, comprising:
the intermediate node receives data sent by the first node;
the intermediate node sends a subscription message to a second node so that the second node downloads the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
2. The data transmission method according to claim 1, wherein before the data is sent by the first node, the first node encrypts the data by using a pre-agreed encryption algorithm;
and after downloading the data from the intermediate node according to the subscription message, the second node decrypts the data by using a pre-agreed secret key.
3. The data transmission method according to claim 2, wherein the subscription message includes a service type of the data; the method further comprises the following steps:
and after the second node decrypts the data, corresponding data processing is executed according to the service type of the data.
4. The data transmission method according to claim 3, wherein when the second node belongs to a financial system internal node, the service type includes: client places order, signs contract and releases contract.
5. The data transmission method according to claim 1, wherein when the number of the second nodes is multiple, the intermediate node determines a target second node corresponding to the data according to the content of the received data;
determining the address of the target second node according to a pre-stored address list of the second node;
and sending a subscription message to the target second node according to the address of the target second node so as to enable the target second node to download the data from the intermediate node.
6. The data transmission method according to claim 1,
and if the second node receives a plurality of subscription messages, downloading data corresponding to the plurality of subscription messages from the intermediate node at a preset time point.
7. A method of data transmission, characterized in that,
the second node receives a subscription message sent by the intermediate node after receiving the data sent by the first node;
the second node downloads the data from the intermediate node according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
8. A data transmission apparatus, comprising:
the receiving module is used for receiving data sent by a first node;
a sending module, configured to send a subscription message to a second node, so that the second node downloads the data according to the subscription message;
the second node is in a relatively closed environment with respect to the first node, and the first node does not have direct access to the second node.
9. An electronic device, comprising: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor, configured to execute one or more program instructions to perform the method of any of claims 1-6, or claim 7.
10. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of claims 1-6, or claim 7.
CN202111028988.9A 2021-08-31 2021-08-31 Data transmission method, device, equipment and storage medium Pending CN113746835A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111028988.9A CN113746835A (en) 2021-08-31 2021-08-31 Data transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111028988.9A CN113746835A (en) 2021-08-31 2021-08-31 Data transmission method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113746835A true CN113746835A (en) 2021-12-03

Family

ID=78735043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111028988.9A Pending CN113746835A (en) 2021-08-31 2021-08-31 Data transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113746835A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083607A (en) * 2006-05-30 2007-12-05 倪海生 Internet accessing server for inside and outside network isolation and its processing method
CN101277308A (en) * 2008-05-23 2008-10-01 杭州华三通信技术有限公司 Method for insulating inside and outside networks, authentication server and access switch
CN101404624A (en) * 2007-10-03 2009-04-08 音乐会技术公司 System and method of prioritizing the downloading of media items in a media item recommendation network
CN101494584A (en) * 2009-02-25 2009-07-29 中国联合网络通信集团有限公司 Data transfer system
US20130254308A1 (en) * 2010-04-29 2013-09-26 British Broadcasting Corporation Content provision system
CN113132434A (en) * 2019-12-31 2021-07-16 湖北亿咖通科技有限公司 Distributed service processing method, device, equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083607A (en) * 2006-05-30 2007-12-05 倪海生 Internet accessing server for inside and outside network isolation and its processing method
CN101404624A (en) * 2007-10-03 2009-04-08 音乐会技术公司 System and method of prioritizing the downloading of media items in a media item recommendation network
US20090094248A1 (en) * 2007-10-03 2009-04-09 Concert Technology Corporation System and method of prioritizing the downloading of media items in a media item recommendation network
CN101277308A (en) * 2008-05-23 2008-10-01 杭州华三通信技术有限公司 Method for insulating inside and outside networks, authentication server and access switch
CN101494584A (en) * 2009-02-25 2009-07-29 中国联合网络通信集团有限公司 Data transfer system
US20130254308A1 (en) * 2010-04-29 2013-09-26 British Broadcasting Corporation Content provision system
CN113132434A (en) * 2019-12-31 2021-07-16 湖北亿咖通科技有限公司 Distributed service processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108123800B (en) Key management method, key management device, computer equipment and storage medium
CN111600908B (en) Data processing method, system, computer device and readable storage medium
JP5814282B2 (en) System and method for providing OTA service
US10164970B1 (en) Secure cross-domain page generation
CN110611657A (en) File stream processing method, device and system based on block chain
CN109936546B (en) Data encryption storage method and device and computing equipment
CN115529130B (en) Data processing method, terminal, server, system, device, medium and product
CN111177735A (en) Identity authentication method, device, system and equipment and storage medium
US11095620B1 (en) Secure method, system, and computer program product for exchange of data
CN114826733A (en) File transfer method, device, system, apparatus, medium, and program product
CN114143108A (en) Session encryption method, device, equipment and storage medium
CN111859443A (en) Account level block chain privacy data access authority control method and system
CN108564330B (en) Information processing method and platform and computer readable medium
CN114239072A (en) Block chain node management method and block chain network
CN113449322A (en) Data sharing method and device based on block chain, electronic equipment and readable medium
CN110213252B (en) Communication method, terminal equipment and network equipment
CN114095165B (en) Key updating method, server device, client device and storage medium
CN110602075A (en) File stream processing method, device and system for encryption access control
CN113452513B (en) Key distribution method, device and system
CN113746835A (en) Data transmission method, device, equipment and storage medium
CN111125734B (en) Data processing method and system
CN111311412B (en) Decentralized transaction confirmation method and device and server
CN113868713A (en) Data verification method and device, electronic equipment and storage medium
CN114595465A (en) Data encryption processing method and device and electronic equipment
CN114095254B (en) Message encryption method, server device, client device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination