CN108200059B - File transmission method, device, equipment and computer readable storage medium - Google Patents

File transmission method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN108200059B
CN108200059B CN201810003442.XA CN201810003442A CN108200059B CN 108200059 B CN108200059 B CN 108200059B CN 201810003442 A CN201810003442 A CN 201810003442A CN 108200059 B CN108200059 B CN 108200059B
Authority
CN
China
Prior art keywords
transmitted
file
files
sending
receiving end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810003442.XA
Other languages
Chinese (zh)
Other versions
CN108200059A (en
Inventor
史光华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201810003442.XA priority Critical patent/CN108200059B/en
Publication of CN108200059A publication Critical patent/CN108200059A/en
Application granted granted Critical
Publication of CN108200059B publication Critical patent/CN108200059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a file transmission method, a device, equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving a file to be transmitted sent by a sending end based on a special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file; when the file to be transmitted is a safe file, sending prompt information to a receiving end; and when a request instruction for acquiring the file to be transmitted, which is sent by the receiving terminal based on the prompt information, is received, the file to be transmitted is sent to the receiving terminal based on the special network. According to the scheme, the transmission of the transmission file is carried out through the special network, a scanning mechanism is set for the transmission file, and the transmission file is transmitted when the transmission file is determined to be the safe file through scanning. The special network is only used for communication between financial institutions, and other institutions cannot access the special network, so that the safety of the communication network can be ensured; the scanning mechanism can ensure the security of the transmitted files and improve the communication security between financial institutions.

Description

File transmission method, device, equipment and computer readable storage medium
Technical Field
The present invention relates to the field of communication transmission technologies, and in particular, to a file transmission method, apparatus, device, and computer-readable storage medium.
Background
Due to the particularity of the field of financial institutions, special attention needs to be paid to communication security when communicating with other financial institutions. At present, when a financial institution communicates, files needing to be transmitted are transmitted in an encrypted mode. However, in the encrypted transmission mode, because other organizations can access the communication network, the transmitted files may be maliciously acquired by other organizations, or maliciously added with viruses and other malicious attack behaviors, so that the files of the financial institutions are leaked or infected by the viruses, and the communication security between the financial institutions is low.
Disclosure of Invention
The invention mainly aims to provide a file transmission method, a file transmission device, file transmission equipment and a computer readable storage medium, and aims to solve the problems that in the prior art, the communication security between fusing mechanisms is low, and transmitted files are easy to be attacked maliciously.
In order to achieve the above object, the present invention provides a file transmission method, including the steps of:
receiving a file to be transmitted sent by a sending end based on a special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
when the file to be transmitted is a safe file, sending prompt information to a receiving end;
and when a request instruction for acquiring the file to be transmitted, which is sent by the receiving terminal based on the prompt information, is received, the file to be transmitted is sent to the receiving terminal based on the special network.
Preferably, when the file to be transmitted is a secure file, the step of sending the prompt message to the receiving end includes:
judging whether a plurality of files to be transmitted which are security files exist or not, and judging whether the files to be transmitted which are the security files exist or not when the files to be transmitted which are the security files exist, wherein the files to be transmitted carry preset sending time marks;
when files to be transmitted with preset sending time marks exist in a plurality of files to be transmitted which are safe files, the files to be transmitted with the preset sending time marks are classified into a first type of files to be transmitted, and the files to be transmitted without the preset sending time marks are classified into a second type of files to be transmitted;
sending prompt information to a receiving end corresponding to the first type of file to be transmitted according to a preset time identifier carried in the first type of file to be transmitted;
and distributing time marks to the second class of files to be transmitted, and sending prompt information to a receiving end corresponding to the second class of files to be transmitted according to the distributed time marks.
Preferably, the step of sending the file to be transmitted to the receiving end based on the private network includes:
judging whether a plurality of files to be transmitted exist or not, and determining the file size of each file to be transmitted when the plurality of files to be transmitted exist;
and sequencing the files to be transmitted according to the file sizes of the files to be transmitted to generate a file sequence to be transmitted, and issuing the files to be transmitted to a receiving end based on a special network based on the sequence of the files to be transmitted.
Preferably, the step of sending the file to be transmitted to the receiving end based on the private network includes:
and when the file to be transmitted is detected to be failed to be issued and a request instruction for acquiring the file to be transmitted again sent by the receiving terminal is received, the file to be transmitted is sent to the receiving terminal based on the special network.
Preferably, when the file to be transmitted is a secure file, the step of sending the prompt message to the receiving end includes:
when the file to be transmitted is a safe file, storing the file to be transmitted, and acquiring a receiving end identifier in the file to be transmitted;
and determining a receiving end according to the receiving end identifier, and sending prompt information to the receiving end.
Preferably, the file transfer method further includes the steps of:
when the preset filing time is detected, the stored files to be transmitted are filed, the files to be transmitted carrying the identifiers with high importance degree are transferred and stored, and the files to be transmitted carrying the identifiers with low importance degree are deleted.
In addition, in order to achieve the above object, the present invention also provides a file transfer apparatus, including:
the receiving module is used for receiving a file to be transmitted sent by the sending end based on the special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
the prompting module is used for sending prompting information to a receiving end when the file to be transmitted is a safe file;
and the sending module is used for sending the file to be transmitted to the receiving end based on the special network when receiving a request instruction for acquiring the file to be transmitted, which is sent by the receiving end based on the prompt information.
Preferably, the prompting module includes:
the device comprises a judging unit and a sending unit, wherein the judging unit is used for judging whether a plurality of files to be transmitted which are security files exist or not, and judging whether the files to be transmitted which are the security files exist or not carries preset sending time identification or not when the files to be transmitted which are the security files exist;
the classification unit is used for classifying the files to be transmitted carrying the preset transmission time identifier into a first class of files to be transmitted and classifying the files to be transmitted not carrying the preset transmission time identifier into a second class of files to be transmitted when the files to be transmitted carrying the preset transmission time identifier exist in the files to be transmitted which are the safety files;
the sending unit is used for sending prompt information to a receiving end corresponding to the first type of file to be transmitted according to a preset time identifier carried in the first type of file to be transmitted;
and the distribution unit is used for distributing the time identification to the second class of files to be transmitted and sending prompt information to a receiving end corresponding to the second class of files to be transmitted according to the distributed time identification.
In addition, to achieve the above object, the present invention also provides a file transfer apparatus, including: a memory, a processor, a communication bus, and a file transfer program stored on the memory;
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is used for executing the file transmission program to realize the following steps:
receiving a file to be transmitted sent by a sending end based on a special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
when the file to be transmitted is a safe file, sending prompt information to a receiving end;
and when a request instruction for acquiring the file to be transmitted, which is sent by the receiving terminal based on the prompt information, is received, the file to be transmitted is sent to the receiving terminal based on the special network.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors for:
receiving a file to be transmitted sent by a sending end based on a special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
when the file to be transmitted is a safe file, sending prompt information to a receiving end;
and when a request instruction for acquiring the file to be transmitted, which is sent by the receiving terminal based on the prompt information, is received, the file to be transmitted is sent to the receiving terminal based on the special network.
In the file transmission method of the embodiment, a file to be transmitted, which is sent by a sending end based on a private network, is received, the file to be transmitted is scanned, the scanned file is compared with a preset virus library, and whether the scanned file is a safe file is judged; when the file is a safe file, sending prompt information for prompting the receiving end to acquire the file to be transmitted; the receiving end sends a request instruction for acquiring the file to be transmitted based on the prompt information, and the file to be transmitted is sent to the receiving end based on a special network according to the request instruction. According to the scheme, the transmission of the transmission file is carried out through the special network, a scanning mechanism is set for the transmission file, and the transmission file is transmitted only when the transmission file is determined to be a safe file through scanning. The special network is only used for communication between financial institutions, and other institutions cannot access the special network, so that the safety of the communication network can be ensured; the scanning mechanism can ensure the security of the transmitted files, thereby improving the communication security between financial institutions.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment of a file transfer method according to the present invention;
FIG. 2 is a flowchart illustrating a second embodiment of a file transfer method according to the present invention;
FIG. 3 is a flowchart illustrating a third exemplary embodiment of a file transfer method according to the present invention;
FIG. 4 is a functional block diagram of a first embodiment of a document transportation apparatus according to the present invention;
fig. 5 is a schematic device structure diagram of a hardware operating environment related to a method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a file transmission method.
Referring to fig. 1, fig. 1 is a flowchart illustrating a file transmission method according to a first embodiment of the present invention. In this embodiment, the file transfer method includes:
step S10, receiving a file to be transmitted sent by a sending terminal based on a special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
in the file transmission of the embodiment, the private network is arranged between the financial institutions needing communication, and the transfer station is arranged on the private network, so that the access party of the private network only has two financial institutions needing communication, and other institutions cannot access the private network, thereby ensuring the security of the communication network. The transfer station transfers the files and data transmitted by communication, wherein a scanning mechanism is arranged, and only the scanned safe files and data can be transmitted to the financial institution through the transfer station. The financial institution which needs to transmit the file is used as a transmitting end, and the financial institution which receives the transmitted file is used as a receiving end. When the sending end transmits the file, the sending end can be triggered by requesting to send the file or can be directly sent. When the triggering mode of the request sending is used, a request instruction for file transmission is sent to the transfer station, the transfer station feeds back the request instruction, and when the feedback is that the sending end is determined to transmit the file, the file sending of the sending end is triggered, and the file to be sent is sent to the transfer station through a special network. When the file is sent directly, the file to be sent is sent to the transfer station directly through the private network without feedback determination of the transfer station. The transfer station receives the file sent by the sending end and takes the file as a file to be transmitted which needs to be transmitted to another financial institution.
In order to ensure the security of the received file to be transmitted, a preset virus library is set, wherein the preset virus library is a database which is preset and comprises a plurality of virus characteristic values, the virus characteristic values are characteristic values of viruses, and the characteristic values are serial number values of the determined viruses. For example, for identified viruses A, B and C, they are numbered 1, 2 and 3, and the numbers 1, 2 and 3 are used as the characteristic values of virus A, B, C, and are put into the database to form a preset virus library. After receiving a file to be transmitted sent by a sending end based on a private network, scanning the file to be transmitted based on a preset virus library, comparing the file to be transmitted with virus characteristic values in the preset virus library one by one, and determining whether the file to be transmitted carries any virus characteristic value so as to judge whether the file to be transmitted is a safe file.
Step S20, when the file to be transmitted is a safe file, sending prompt information to a receiving end;
when the file to be transmitted is determined to not carry any virus characteristic value in the preset virus library through scanning, the file to be transmitted is judged to be a safe file, and when the file to be transmitted can be transmitted to other financial institutions, prompt information is sent to the financial institutions needing to be transmitted, namely the receiving end, so as to prompt that the file to be transmitted needing to be sent to the receiving end exists. Specifically, the method comprises the following steps:
step S21, when the file to be transmitted is a safe file, storing the file to be transmitted and acquiring a receiving end identifier in the file to be transmitted;
when the file to be transmitted is a safe file without carrying the virus characteristic value, the safe file to be transmitted is stored, a file is generated for the file to be transmitted, and the uploading time, the file type, the file size and the like are recorded and archived. In addition, because each financial institution communicates with a plurality of other financial institutions, identifiers characterizing the source of the documents and the destination of the documents are added during document transmission in order to distinguish the communicating financial institutions. The identifier of the file source is the identifier of the sending end, and the identifier of the file destination is the identifier of the receiving end. And acquiring the receiving end identifier in the file to be transmitted so as to determine the receiving end of the file to be transmitted, which needs to be transmitted.
And step S22, determining the receiving end according to the receiving end identifier and sending the prompt information to the receiving end.
And further, determining a receiving end according to the obtained receiving end identifier in the file to be transmitted, and sending prompt information to the receiving end. The prompt information includes information such as the type, source and size of the file to be transmitted, so that the receiving end can judge whether the file to be transmitted needs to be acquired according to the prompt information. If the source of the file to be received and the financial institution without business are judged according to the prompt information, the file to be transmitted is not acquired; and if the content in the prompt message is the content required by the receiving end, acquiring the file to be transmitted.
And step S30, when a request instruction for acquiring the file to be transmitted is received, which is sent by the receiving terminal based on the prompt information, the file to be transmitted is sent to the receiving terminal based on the private network.
And when the receiving end judges that the file to be transmitted is the file meeting the requirement of the file to be transmitted according to the prompt information, sending a request instruction for acquiring the file to be transmitted so as to request to acquire the file to be transmitted. And in order to distinguish the request instruction from the request instructions of other receiving ends, a receiving end identifier for representing the uniqueness of the request instruction is added into the request instruction. And when a request instruction for acquiring the file to be transmitted, which is sent by the receiving terminal based on the prompt information, is received, acquiring a receiving terminal identifier carried in the request instruction. And comparing the receiving end identifier carried in the request instruction with the receiving end identifier in the file to be transmitted, and determining the receiving end of the file to be transmitted, which needs to be transmitted, when the identifiers of the receiving end identifier and the receiving end identifier are consistent. The file to be transmitted is also issued to the receiving end based on a special network, so that the security of the file to be transmitted is ensured while the transmitting end corresponds to the receiving end.
In the file transmission method of the embodiment, a file to be transmitted, which is sent by a sending end based on a private network, is received, the file to be transmitted is scanned, the scanned file is compared with a preset virus library, and whether the scanned file is a safe file is judged; when the file is a safe file, sending prompt information for prompting the receiving end to acquire the file to be transmitted; the receiving end sends a request instruction for acquiring the file to be transmitted based on the prompt information, and the file to be transmitted is sent to the receiving end based on a special network according to the request instruction. According to the scheme, the transmission of the transmission file is carried out through the special network, a scanning mechanism is set for the transmission file, and the transmission file is transmitted only when the transmission file is determined to be a safe file through scanning. The special network is only used for communication between financial institutions, and other institutions cannot access the special network, so that the safety of the communication network can be ensured; the scanning mechanism can ensure the security of the transmitted files, thereby improving the communication security between financial institutions.
Further, in another embodiment of the file transmission method of the present invention, when the file to be transmitted is a secure file, the step of sending the prompt message to the receiving end includes:
step S23, judging whether a plurality of files to be transmitted exist as security files, and when the plurality of files to be transmitted exist as security files, judging whether the plurality of files to be transmitted exist as security files with preset sending time marks or not;
understandably, different financial institutions have different transmission time requirements for transmitted files, the financial institutions have a plurality of users, a plurality of files related to the users may need to be transmitted during working hours in the daytime, and for some files unrelated to the users, the files are transmitted in non-working hours; or when the network load is detected to be small, the transmission is carried out; or the time transmission that the receiving end expects to receive the file to be transmitted by the transmitting end. And for the time when the sending end expects the receiving end to receive the file to be transmitted, the sending end adds a preset time identifier in the file to be transmitted so as to indicate the time for transmitting the file to be transmitted to the receiving end. And because each financial institution all docks a plurality of other financial institutions, when a plurality of financial institutions all need to carry out file transmission as the sending terminal, the file that awaits transmission that the transfer station received is a plurality of. Multiple files to be transmitted may cause transmission confusion if sent at the same time. Therefore, when the file to be transmitted is judged to be the safe file, whether a plurality of files to be transmitted which are the safe files exist is judged, and when the plurality of files to be transmitted which are the safe files exist, whether the files to be transmitted which carry the preset sending time identification indicating the transmission time exist in the plurality of files to be transmitted which are the safe files is judged.
Step S24, when a plurality of files to be transmitted are safe files, files to be transmitted carrying preset sending time marks are classified into a first type of files to be transmitted, and files to be transmitted not carrying the preset sending time marks are classified into a second type of files to be transmitted;
when a file to be transmitted, which carries a preset transmission time identifier, exists in a plurality of files to be transmitted, which are security files, it is stated that the transmission time of such a transmission file is determined by the preset transmission time identifier set by the transmitting end, for example, the content of the preset transmission time identifier is 27 pm 3 pm. The file to be transmitted is transmitted to the receiving end, so that the receiving end needs to send a request instruction first, namely, the file to be transmitted is transmitted to the receiving end only when the receiving end sends the request instruction first. The time transmission time of the file to be transmitted is determined by the receiving end, the preset sending time mark set by the sending end is used for appointing the time for sending the prompt information to the receiving end, and the receiving end sends the request instruction according to the prompt information, and the earliest time for obtaining the file to be transmitted is the time appointed by the preset sending time mark. And classifying the files to be transmitted carrying the preset sending time identification as a first class of files to be transmitted, and classifying the files to be transmitted not carrying the preset sending time identification as a second class of files to be transmitted. The time for sending the prompt information to the receiving end in the first type of file to be transmitted is determined by the preset sending time identifier, and the time for sending the prompt information to the receiving end in the second type of file to be transmitted can be real-time and can also be set according to the number of the files.
Step S25, sending prompt information to a receiving end corresponding to the first type of file to be transmitted according to the preset time identification carried in the first type of file to be transmitted;
and sending prompt information to a receiving end corresponding to the first type of files to be transmitted according to the preset time identification carried in each first type of file to be transmitted. And sending prompt information to a receiving end corresponding to the receiving end identifier when the time corresponding to the preset time identifier is reached according to the receiving end identifier.
And step S26, allocating time marks to the second type of files to be transmitted, and sending prompt information to a receiving end corresponding to the second type of files to be transmitted according to the allocated time marks.
And for the second class of files to be transmitted, distributing time marks to the second class of files to be transmitted, and sending prompt information to a receiving end corresponding to the second class of files to be transmitted according to the distributed time marks. When the time marks are distributed, the time marks distributed to different second-class files to be transmitted are different, so that different time points for sending prompt messages are represented. If there are A, B, C three files of the second type to be transmitted, time identifications of 2 pm, 3 pm and 4 pm can be respectively allocated to the files. The same second-class files to be transmitted carry receiving end identifiers representing the destinations of the second-class files, and if the receiving end identifiers corresponding to A, B, C are a, b and c respectively; thus, according to the receiving end identifier, when the time point of 2 pm is reached, the prompt message is sent to the receiving end identifier a; when the time point of 3 pm is reached, sending prompt information to a receiving end identifier b; when the time point of 4 pm is reached, a prompt message is sent to the receiving end identifier c. And sending prompt information to the receiving end through the distributed time identification, so that the sending time of the request instruction of the receiving end for requesting to acquire the file to be transmitted is different, and the second file to be transmitted is sent to the receiving end at different time points. In addition, in order to prevent the receiving end from not acquiring the file to be transmitted for a long time, the request time of the receiving end for requesting to acquire the file can be set, and the request instruction of requesting to acquire the file to be transmitted is effectively sent to the transfer station by the receiving end within the request time. And if the request time is longer than the preset time, the file is invalid so as to prevent the receiver from obtaining the file to be transmitted for a long time.
Further, in another embodiment of the file transmission method of the present invention, the step of sending the file to be transmitted to the receiving end based on the private network includes:
step S31, judging whether a plurality of files to be transmitted exist, and determining the file size of each file to be transmitted when the plurality of files to be transmitted exist;
when a request instruction for acquiring a file to be transmitted sent by a receiving end is received and the file to be transmitted is issued to the receiving end, because a plurality of files to be transmitted which need to be issued may exist, the transmission time of a plurality of files to be transmitted may overlap, and it appears that the transmission of one file to be transmitted is not completed, and another file to be transmitted is started to transmit, which results in the situation that the transmission of the previous file to be transmitted is slow or the transmission fails. Therefore, the implementation judges whether a plurality of files to be transmitted exist, when the files to be transmitted exist in a locked mode, the file size of each file to be transmitted is determined, and the file size represents the data volume to be transmitted.
And step S32, sequencing the files to be transmitted according to the file sizes of the files to be transmitted to generate a file sequence to be transmitted, and issuing the files to be transmitted to a receiving end based on a special network based on the sequence of the files to be transmitted.
Further, after the file size of each file to be transmitted is determined, the files to be transmitted are sequenced according to the sequence of the file sizes from small to large, and a file sequence to be transmitted is generated. If the file sizes of the files K1, K2 and K3 to be transmitted are 20K, 30M and 10M respectively, the file sequences to be transmitted are K1, K3 and K2. And according to the generated arrangement sequence of the file sequences to be transmitted, transmitting each file to be transmitted to a receiving end through a special network. According to the file size sequence from small to large, the transmission files are sent to the receiving end, after the transmission of the previous file to be transmitted with smaller data volume is completed, the transmission of the next file to be transmitted with larger data volume is carried out, and the problem that the transmission of other files to be transmitted is influenced because more time is consumed when the file to be transmitted with larger data volume is transmitted is avoided. Considering that a transfer station may have a large number of files to be transmitted, if the files to be transmitted with large data volume are arranged to be transmitted at last, the waiting time of the files to be transmitted with large data volume is too long, so that a priority mechanism is set. And setting a preset duration for judging the length of the waiting time, and judging that the waiting time of the file to be transmitted with large data volume is too long when the waiting time of the file to be transmitted with large data volume is longer than the preset duration, wherein the file to be transmitted is preferentially transmitted, and the waiting time is avoided from being too long.
Further, referring to fig. 2, a second embodiment of the file transmission method is proposed based on the first embodiment of the file transmission method of the present invention, and in the second embodiment, the step of sending the file to be transmitted to the receiving end based on the private network includes:
step S40, when it is detected that the file to be transmitted fails to be issued and a request instruction for acquiring the file to be transmitted again is received, the file to be transmitted is sent to the receiving end based on the private network.
Further, after the file to be transmitted is issued to the receiving end, an issue failure may occur, and when the issue failure occurs, the receiving end does not receive the file to be transmitted. Therefore, whether the file to be transmitted fails to be issued needs to be detected so as to ensure that the receiving end receives the file to be transmitted. The file to be transmitted is sent in a data packet mode, after the file to be transmitted is sent completely, the completion identifier is used as the last packet of data of the file to be sent to the receiving end, when the receiving end receives the completion identifier, the file to be transmitted is successfully issued, and when the completion identifier is still not received within a certain time, the file to be transmitted is failed to be issued. And when the transmission fails, generating a transmission failure identifier, returning the transmission failure identifier to the transfer station, and sending a request instruction for acquiring the file to be transmitted again. When the returned issuing failure identifier is detected, the issuing failure of the file to be transmitted is indicated, and whether a request instruction for acquiring the file to be transmitted again is received or not is judged. And when the file to be transmitted is detected to be failed to be issued and a request instruction for acquiring the file to be transmitted again sent by the receiving terminal is received, the file to be transmitted is sent to the receiving terminal again based on the special network. Correspondingly, when the sending end uploads the file to be transmitted to the transfer station, uploading failure can occur, when the file uploading failure is detected, a request is sent to the sending end again, and the sending end carries out the operation of uploading the file to be transmitted again according to the secondary sending instruction. The normal transmission of the file to be transmitted is ensured through the re-request and sending mechanism.
Further, referring to fig. 3, a third embodiment of the file transmission method of the present invention is provided on the basis of the first or second embodiment of the file transmission method of the present invention, and in the third embodiment, the file transmission method further includes the steps of:
and step S50, when the preset filing time is detected, filing the stored file to be transmitted, transferring and storing the file to be transmitted carrying the identifier with high importance degree, and deleting the file to be transmitted carrying the identifier with low importance degree.
Understandably, the transfer station can store and record the file to be transmitted, but the storage capacity is limited, and as the use time increases, the situation of insufficient capacity may occur, so that the transfer station needs to be archived. The preset filing time can be set according to the capacity of the transfer station and the data volume of the transmission file. When the preset filing time is detected, filing the stored files to be transmitted, transferring important files to be transmitted to storage equipment such as a hard disk, an optical disk and the like for storage, and deleting unimportant files to be transmitted; so as to store other files to be transmitted in the following. The importance and the non-importance of the file to be transmitted can be determined by the identifiers of the importance degree. When a transmitting end transmits a file to be transmitted, an identifier with high importance degree can be added to the important file to be transmitted; and a less important identifier is added to the less important file to be transmitted. And when filing, filing operation is carried out according to the important degree identifiers carried in the file to be transmitted. And if the file to be transmitted does not carry the identifier with the high or low importance degree during filing, the file to be transmitted is defaulted as the unimportant file to be transmitted, namely the file to be transmitted is used as the file to be transmitted carrying the identifier with the low importance degree, so that the deletion operation is carried out on the file.
In addition, referring to fig. 4, the present invention provides a file transfer device, in a first embodiment of the file transfer device of the present invention, the file transfer device includes:
the receiving module 10 is configured to receive a file to be transmitted, which is sent by a sending end based on a private network, scan the file to be transmitted, and compare the file to be transmitted with a preset virus library to determine whether the file to be transmitted is a security file;
the prompt module 20 is configured to send prompt information to a receiving end when the file to be transmitted is a secure file;
when it is determined through scanning that the file to be transmitted does not carry any virus characteristic value in the preset virus library, the file to be transmitted is determined to be a secure file and can be transmitted to other financial institutions, and the prompting module 20 sends prompting information to the financial institutions needing to be transmitted, namely the receiving end, so as to prompt that the file to be transmitted to the receiving end exists. Specifically, the prompt module 20 may include the following sub-modules:
the storage submodule is used for storing the file to be transmitted and acquiring a receiving end identifier in the file to be transmitted when the file to be transmitted is a safe file;
and the sending submodule determines a receiving end according to the receiving end identifier and sends prompt information to the receiving end.
The sending module 30 is configured to, when receiving a request instruction for obtaining a file to be transmitted, which is sent by the receiving end based on the prompt information, send the file to be transmitted to the receiving end based on the private network.
In the file transmission device of this embodiment, the receiving module 10 receives a file to be transmitted sent by a sending end based on a private network, scans the file to be transmitted, compares the file to be transmitted with a preset virus library, and determines whether the file is a security file; when the file is a security file, the prompt module 20 sends prompt information for prompting the receiving end to acquire the file to be transmitted; the receiving end sends a request instruction for acquiring the file to be transmitted based on the prompt information, and the sending module 30 sends the file to be transmitted to the receiving end based on the private network according to the request instruction. According to the scheme, the transmission of the transmission file is carried out through the special network, a scanning mechanism is set for the transmission file, and the transmission file is transmitted only when the transmission file is determined to be a safe file through scanning. The special network is only used for communication between financial institutions, and other institutions cannot access the special network, so that the safety of the communication network can be ensured; the scanning mechanism can ensure the security of the transmitted files, thereby improving the communication security between financial institutions.
Further, in another embodiment of the file transmission device of the present invention, the prompt module includes:
the determining unit 21 is configured to determine whether multiple files to be transmitted, which are security files, exist, and when multiple files to be transmitted, which are security files, exist, determine whether multiple files to be transmitted, which are security files, exist files to be transmitted, which carry preset sending time identifiers;
the classifying unit 22 is configured to, when a file to be transmitted carrying a preset transmission time identifier exists in a plurality of files to be transmitted which are security files, classify the file to be transmitted carrying the preset transmission time identifier as a first class of file to be transmitted, and classify the file to be transmitted not carrying the preset transmission time identifier as a second class of file to be transmitted;
the sending unit 23 is configured to send prompt information to a receiving end corresponding to the first type of file to be transmitted according to a preset time identifier carried in the first type of file to be transmitted;
and the allocating unit 24 is configured to allocate a time identifier to the second type of file to be transmitted, and send a prompt message to a receiving end corresponding to the second type of file to be transmitted according to the allocated time identifier.
Referring to fig. 5, fig. 5 is a schematic device structure diagram of a hardware operating environment related to a method according to an embodiment of the present invention.
The file transmission device in the embodiment of the invention can be a PC, and can also be a terminal device such as a smart phone, a tablet computer, an electronic book reader, a portable computer and the like.
As shown in fig. 5, the file transfer apparatus may include: a processor 1001, such as a CPU, a memory 1005, and a communication bus 1002. The communication bus 1002 is used for realizing connection communication between the processor 1001 and the memory 1005. The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the file transfer device may further include a user interface, a network interface, a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. The user interface may comprise a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may also comprise a standard wired interface, a wireless interface. The network interface may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the file transfer device configuration shown in FIG. 5 does not constitute a limitation of file transfer devices, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.
As shown in fig. 5, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, and a file transfer program. The operating system is a program that manages and controls the hardware and software resources of the file transfer device, supporting the operation of the file transfer program as well as other software and/or programs. The network communication module is used for communication among the components in the memory 1005 and with other hardware and software in the file transfer device.
In the file transfer apparatus shown in fig. 5, the processor 1001 is configured to execute a file transfer program stored in the memory 1005, and implement the steps in each of the file transfer method embodiments described above.
The present invention also provides a computer-readable storage medium storing one or more programs, which are further executable by one or more processors for implementing the steps in the file transfer method embodiments described above.
It should also be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A file transmission method is characterized by comprising the following steps:
receiving a file to be transmitted sent by a sending end based on a special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
when the file to be transmitted is a safe file, sending prompt information to a receiving end;
when a request instruction for acquiring the file to be transmitted, which is sent by a receiving terminal based on the prompt information, is received, the file to be transmitted is issued to the receiving terminal based on a special network;
when the file to be transmitted is a safe file, the step of sending prompt information to the receiving end comprises the following steps:
judging whether a plurality of files to be transmitted which are security files exist or not, and judging whether the files to be transmitted which are the security files exist or not when the files to be transmitted which are the security files exist, wherein the files to be transmitted carry preset sending time marks;
when files to be transmitted with preset sending time marks exist in a plurality of files to be transmitted which are safe files, the files to be transmitted with the preset sending time marks are classified into a first type of files to be transmitted, and the files to be transmitted without the preset sending time marks are classified into a second type of files to be transmitted;
sending prompt information to a receiving end corresponding to the first type of file to be transmitted according to a preset time identifier carried in the first type of file to be transmitted;
and distributing time marks to the second class of files to be transmitted, and sending prompt information to a receiving end corresponding to the second class of files to be transmitted according to the distributed time marks.
2. The method for transmitting files according to claim 1, wherein the step of sending the files to be transmitted to the receiving end based on the private network comprises:
judging whether a plurality of files to be transmitted exist or not, and determining the file size of each file to be transmitted when the plurality of files to be transmitted exist;
and sequencing the files to be transmitted according to the file sizes of the files to be transmitted to generate a file sequence to be transmitted, and issuing the files to be transmitted to a receiving end based on a special network based on the sequence of the files to be transmitted.
3. The method for transmitting files according to claim 1, wherein the step of sending the files to be transmitted to the receiving end based on the private network comprises the following steps:
and when the file to be transmitted is detected to be failed to be issued and a request instruction for acquiring the file to be transmitted again sent by the receiving terminal is received, the file to be transmitted is sent to the receiving terminal based on the special network.
4. The file transmission method according to any one of claims 1 to 3, wherein the step of sending a prompt message to a receiving end when the file to be transmitted is a secure file comprises:
when the file to be transmitted is a safe file, storing the file to be transmitted, and acquiring a receiving end identifier in the file to be transmitted;
and determining a receiving end according to the receiving end identifier, and sending prompt information to the receiving end.
5. The file transfer method according to claim 4, wherein the file transfer method further comprises the steps of:
when the preset filing time is detected, the stored files to be transmitted are filed, the files to be transmitted carrying the identifiers with high importance degree are transferred and stored, and the files to be transmitted carrying the identifiers with low importance degree are deleted.
6. A file transfer apparatus, characterized by comprising:
the receiving module is used for receiving a file to be transmitted sent by the sending end based on the special network, scanning the file to be transmitted, and comparing the file to be transmitted with a preset virus library to judge whether the file to be transmitted is a safe file;
the prompting module is used for sending prompting information to a receiving end when the file to be transmitted is a safe file;
the sending module is used for sending the file to be transmitted to the receiving end based on the special network when receiving a request instruction for obtaining the file to be transmitted, which is sent by the receiving end based on the prompt information;
wherein, the suggestion module includes:
the device comprises a judging unit and a sending unit, wherein the judging unit is used for judging whether a plurality of files to be transmitted which are security files exist or not, and judging whether the files to be transmitted which are the security files exist or not carries preset sending time identification or not when the files to be transmitted which are the security files exist;
the classification unit is used for classifying the files to be transmitted carrying the preset transmission time identifier into a first class of files to be transmitted and classifying the files to be transmitted not carrying the preset transmission time identifier into a second class of files to be transmitted when the files to be transmitted carrying the preset transmission time identifier exist in the files to be transmitted which are the safety files;
the sending unit is used for sending prompt information to a receiving end corresponding to the first type of file to be transmitted according to a preset time identifier carried in the first type of file to be transmitted;
and the distribution unit is used for distributing the time identification to the second class of files to be transmitted and sending prompt information to a receiving end corresponding to the second class of files to be transmitted according to the distributed time identification.
7. A file transfer apparatus characterized by comprising: a memory, a processor, a communication bus, and a file transfer program stored on the memory;
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is configured to execute the file transfer program to implement the steps of the file transfer method according to any one of claims 1 to 5.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method according to any one of claims 1 to 5.
CN201810003442.XA 2018-01-02 2018-01-02 File transmission method, device, equipment and computer readable storage medium Active CN108200059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810003442.XA CN108200059B (en) 2018-01-02 2018-01-02 File transmission method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810003442.XA CN108200059B (en) 2018-01-02 2018-01-02 File transmission method, device, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108200059A CN108200059A (en) 2018-06-22
CN108200059B true CN108200059B (en) 2020-11-03

Family

ID=62587514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810003442.XA Active CN108200059B (en) 2018-01-02 2018-01-02 File transmission method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108200059B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109634950A (en) * 2018-10-16 2019-04-16 深圳壹账通智能科技有限公司 Service data management method, device, equipment and computer readable storage medium
CN110493211B (en) * 2019-08-12 2021-11-09 福建天晴在线互动科技有限公司 Method and device for transmitting file to network machine of special network
CN111683076A (en) * 2020-06-02 2020-09-18 中国建设银行股份有限公司 Authority management and control method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150595A (en) * 2007-11-13 2008-03-26 腾讯科技(深圳)有限公司 A real time file transmission method, system and device
CN101674318A (en) * 2008-09-11 2010-03-17 北大方正集团有限公司 Method for pushing data to mobile equipment at regular time
CN102970294A (en) * 2012-11-21 2013-03-13 网神信息技术(北京)股份有限公司 Method and device for detecting virus of security gateway
CN106934294A (en) * 2015-12-29 2017-07-07 宇龙计算机通信科技(深圳)有限公司 A kind of secure information storage method and device for LAN

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346928B1 (en) * 2000-12-01 2008-03-18 Network Appliance, Inc. Decentralized appliance virus scanning

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150595A (en) * 2007-11-13 2008-03-26 腾讯科技(深圳)有限公司 A real time file transmission method, system and device
CN101674318A (en) * 2008-09-11 2010-03-17 北大方正集团有限公司 Method for pushing data to mobile equipment at regular time
CN102970294A (en) * 2012-11-21 2013-03-13 网神信息技术(北京)股份有限公司 Method and device for detecting virus of security gateway
CN106934294A (en) * 2015-12-29 2017-07-07 宇龙计算机通信科技(深圳)有限公司 A kind of secure information storage method and device for LAN

Also Published As

Publication number Publication date
CN108200059A (en) 2018-06-22

Similar Documents

Publication Publication Date Title
CN108200059B (en) File transmission method, device, equipment and computer readable storage medium
US8576053B2 (en) Near field communication device and method for near field communication
US10216464B2 (en) Wireless communication of print content and a mobile device identifier
CN103685460A (en) Information processing apparatus, information processing system, relay apparatus and relay method
CN107079041A (en) File credit assessment
US20160241535A1 (en) Terminal authentication and registration system, method for authenticating and registering terminal, and storage medium
CN113612861B (en) Remote access method, system and computer readable storage medium
US9179034B2 (en) Information processing system and information processing method for distributing job data among plurality of first information processing devices
JP2013164836A (en) Information processing system, network system and information processing method
US9423990B2 (en) Non-transitory computer readable recording medium storing an account management program, image forming apparatus and image forming system
JP5982422B2 (en) Method for encrypting and decrypting files using telephone numbers
US11882087B2 (en) Conversion of communication destination information regarding mail-related information of mail that has been received
CN109150720B (en) Service chain message forwarding method, device, equipment and computer readable storage medium
KR20150105292A (en) Mobile sender controlled data access and data deletion method and system
US9736329B2 (en) Method that performs from scanning to storing scan data using scan job ticket
CN109451497B (en) Wireless network connection method and device, electronic equipment and storage medium
CN112395020A (en) Safety protection method of intranet, client, target server and storage medium
JP2020149159A (en) Image forming apparatus, information processing apparatus and program
JP6972417B2 (en) Mobile devices, systems, access methods, and programs
US9363290B2 (en) Access control information generating system
JP2015219854A (en) Information processor, information processing method, and program
US20220050811A1 (en) Method and apparatus for synchronizing file
US20170272602A1 (en) Information processing apparatus, image forming apparatus, information processing method and non-transitory computer readable medium
CN104899730B (en) Mobile terminal data processing method, terminal and system
JP2002236572A (en) Print system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant