CN105320755A - Secure high-speed data transmission method - Google Patents
Secure high-speed data transmission method Download PDFInfo
- Publication number
- CN105320755A CN105320755A CN201510664299.5A CN201510664299A CN105320755A CN 105320755 A CN105320755 A CN 105320755A CN 201510664299 A CN201510664299 A CN 201510664299A CN 105320755 A CN105320755 A CN 105320755A
- Authority
- CN
- China
- Prior art keywords
- data
- unstructured data
- unstructured
- file
- receiving end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/258—Data format conversion from or to a database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/172—Caching, prefetching or hoarding of files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Abstract
The present invention provides a secure high-speed data transmission method. The method comprises: a transmitting side converting structured data that needs to be transmitted into unstructured data; transmitting the unstructured data to a receiving side for storage; and the receiving side converting the unstructured data into structured data, reading the structured data, and at the same time, deleting the converted unstructured data. According to the secure high-speed data transmission method provided by the present invention, in combination with an unstructured data transmission manner, even when the number of terminals reaches a ten-million level, the timeliness and effectiveness of real-time enciphered data transmission also can be well ensured.
Description
Technical field
The present invention relates to a kind of safety high speed data transmission method, belong to technical field of information management.
Background technology
Internet data gathers, inquiry relates to the read-write operation of database mostly, first connect logon server relating to database read-write operation, no matter be C/S structure or B/S structure, all cannot avoid the process that such connection logs in, B/S just directly reads on server native, writing server, and C/S reads after data remote transmission tables of data on the server, write, and what exchange in data transmission procedure is all structural data, do like this in general website application aspect and do not have much problems, but need under some particular cases to be encrypted transmission to data, if when the terminal quantity connected is too much, smooth and easy for ensureing that DataBase combining logs in, and data rate is fast, high cost then must be needed for increasing the DataBase combining number of server and the network bandwidth, when terminal quantity reaches 100,000 rank time, this mode of prior art must cause cost billions of, this has been most of unit, organize definitely unacceptable, and when terminal quantity reach millions other time, ensure that DataBase combining logs in smooth and easy, data rate is fast, the cost of many trillion then must be needed (at least to comprise equipment purchasing cost, Installation and Debugging cost, maintenance cost, network special line installation cost), and in reality, such as public security real name information registration system just has such demand, ideally should the information of real-time encrypted transmission registration of personnel, and contrast feedback in time with public security system database, but because above-mentioned technical conditions limit, current public security real name information registration system can also complete the while of cannot realizing encrypted transmission at present and contrast feedback in time.
Summary of the invention
For solving the problems of the technologies described above, the invention provides a kind of safety high speed data transmission method, the mode of this safety high speed data transmission method by transmitting in conjunction with unstructured data, even if when terminal quantity reaches ten million rank, also well can ensure that real-time encrypted data are transmitted timely, effective.
The present invention is achieved by the following technical programs.
A kind of safety high speed data transmission method provided by the invention: transmitting terminal converts unstructured data to by needing the structural data of transmission, transfer to receiving end to preserve, unstructured data is converted to structural data and reads by receiving end, is deleted by the unstructured data converted simultaneously.
Concrete employing following steps are carried out:
A, image data: transmitting terminal image data, and by the new data that collects stored in database, be that unstructured data is preserved in the buffer by new data transition simultaneously;
B, data are transmitted: background process reads the new unstructured data in buffer memory, is then sent in the temporary folder of receiving end;
C, comparing: receiving end scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, the unstructured data file erase simultaneously will converted.
Described step C is:
C, comparing: receiving end scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, inquire about in a database according to the data in the unstructured data file converted simultaneously, the data of inquiring about in the data that obtain and unstructured data file are contrasted, comparing result is preserved in the buffer, then deletes this unstructured data file;
And after step C, comparing, also comprise the steps:
D, data return: transfer in transmitting terminal temporary folder by the comparing result in receiving end buffer memory in the mode of unstructured data file;
E, data local update: transmitting terminal scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, data in the unstructured data file of conversion are presented at front-end interface simultaneously, then delete this unstructured data file.
In described step B, described new data is saved as unstructured data file, be encrypted in preservation simultaneously to data, saving result is the unstructured data file of encryption; In described step C, while the unstructured data file in temporary folder is carried out structuring conversion, also this unstructured data file is decrypted.
Data between described transmitting terminal and receiving end send, receive and carry out according to POST mode.
Described receiving end adopts ASP server mode to arrange.
The present invention is applied to genuine cyber identification information acquisition, that is:
1. described transmitting terminal is the real name collection terminal being provided with identity card reader, and receiving end is public security organ's real name information server;
Or 2. described transmitting terminal is public security backstage early warning enquiry machine, detached organization of public security organ inquiry terminal or regional 110 control and monitor consoles, and receiving end is public security organ's real-name information inquiry platform.
Beneficial effect of the present invention is: by the mode transmitted in conjunction with unstructured data, even if when terminal quantity reaches ten million rank, also well can ensure that real-time encrypted data are transmitted timely, effective.
Accompanying drawing explanation
Fig. 1 is schematic flow sheet of the present invention.
Embodiment
Further describe technical scheme of the present invention below, but described in claimed scope is not limited to.
The invention provides a kind of safety high speed data transmission method: transmitting terminal converts unstructured data to by needing the structural data of transmission, transfer to receiving end to preserve, unstructured data is converted to structural data and reads by receiving end, is deleted by the unstructured data converted simultaneously.
As a kind of specific implementation of such scheme, the present invention adopts following steps to carry out:
A, image data: transmitting terminal image data, and by the new data that collects stored in database, be that unstructured data is preserved in the buffer by new data transition simultaneously;
B, data are transmitted: background process reads the new unstructured data in buffer memory, is then sent in the temporary folder of receiving end;
C, comparing: receiving end scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, the unstructured data file erase simultaneously will converted.
Further, adopt aforesaid way, often need Data Comparison after the transmission of the data and return comparing result, the expansion therefore as aforesaid way realizes, and described step C is:
C, comparing: receiving end scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, inquire about in a database according to the data in the unstructured data file converted simultaneously, the data of inquiring about in the data that obtain and unstructured data file are contrasted, comparing result is preserved in the buffer, then deletes this unstructured data file;
And after step C, comparing, also comprise the steps:
D, data return: transfer in transmitting terminal temporary folder by the comparing result in receiving end buffer memory in the mode of unstructured data file;
E, data local update: transmitting terminal scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, data in the unstructured data file of conversion are presented at front-end interface simultaneously, then delete this unstructured data file.
Further, due in actual applications, data transmission often faces situation about being blocked, as adopted plaintext transmission, this is very dangerous, therefore for guaranteeing data security, in described step B, described new data is saved as unstructured data file, be encrypted in preservation simultaneously to data, saving result is the unstructured data file of encryption; In described step C, while the unstructured data file in temporary folder is carried out structuring conversion, also this unstructured data file is decrypted.
As a kind of application example of empirical tests of the present invention, the present invention is applied to genuine cyber identification information acquisition, that is:
1. described transmitting terminal is the real name collection terminal being provided with identity card reader, and receiving end is public security organ's real name information server;
Or 2. described transmitting terminal is public security backstage early warning enquiry machine, detached organization of public security organ inquiry terminal or regional 110 control and monitor consoles, and receiving end is public security organ's real-name information inquiry platform.
Data between described transmitting terminal and receiving end send, receive and carry out according to POST mode.
Described receiving end adopts ASP server mode to arrange.
The advantage of unstructured data is that transmission speed is fast, and be easy to encryption, compressibility is high, and the advantage of structural data is to be convenient to store data, inquiry, also be easy to safeguard, therefore integrated structure data of the present invention and unstructured data advantage separately, data transmission is completed in the mode of unstructured data, storage is completed in the mode of structural data, inquiry etc., thus the larger network data transmission of exchanges data amount can well be applicable to, the situation that particularly the data volume whole discrepancy of transmitting terminal (or claiming client) and receiving end (or claiming service end) is little.
Based on above-mentioned, the present invention at least also can be applicable to the great large-scale website of exchanges data amount, and when being applied to the great large-scale website of exchanges data amount, transmitting terminal is user computer or mobile terminal, worker's computer or mobile terminal, and receiving end is server.
But also shown by above-mentioned, the present invention is for such as search website, the general Websites such as e-commerce website are also inapplicable, this is because in the application of general Websites, the data volume that transmitting terminal (i.e. client) sends is general less, and the data volume that receiving end (i.e. service end) sends is general larger, and in the data of required transmission, the data that needs store in the mode of structural data are also less, generally be only the user name of user, password etc., and a general terminal connects an also only needs database read operation, not too common terminal uninterruptedly needs the situation connecting log database, overall exchanges data amount especially structural data exchanges data amount in fact and little, and it is not high to the requirement of encryption yet.
Claims (7)
1. a safety high speed data transmission method, it is characterized in that: transmitting terminal converts the structural data that needs transmit to unstructured data, transfer to receiving end to preserve, unstructured data is converted to structural data and reads by receiving end, is deleted by the unstructured data converted simultaneously.
2. safety high speed data transmission method as claimed in claim 1, is characterized in that: the concrete following steps that adopt are carried out:
A, image data: transmitting terminal image data, and by the new data that collects stored in database, be that unstructured data is preserved in the buffer by new data transition simultaneously;
B, data are transmitted: background process reads the new unstructured data in buffer memory, is then sent in the temporary folder of receiving end;
C, comparing: receiving end scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, the unstructured data file erase simultaneously will converted.
3. safety high speed data transmission method as claimed in claim 2, is characterized in that:
Described step C is:
C, comparing: receiving end scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, inquire about in a database according to the data in the unstructured data file converted simultaneously, the data of inquiring about in the data that obtain and unstructured data file are contrasted, comparing result is preserved in the buffer, then deletes this unstructured data file;
And after step C, comparing, also comprise the steps:
D, data return: transfer in transmitting terminal temporary folder by the comparing result in receiving end buffer memory in the mode of unstructured data file;
E, data local update: transmitting terminal scans in temporary folder file, then the unstructured data file in temporary folder is carried out structuring conversion, by the structural data that is converted to stored in database, data in the unstructured data file of conversion are presented at front-end interface simultaneously, then delete this unstructured data file.
4. safety high speed data transmission method as claimed in claim 2, is characterized in that: in described step B, described new data is saved as unstructured data file, and be encrypted data in preservation, saving result is the unstructured data file of encryption simultaneously; In described step C, while the unstructured data file in temporary folder is carried out structuring conversion, also this unstructured data file is decrypted.
5. safety high speed data transmission method as claimed in claim 1, is characterized in that: the present invention is applied to genuine cyber identification information acquisition, that is:
1. described transmitting terminal is the real name collection terminal being provided with identity card reader, and receiving end is public security organ's real name information server;
Or 2. described transmitting terminal is public security backstage early warning enquiry machine, detached organization of public security organ inquiry terminal or regional 110 control and monitor consoles, and receiving end is public security organ's real-name information inquiry platform.
6. safety high speed data transmission method as claimed in claim 2, is characterized in that: the data between described transmitting terminal and receiving end send, receive and carry out according to POST mode.
7. safety high speed data transmission method as claimed in claim 2, is characterized in that: described receiving end adopts ASP server mode to arrange.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510664299.5A CN105320755A (en) | 2015-10-14 | 2015-10-14 | Secure high-speed data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510664299.5A CN105320755A (en) | 2015-10-14 | 2015-10-14 | Secure high-speed data transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105320755A true CN105320755A (en) | 2016-02-10 |
Family
ID=55248141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510664299.5A Pending CN105320755A (en) | 2015-10-14 | 2015-10-14 | Secure high-speed data transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105320755A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603687A (en) * | 2016-12-23 | 2017-04-26 | 航天星图科技(北京)有限公司 | Method for transmission of unstructured data among multi-user nodes |
CN106878266A (en) * | 2016-12-23 | 2017-06-20 | 航天星图科技(北京)有限公司 | A kind of unstructured data Transmission system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102035848A (en) * | 2010-12-23 | 2011-04-27 | 福建南威软件工程发展有限公司 | Method for exchanging data among shared systems |
CN104142949A (en) * | 2013-05-10 | 2014-11-12 | 北京航天长峰科技工业集团有限公司 | Unified management method of data based on structuring and non-structuring |
CN104216989A (en) * | 2014-09-09 | 2014-12-17 | 广东电网公司中山供电局 | Method for storing transmission line integrated data based on HBase |
CN104572895A (en) * | 2014-12-24 | 2015-04-29 | 天津南大通用数据技术股份有限公司 | MPP (Massively Parallel Processor) database and Hadoop cluster data intercommunication method, tool and realization method |
-
2015
- 2015-10-14 CN CN201510664299.5A patent/CN105320755A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102035848A (en) * | 2010-12-23 | 2011-04-27 | 福建南威软件工程发展有限公司 | Method for exchanging data among shared systems |
CN104142949A (en) * | 2013-05-10 | 2014-11-12 | 北京航天长峰科技工业集团有限公司 | Unified management method of data based on structuring and non-structuring |
CN104216989A (en) * | 2014-09-09 | 2014-12-17 | 广东电网公司中山供电局 | Method for storing transmission line integrated data based on HBase |
CN104572895A (en) * | 2014-12-24 | 2015-04-29 | 天津南大通用数据技术股份有限公司 | MPP (Massively Parallel Processor) database and Hadoop cluster data intercommunication method, tool and realization method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603687A (en) * | 2016-12-23 | 2017-04-26 | 航天星图科技(北京)有限公司 | Method for transmission of unstructured data among multi-user nodes |
CN106878266A (en) * | 2016-12-23 | 2017-06-20 | 航天星图科技(北京)有限公司 | A kind of unstructured data Transmission system |
CN106878266B (en) * | 2016-12-23 | 2019-03-08 | 中科星图股份有限公司 | A kind of unstructured data Transmission system |
CN106603687B (en) * | 2016-12-23 | 2019-03-12 | 中科星图股份有限公司 | Unstructured data transmission method between a kind of multi-user's node |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120136960A1 (en) | Cloud Storage Data Access Method, Apparatus and System | |
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
CN103905497A (en) | Method, device and application platform for realizing login of third-party application service website | |
CN103546432A (en) | Method and system for realizing cross-domain jumping, browser and domain name servers | |
CN105786998A (en) | Database middleware system and method for processing data through database middleware system | |
CN103377415A (en) | Novel archive digitization management system | |
CN105207881B (en) | A kind of message method and equipment | |
CN110581824A (en) | Quick login management system based on multiple WeChat public numbers | |
CN102801713A (en) | Website logging-in method and system as well as accessing management platform | |
CN103514156B (en) | A kind of method that network service text is translated in transmitting procedure | |
CN102523196B (en) | Information identification method, device and system | |
CN103457802A (en) | Information transmission system and method | |
CN103780641A (en) | Cloud desktop access method, home gateway and system | |
CN103501345B (en) | A kind of control method of remote centralized control system | |
CN102026115B (en) | Electronic name card information exchange method and system | |
CN103634283A (en) | Feedback method of audit result and cloud server | |
CN105320755A (en) | Secure high-speed data transmission method | |
CN105391685B (en) | A kind of information acquisition and enquiry system of safety high speed | |
CN103167085B (en) | Communicating terminal shows the method for log, system and communicating terminal | |
CN102299945A (en) | Gateway configuration page registration method, system thereof and portal certificate server | |
CN106101188A (en) | A kind of data processing method of network cloud USB flash disk | |
CN101087274A (en) | An information monitoring system in instant communication | |
CN108011870A (en) | A kind of remote software online upgrading information automatic identification management method | |
CN102075355B (en) | Log system and using method thereof | |
CN103092932A (en) | Distributed document transcoding system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160210 |
|
RJ01 | Rejection of invention patent application after publication |