CN101958886A - Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system - Google Patents

Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system Download PDF

Info

Publication number
CN101958886A
CN101958886A CN2010101527216A CN201010152721A CN101958886A CN 101958886 A CN101958886 A CN 101958886A CN 2010101527216 A CN2010101527216 A CN 2010101527216A CN 201010152721 A CN201010152721 A CN 201010152721A CN 101958886 A CN101958886 A CN 101958886A
Authority
CN
China
Prior art keywords
file
computer
transmission
transfer
virus killing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101527216A
Other languages
Chinese (zh)
Inventor
曹志强
闫鹏
吕辉
王君
王弋珵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Digital Video Beijing Ltd
Original Assignee
China Digital Video Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Digital Video Beijing Ltd filed Critical China Digital Video Beijing Ltd
Priority to CN2010101527216A priority Critical patent/CN101958886A/en
Publication of CN101958886A publication Critical patent/CN101958886A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and a non-IP network-based multi-stage antivirus file secure transmission system, which belong to the technical field of file transmission. In the prior art, transmission control protocol (TCP)/IP is commonly used for file transmission among computers or among computer networks, so the defect of poor security exists. In the method and the system of the invention, one or more file transfer parties is or are established between a file transmitting party and a file receiving part; the file transmitting party, the file transfer parties and the file receiving part are connected with one another in series through a non-IP data tunnel; each part is installed with different kinds of antivirus software; the file is transferred from the filter transmitting part to the file transfer parties and then is transmitted to the file receiving part; and the antivirus process is performed on the file by using the antivirus software of each part before the file is transmitted from the file transmitting part to the file transfer parties and after the file is received by the file receiving part. In the method and the system, the file is transmitted through the non-IP data tunnel and the multi-stage antivirus process is performed on the file in the file transmission process, so the security of the file transmission is improved.

Description

A kind of multistage virus killing file security transmission method and system based on non-IP network
Technical field
The invention belongs to the file transfer technology field, be specifically related to a kind of multistage virus killing file security transmission method and system based on non-IP network.
Background technology
At present, adopt procotol TCP/IP to carry out file transfer between one-of-a-kind system or the network system usually, comprise that the file of http protocol is uploaded and downloaded, the file transfer of File Transfer Protocol, E-MAIL etc.TCP/IP is a two-layer program.High level is a transmission control protocol, and it is responsible for gathering information or file is split into littler bag.These wrap the TCP layer that is sent to receiving terminal by network, and the TCP layer of receiving terminal is reduced to original document to bag.Low layer is an Internet protocol, and it handles the address part of each bag, makes the correct arrival destination of these bags.Gateway computer on the network is carried out Route Selection according to the address of information.Even the subpackage route from identical file also might be different, but can converge in the destination at last.TCP/IP uses client/server (C/S) pattern to communicate.Tcp/ip communication is point-to-point, and the meaning is that communication is to carry out between a main frame in network and another main frame.Because the document transmission method between the present network system all is based on ICP/IP protocol, therefore be subjected to the attack of internet worm easily, there is unsafe factor in file transfer.
In addition, antivirus software in system for defend against computer virus, thereby need to obtain enough administrative powers and limit other programs, if a computer has been installed plural antivirus software, can monitor, operate when internal memory monitoring is equal at file monitor, script between them, and system can only allow a program to take at one time, so can clash between a plurality of antivirus software, so a computer is generally only installed a kind of antivirus software.But the virus killing ability of every kind of antivirus software is limited, and exists characteristics separately again, can not carry out killing to all virus.If file can adopt different antivirus softwares to carry out killing respectively, can improve security of File Transfer undoubtedly in transmission course.
Summary of the invention
At the defective that exists in the prior art, the purpose of this invention is to provide a kind of multistage virus killing file security transmission method and system based on non-IP network, these method and system can improve security of File Transfer.
To achieve these goals, the technical solution used in the present invention is as follows:
A kind of multistage virus killing file security transmission method based on non-IP network, this method is set up one or more files transfer side between file transmit leg and file recipient, by non-I P data tunnel series connection, each side all is equipped with different antivirus softwares between file transmit leg, file transfer side and the file recipient; File after transfer side transmits, is transferred to the file recipient from the file transmit leg; Before file transmit leg and file transfer side transfer files and the file recipient adopt the antivirus software of each side that file is killed virus after receiving file.
Aforesaid file security transmission method, wherein, non-IP data tunnel is usb data tunnel or ASI data tunnel.
Aforesaid file security transmission method, wherein, the process that file transmits between file transmit leg and file transfer side may further comprise the steps:
(1) the file transmit leg adopts this side's antivirus software to treat fat file to kill virus;
(2) file sending direction file transfer side sends the document transmission command;
(3) file transfer side determines whether file allows transmission, and the result is returned to the file transmit leg;
(4) if do not allow transmission, then the file transmit leg finishes this document transmission, carries out next file transfer; If allow transmission, then the file transmit leg sends the beginning transmission command, and transfer files immediately;
(5) file transfer side receives file, receives up to file.
Aforesaid file security transmission method, wherein, the process that file transmits between the side of commentaries on classics and the file recipient hereof may further comprise the steps:
1. file transfer side adopts this side's antivirus software to treat fat file to kill virus;
2. veer file recipient sends the document transmission command in the file;
3. the file recipient determines whether file allows transmission, and the result is returned to file transfer side;
If 4. do not allow transmission, next file transfer is carried out in then file transfer reef knot bundle this document transmission; If allow transmission, then file transfer side sends the beginning transmission command, and transfer files immediately;
5. the file recipient receives file, receives up to file.
Aforesaid file security transmission method wherein, is provided with two ASI data tunnels between file transmit leg, file transfer side and file recipient, a transmission that is used for a direction, and one is used for reciprocal transmission.
A kind of multistage virus killing file security transmission system based on non-IP network comprises computer A and computer B, also is provided with one or more computer N between computer A and B; Computer A, computer N and computer B are by non-IP data tunnel series connection; Every computer includes and is used for file virus killing module that file is killed virus and the document transmission module that carries out file transfer between two computers by non-IP data tunnel; The virus killing mode difference of the file virus killing module of described every computer.
A kind of multistage virus killing file security transmission system based on non-IP network, comprise two computer network systems, each computer network system includes data ferry-boats server and the plurality of client machine that is connected by B/S pattern or C/S model with data ferry-boat server;
Between two computer network systems, also be provided with one or more transfer server, connect with the data ferry-boat server in two computer networks by non-IP data tunnel;
Data ferry-boats server and transfer server include and are used for file virus killing module that file is killed virus and the document transmission module that is used for being undertaken by non-IP data tunnel file transfer between two-server; The virus killing mode difference of the file virus killing module of described every station server.
Method and system of the present invention, in the document transmission process between computer or between the computer network, owing to be not by ICP/IP protocol but by non-IP data tunnel, and in the process of file transfer, adopt different antivirus softwares that file is killed virus, therefore improved security of File Transfer.
Description of drawings
Fig. 1 is the structural representation of system described in the embodiment 1;
Fig. 2 is the structural representation of system described in the embodiment 2;
Fig. 3 is a computer network system structural representation described in the embodiment 2;
Fig. 4 is the schematic flow sheet by non-IP data tunnel transfer files between two computers or the two-server among embodiment 1 and the embodiment 2.
Embodiment
Core concept of the present invention is: some files transfer side is set between file transmit leg and file recipient, connects by non-IP data tunnel between file transmit leg, file transfer side and the file recipient; Each side all is equipped with different antivirus softwares; File after transfer side transmits, is transferred to the file recipient from the file transmit leg; Before file transmit leg and file transfer side transfer files and the file recipient adopt the antivirus software of each side that file is killed virus after receiving file.Described non-IP data tunnel is meant and is not based on the tunnel that ICP/IP protocol is carried out transfer of data, can adopt usb data tunnel or ASI (Asynchronous Serial Interface, Asynchronous Serial Interface) data tunnel etc.Because the present invention carries out file transfer by ICP/IP protocol, and in transmission course, adopt different antivirus softwares that file is killed virus, therefore improved security of File Transfer.
Below in conjunction with embodiment and accompanying drawing, describe the present invention.
Embodiment 1
As shown in Figure 1, between computer A and C, be provided with a computer B, connect by usb data line 11 (or ASI data wire) between computer A, computer B and the computer C.Every computer includes and is used for file virus killing module 12 that file is killed virus and the document transmission module 13 that carries out file transfer between two computers by usb data tunnel (or ASI data tunnel).The virus killing mode difference that file virus killing module 12 on every computer adopts, for example, computer A adopts " Rising " virus killing, computer B to adopt " Nuo Dun " virus killing, computer C to adopt " this base of kappa " virus killing.
USB (Universal Serial BUS) is a USB, is an external perimysium reference bus, and what be used for standard computer and external equipment is connected and communication the plug and play of USB interface support equipment and hot plug function.USB version selected among the present invention should be more than USB2.0, and to support bigger transmission rate, interface can be selected general flat A type mouth, comprises 4 lines.The data wire two ends are equipped with identical USB interface, do not need to be provided with traditional USB Net-LinQ in the middle of the data wire.The bidding protocol and the file protocol of transfer of data are set respectively in the document transmission module of computer A, B and C.
ASI (Asynchronous Serial Interface) is the Asynchronous Serial Interface standard, is a kind of MPEG-2 video transmission interface standard that is applicable to radio data system.The ASI transport stream can have different pieces of information speed, but transmission rate is constant, is 270Mbps, so ASI can send and receive the MPEG-2 data of different rates.The ASI transmission system is a hierarchy, top, the 2nd layer of use Moving Picture Experts Group-2 ISO/IEC 13818-(Systems), the 0th layer and the 1st layer of FC fibre channel that is based on ISO/IEO CD 14165-1.Selected AS I interface is the BNC structure of standard among the present invention, and data wire is a coaxial cable, and the data wire two ends are equipped with identical ASI interface.In computer A, B and C, be provided with the ASI card, the bidding protocol and the file protocol of transfer of data is set respectively in the document transmission module of computer A, B and C.
After the connection of two computers usefulness usb data line 11 (or ASI data wires), just between two computers, set up usb data tunnel (or ASI data tunnel).All computers all are in accepting state in real time.Suppose that now computer A has a file a need send computer C to, computer A is at first killed virus with 12 couples of file a of virus killing module of the file on it, then it is sent to computer B.After computer B was received file a, 12 couples of file a killed virus with the virus killing module of the file on the computer B, then it are sent to computer C.After computer C was received file a, 12 couples of file a killed virus with the virus killing module of the file on the computer C.The process of transfer files may further comprise the steps as shown in Figure 4 between two computers:
(1) computer A (outbox side) adopts antivirus software on it to treat fat file to kill virus;
(2) computer A sends the document transmission command to computer B (recipient), and this order comprises information such as file size;
(3) computer B determines whether file allows transmission, and the result is returned to computer A;
(4) if do not allow transmission, then computer A finishes this document transmission, carries out next file transfer (under the situation that also has alternative document to transmit); If allow transmission, then computer A sends the beginning transmission command to computer B, and transfer files immediately;
(5) computer B receives file, receives up to file;
Above-mentioned file transfer can realize based on following agreement:
1. prepare host-host protocol, the protocol header information format is:? CHECKFILE filename file size;
2. can host-host protocol, the protocol header information format is:? the CHECKOK file name information;
3. can not host-host protocol, the protocol header information format is:? the CHECKFAIL file name information;
4. begin host-host protocol, the protocol header information format is:? TRANSFER;
5. transmission success agreement, the protocol header information format is:? the TRANSOK file name information;
6. bust this agreement, the protocol header information format is:? the TRANSFAIL file name information.
After computer A is treated transmitting file and killed virus, produce the file transfer order, comprise in the header of this order "? CHECKFILE ", send this order to computer B then.After computer B receives order, determine whether file allows transmission, and the result is returned computer A with command forms.Computer A receives order, if comprise in the command header information "? CHECKOK ", promptly can transmit, then computer A sends the beginning transmission command to computer B, comprise in the header "? TRANSFER ", and begin transfer files immediately; If comprise in the command header information "? CHECKFAIL ", then computer A finishes this file transfer.Suppose to allow transmission, computer B receives file, receives up to file.Computer B sends the transmission success order to computer A, comprise in the header "? TRANSOK ".After computer A is received this order, finish this file transfer, carry out next file transfer.If the file transfer failure, then computer B sends the bust this order to computer A, comprise in the header "? TRANSFAIL ".After computer A receives this order, finish this file transfer, transmit this document again or transmit next file.
In the present embodiment, can adopt a plurality of computers to be used for the transfer virus killing service of file between computer A and the computer C.The virus killing mode difference that file virus killing module on every computer adopts can adopt virus killing mode as much as possible that file is killed virus like this, thereby further improve security of File Transfer.
Embodiment 2
As shown in Figure 2,4 transfer servers have been set up between computer network system A and the computer network system B.The structure of computer network system A and B comprises data ferry-boats server 31 and the plurality of client machine 32 that is connected by B/S pattern or C/S model with data ferry-boat server 31 as described in Figure 3.Connect by ASI card and ASI data wire between the data of two computer network systems ferry-boat server 31 and the transfer server, set up the ASI data tunnel between the server; Perhaps connect, form the usb data tunnel by the usb data line.Every station server includes the file virus killing module 311 that is used for file is killed virus, and the document transmission module 312 that is used for being undertaken by ASI data tunnel (or usb data tunnel) file transfer between two-server.The virus killing mode difference that the file virus killing module 311 of every station server adopts.
When the client computer 1 of now supposing computer network system A has file b need send the client computer n of computer network system B to.At first client computer 1 uploads to file b in the data ferry-boat server of computer network system A by C/S model or B/S pattern.After the file virus killing module of data ferry-boat server was killed virus to file b, document transmission module was transferred to transfer server 1 by ASI data tunnel (or usb data tunnel).After the file virus killing module of transfer server 1 was killed virus to file b, document transmission module sent transfer server 2 to by the ASI data tunnel.By that analogy, in the data ferry-boat server that file b is transferred to computer network system B.At last, the client computer n of computer network system B can land the data ferry-boat server of computer network system B by C/S model or B/S pattern, downloads this document.The process of transfer files is identical with embodiment 1 between two servers, repeats no more herein.
In embodiment 1 and embodiment 2: file transfer can be unidirectional, can be as computer A among the embodiment 1 to computer C transfer files, but computer C cannot be to the computer A transfer files; Also can be two-way, can be as the computer A among the embodiment 1 to computer C transfer files, computer C also can be to the computer A transfer files; Can also be two-way mutual transmission, as among the embodiment 1 in computer A in the process of computer C transfer files, computer C also can be to the computer A transfer files.Two-way mutual transmission need set up two non-IP data tunnels between the computer or between the server, a transmission that is used for a direction, and one is used for reciprocal transmission.
Need to prove: the foregoing description only is to explanation of the present invention and unrestricted, and those skilled in the art can carry out various changes and modification to the present invention according to the description among the embodiment and not break away from the spirit and scope of the present invention.For example, also can adopt other non-IP data tunnels among the embodiment 1,2, also can intersect and use two or more non-IP data tunnels.Therefore, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technology thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (8)

1. multistage virus killing file security transmission method based on non-IP network, it is characterized in that: between file transmit leg and file recipient, set up one or more files transfer side, by non-IP data tunnel series connection, each side all is equipped with different antivirus softwares between file transmit leg, file transfer side and the file recipient; File after transfer side transmits, is transferred to the file recipient from the file transmit leg; Before file transmit leg and file transfer side transfer files and the file recipient adopt the antivirus software of each side that file is killed virus after receiving file.
2. a kind of multistage virus killing file security transmission method based on non-IP network as claimed in claim 1, it is characterized in that: described non-IP data tunnel is the usb data tunnel.
3. a kind of multistage virus killing file security transmission method based on non-IP network as claimed in claim 1, it is characterized in that: described non-IP data tunnel is the ASI data tunnel.
4. a kind of multistage virus killing file security transmission method as claimed in claim 1 based on non-IP network, it is characterized in that: the process that file transmits between file transmit leg and file transfer side may further comprise the steps:
(1) the file transmit leg adopts this side's antivirus software to treat fat file to kill virus;
(2) file sending direction file transfer side sends the document transmission command;
(3) file transfer side determines whether file allows transmission, and the result is returned to the file transmit leg;
(4) if do not allow transmission, then the file transmit leg finishes this document transmission, carries out next file transfer; If allow transmission, then the file transmit leg sends the beginning transmission command, and transfer files immediately;
(5) file transfer side receives file, receives up to file.
5. a kind of multistage virus killing file security transmission method based on non-IP network as claimed in claim 4 is characterized in that: the process that file transmits between the side of commentaries on classics and the file recipient hereof may further comprise the steps:
1. file transfer side adopts this side's antivirus software to treat fat file to kill virus;
2. veer file recipient sends the document transmission command in the file;
3. the file recipient determines whether file allows transmission, and the result is returned to file transfer side;
If 4. do not allow transmission, next file transfer is carried out in then file transfer reef knot bundle this document transmission; If allow transmission, then file transfer side sends the beginning transmission command, and transfer files immediately;
5. the file recipient receives file, receives up to file.
6. as the described a kind of multistage virus killing file security transmission method of one of claim 1 to 5 based on the ASI tunnel, it is characterized in that: two non-IP data tunnels are set between file transmit leg, file transfer side and file recipient, article one, be used for the transmission of a direction, one is used for reciprocal transmission.
7. multistage virus killing file security transmission system based on non-IP network, comprise computer A and computer B, also be provided with one or more computer N between computer A and B, it is characterized in that: computer A, computer N and computer B are by non-IP data tunnel series connection; Every computer includes and is used for file virus killing module that file is killed virus and the document transmission module that carries out file transfer between two computers by non-IP data tunnel; The virus killing mode difference of the file virus killing module of described every computer.
8. multistage virus killing file security transmission system based on non-IP network, comprise two computer network systems, each computer network system includes data ferry-boats server and the plurality of client machine that is connected by B/S pattern or C/S model with data ferry-boat server; It is characterized in that:
Between two computer network systems, also be provided with one or more transfer server, connect with the data ferry-boat server in two computer networks by non-IP data tunnel;
Data ferry-boats server and transfer server include and are used for file virus killing module that file is killed virus and the document transmission module that is used for being undertaken by non-IP data tunnel file transfer between two-server; The virus killing mode difference of the file virus killing module of described every station server.
CN2010101527216A 2009-07-20 2010-04-22 Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system Pending CN101958886A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101527216A CN101958886A (en) 2009-07-20 2010-04-22 Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
CN200910088849.8 2009-07-20
CN200910088848.3 2009-07-20
CN200910088848 2009-07-20
CN200910088847.9 2009-07-20
CN200910088849 2009-07-20
CN200910088847 2009-07-20
CN2010101527216A CN101958886A (en) 2009-07-20 2010-04-22 Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system

Publications (1)

Publication Number Publication Date
CN101958886A true CN101958886A (en) 2011-01-26

Family

ID=43485993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101527216A Pending CN101958886A (en) 2009-07-20 2010-04-22 Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system

Country Status (1)

Country Link
CN (1) CN101958886A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497366A (en) * 2011-12-09 2012-06-13 常州英贝通信息技术有限公司 Method for securely transmitting U disk file on counter of financial network and file transmission system
CN103078883A (en) * 2011-10-26 2013-05-01 北大方正集团有限公司 Asynchronous file transfer device based on FTP (file transfer protocol)
CN104993965A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Network-based data recovery system adopting iris encryption
CN104991837A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Data recovery system based on network backup
CN104991840A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Network-based data recovery system with privacy protection function
CN104991841A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Data recovery system with privacy protection function
CN104991842A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Data recovery system
CN105005516A (en) * 2015-07-16 2015-10-28 柳州六品科技有限公司 Iris encryption-adopting network-based information retrieval method
CN105045683A (en) * 2015-07-16 2015-11-11 柳州六品科技有限公司 Information recovery method with privacy protection function
CN105068883A (en) * 2015-07-16 2015-11-18 柳州六品科技有限公司 Information recovery method
CN105069022A (en) * 2015-07-16 2015-11-18 柳州六品科技有限公司 Network based information recovery method having privacy protection function
CN105068884A (en) * 2015-07-16 2015-11-18 柳州六品科技有限公司 Network backup based information recovery method
CN106302533A (en) * 2016-09-30 2017-01-04 广州特道信息科技有限公司 Big data safety management system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556448A (en) * 2003-12-31 2004-12-22 珠海金山软件股份有限公司 Mobile sterilization device and its manufacturing method
CN1592223A (en) * 2003-12-25 2005-03-09 珠海金山软件股份有限公司 Device for preventing computer virus into inside network and realizing method thereof
CN101459682A (en) * 2007-12-12 2009-06-17 新奥特(北京)视频技术有限公司 System for file interaction between networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592223A (en) * 2003-12-25 2005-03-09 珠海金山软件股份有限公司 Device for preventing computer virus into inside network and realizing method thereof
CN1556448A (en) * 2003-12-31 2004-12-22 珠海金山软件股份有限公司 Mobile sterilization device and its manufacturing method
CN101459682A (en) * 2007-12-12 2009-06-17 新奥特(北京)视频技术有限公司 System for file interaction between networks

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078883A (en) * 2011-10-26 2013-05-01 北大方正集团有限公司 Asynchronous file transfer device based on FTP (file transfer protocol)
CN103078883B (en) * 2011-10-26 2016-06-15 新奥特(北京)视频技术有限公司 Asynchronous system file transfer means based on FTP
CN102497366A (en) * 2011-12-09 2012-06-13 常州英贝通信息技术有限公司 Method for securely transmitting U disk file on counter of financial network and file transmission system
CN104991842A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Data recovery system
CN104991840A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Network-based data recovery system with privacy protection function
CN104991841A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Data recovery system with privacy protection function
CN104991837A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Data recovery system based on network backup
CN104993965A (en) * 2015-07-15 2015-10-21 柳州六品科技有限公司 Network-based data recovery system adopting iris encryption
CN105005516A (en) * 2015-07-16 2015-10-28 柳州六品科技有限公司 Iris encryption-adopting network-based information retrieval method
CN105045683A (en) * 2015-07-16 2015-11-11 柳州六品科技有限公司 Information recovery method with privacy protection function
CN105068883A (en) * 2015-07-16 2015-11-18 柳州六品科技有限公司 Information recovery method
CN105069022A (en) * 2015-07-16 2015-11-18 柳州六品科技有限公司 Network based information recovery method having privacy protection function
CN105068884A (en) * 2015-07-16 2015-11-18 柳州六品科技有限公司 Network backup based information recovery method
CN106302533A (en) * 2016-09-30 2017-01-04 广州特道信息科技有限公司 Big data safety management system and method

Similar Documents

Publication Publication Date Title
CN101958886A (en) Non-internet protocol (IP) network-based multi-stage antivirus file secure transmission method and system
EP2278774B1 (en) Customized data delivery and network configuration via aggregation of device attributes
CN102088460B (en) Method, device and system for transmitting streaming media data in restricted networks
CN111083161A (en) Data transmission processing method and device and Internet of things equipment
CN102196015B (en) Manuscript system-based internal and external network data transmission method and system
CN102469065B (en) Method and system for interacting data with hypertext markup language (HTML)5 browser
CN109327493A (en) A kind of remote medical monitoring system based on cloud and monitoring method
CN106233694B (en) Sequential value is managed using the head of addition in calculating equipment
CN102347947A (en) Streaming media adaptor, streaming media network interaction system and method
CN113422818B (en) Data cascade transmission method, system and node equipment
CN102497433B (en) System and method realizing P2P for web page flash player
JP2008271545A (en) Optical fiber network system and managing method thereof
EP2642724A1 (en) File downloading method and system for terminal
CN102752217A (en) Network acceleration system and network acceleration method
CN104426758A (en) Transmission control system, device and method
CN103997539A (en) Radar operation state collecting and distributing system and method based on web service
CN101958884A (en) Data transmission method and system based on non IP data tunnel
WO2011017648A1 (en) System and method for sharing a payload among multiple homed networks
CN101958887A (en) Antivirus cluster-based secure file transfer method and system
CN103516573B (en) Data transmission method among client terminals in restricted network and client terminals
CN101958919A (en) Non-IP data channel-based multi-file parallel transmission method and system
US20090024739A1 (en) Endpoint discriminator in network transport protocol startup packets
CN102917212A (en) 3G (The 3rd Generation Telecommunication) wireless video monitoring implementation method and 3G wireless video monitoring system based on RTP (Real Time Protocol) and RTSP (Real Time Streaming Protocol)
CN107749834A (en) A kind of method for automating the multicast Streaming Media for adapting to network topology chain environment
CN102006516B (en) Digital household content service transmission method based on cable television two-way access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110126