CN110366181B - Data transmission method, system and computer readable storage medium - Google Patents

Data transmission method, system and computer readable storage medium Download PDF

Info

Publication number
CN110366181B
CN110366181B CN201910690716.1A CN201910690716A CN110366181B CN 110366181 B CN110366181 B CN 110366181B CN 201910690716 A CN201910690716 A CN 201910690716A CN 110366181 B CN110366181 B CN 110366181B
Authority
CN
China
Prior art keywords
data
transmitted
bad
information
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910690716.1A
Other languages
Chinese (zh)
Other versions
CN110366181A (en
Inventor
王鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201910690716.1A priority Critical patent/CN110366181B/en
Publication of CN110366181A publication Critical patent/CN110366181A/en
Application granted granted Critical
Publication of CN110366181B publication Critical patent/CN110366181B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Abstract

The invention discloses a data transmission method, a system and a computer readable storage medium, wherein the method comprises the following steps: detecting whether a 5G transmission condition is met currently; if the 5G transmission condition is met currently, the 5G transmitting end puts the data to be transmitted into the virtual isolation area; when a transmission instruction fed back by a 5G base station is received, a read-only channel between the virtual isolation area and a 5G receiving end is established through the 5G base station; the 5G receiving end performs information security verification on the data to be transmitted in the virtual isolation area based on the read-only channel; and when the information security verification is passed, transmitting the data to be transmitted to the 5G receiving end through terminal through communication. According to the invention, before the two terminals perform data transmission based on 5G communication, information security verification is performed on the data to be transmitted, and only after the information security verification is passed, the data transmission is performed based on the 5G communication, so that poor information is prevented from being transmitted between the terminals, and the information system security of the receiving terminal is ensured.

Description

Data transmission method, system and computer readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method, a data transmission system, and a computer readable storage medium.
Background
With further improvement of 5G technical standards, the 5G industry chain is mature rapidly, and the life of 5G is more and more similar to that of people. In 5G communication, data transmission between 5G terminals will not pass through the base station any more, but after the base station receives the signaling message, D2D (direct through terminal) direct transmission is performed by using channel establishment between two terminals. The transmission mode has the following defects: because the rate of 5G transmission data is very high, bad illegal information is easy to be rapidly transmitted between terminals, and when the transmitted data contains computer viruses, the safety of an information system of a receiving end is easy to be endangered.
Disclosure of Invention
The invention mainly aims to provide a data transmission method, a mobile terminal and a computer readable storage medium, and aims to solve the technical problems that in the prior art, in a 5G communication mode, a D2D (direct connection of terminals) data transmission mode is extremely easy to cause rapid propagation of bad illegal information between terminals and harm of the safety of an information system of a receiving end.
To achieve the above object, the present invention provides a data transmission method, including:
detecting whether a 5G transmission condition is met currently;
if the 5G transmission condition is met currently, the 5G transmitting end puts the data to be transmitted into the virtual isolation area;
when a transmission instruction fed back by a 5G base station is received, a read-only channel between the virtual isolation area and a 5G receiving end is established through the 5G base station;
the 5G receiving end performs information security verification on the data to be transmitted in the virtual isolation area based on the read-only channel;
and when the information security verification is passed, transmitting the data to be transmitted to the 5G receiving end through terminal through communication.
Optionally, the step of performing information security verification on the data to be transmitted in the virtual isolation area includes:
detecting whether malicious viruses exist in data to be transmitted in the virtual isolation area;
if the data to be transmitted contains malicious viruses, the information security verification fails;
and if no malicious virus exists in the data to be transmitted, the information security verification is passed.
Optionally, if no malicious virus exists in the data to be transmitted, the step of passing the information security verification includes:
if no malicious virus exists in the data to be transmitted, detecting whether bad information exists in the data to be transmitted;
and if no bad information exists in the data to be transmitted, the information security verification is passed.
Optionally, the step of detecting whether the data to be transmitted has bad information includes:
acquiring one or more sub-data included in the data to be transmitted;
detecting whether at least one piece of sub data in the one or more pieces of sub data is any one of bad text information, bad pictures and bad video files;
if at least one piece of sub data is any one of bad text information, bad picture and bad video file, the bad information exists in the data to be transmitted;
if the one or more sub data are not any one of bad text information, bad pictures and bad video files, the bad information does not exist in the data to be transmitted.
Optionally, the data transmission method further includes:
when the sub data is text information, detecting whether the text information comprises sensitive words or not;
and if the text information comprises sensitive words, determining that the sub-data is bad text information.
Optionally, the data transmission method further includes:
when the sub data is a picture, acquiring a face image in the picture;
calculating the similarity between the face image and each preset face image to obtain a plurality of similarity calculation results;
detecting whether a maximum similarity calculation result in the plurality of similarity calculation results is larger than or equal to a first preset threshold value;
and if the maximum similarity calculation result is greater than or equal to a first preset threshold value, determining that the sub-data is a bad picture.
Optionally, the data transmission method further includes:
when the sub data is a video file, acquiring a plurality of video frames from the video file;
detecting human skin color of each video frame, and determining a skin color area corresponding to each video frame;
extracting the human body contour of each video frame to obtain a human body contour area corresponding to each video frame;
calculating the duty ratio of a skin color region corresponding to each video frame in a corresponding human body contour region to obtain a plurality of proportion values;
detecting whether at least one proportion value in the plurality of proportion values is larger than or equal to a second preset threshold value;
and if at least one proportion value in the plurality of proportion values is larger than or equal to a second preset threshold value, determining that the sub-data is a bad video file.
Optionally, when the information security verification passes, the step of transmitting the data to be transmitted to the 5G receiving end through terminal through communication includes:
when the information security verification is passed, the 5G receiving end outputs prompt information;
and when the 5G receiving end receives the confirmation instruction, transmitting the data to be transmitted to the 5G receiving end through terminal direct communication.
In addition, to achieve the above object, the present invention also provides a data transmission system including: the data transmission method comprises the steps of a 5G transmitting end, a 5G receiving end, a 5G base station, a memory, a processor and a data transmission program which is stored in the memory and can run on the processor, wherein the data transmission program is executed by the processor to realize the data transmission method.
In addition, in order to achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a data transmission program which, when executed by a processor, implements the steps of the data transmission method as described above.
In the invention, whether the 5G transmission condition is met or not is detected; if the 5G transmission condition is met currently, the 5G transmitting end puts the data to be transmitted into the virtual isolation area; when a transmission instruction fed back by a 5G base station is received, a read-only channel between the virtual isolation area and a 5G receiving end is established through the 5G base station; the 5G receiving end performs information security verification on the data to be transmitted in the virtual isolation area based on the read-only channel; and when the information security verification is passed, transmitting the data to be transmitted to the 5G receiving end through terminal through communication. According to the invention, before the two terminals perform data transmission based on 5G communication, information security verification is performed on the data to be transmitted, and only after the information security verification is passed, the data transmission is performed based on the 5G communication, so that poor information is prevented from being transmitted between the terminals, and the information system security of the receiving terminal is ensured.
Drawings
FIG. 1 is a flow chart of an embodiment of a data transmission method according to the present invention;
fig. 2 is a schematic diagram of a scenario in which data transmission is performed based on terminal through communication.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a flowchart of a data transmission method according to an embodiment of the invention.
In one embodiment, a data transmission method includes:
step S10, detecting whether a 5G transmission condition is met currently;
in this embodiment, when data transmission is required between 5G terminals, it is first required to detect whether the current 5G transmission condition is satisfied. The specific modes can be as follows: and a party (a 5G sending end or a 5G receiving end) needing data transmission informs the 5G base station in a signaling mode and verifies the secret key, if the secret key is verified successfully, further judging whether the bandwidth of the currently selected 5G base station meets the 5G transmission condition, and if so, determining that the currently selected 5G transmission condition is met. If the key verification is unsuccessful or the bandwidth of the currently selected 5G base station does not meet the 5G transmission condition, selecting a new 5G base station until the transmission condition is reached. Wherein, 5G is short for fifth generation mobile communication network, 5G terminal is terminal supporting fifth generation mobile communication network, 5G base station is public mobile communication base station providing 5G network service.
Step S20, if the 5G transmission condition is met currently, the 5G transmitting end puts the data to be transmitted into a virtual isolation area;
in this embodiment, if the 5G transmission condition is currently satisfied, the 5G transmitting end virtually isolates the data to be transmitted in the disk, i.e., places the data to be transmitted in the virtual isolation area. The safety of the data in the transmission process is ensured by utilizing the local memory and disk virtual isolation technology.
Step S30, when a transmission instruction fed back by a 5G base station is received, a read-only channel between the virtual isolation area and a 5G receiving end is established through the 5G base station;
in this embodiment, when a transmission instruction fed back by the 5G base station is received, a read-only channel between the virtual isolation area of the 5G transmitting end and the 5G receiving end is established through the 5G base station. Namely, the read-only permission of the virtual isolation area of the 5G transmitting end is opened to the 5G receiving end.
Step S40, the 5G receiving end performs information security verification on the data to be transmitted in the virtual isolation area based on the read-only channel;
in this embodiment, after the read-only channel between the virtual isolation area of the 5G transmitting end and the 5G receiving end is established, the 5G receiving end may read the data to be transmitted in the virtual isolation area of the 5G transmitting end, and perform information security verification on the data to be transmitted in the virtual isolation area.
In an alternative embodiment, the step of performing information security verification on the data to be transmitted in the virtual isolation area includes:
detecting whether malicious viruses exist in data to be transmitted in the virtual isolation area; if the data to be transmitted contains malicious viruses, the information security verification fails; and if no malicious virus exists in the data to be transmitted, the information security verification is passed.
In this embodiment, whether a malicious virus exists in the data to be transmitted in the virtual isolation area may be detected by preset virus killing software. Detection of malicious viruses by antivirus software is a well established technique at present and will not be described in detail here. If no malicious virus exists in the data to be transmitted, the information security verification passes, otherwise, if the malicious virus exists in the data to be transmitted, the information security verification fails.
Further, in consideration of that some bad illegal information may exist in addition to the possible existence of malicious viruses in the data to be transmitted, further detection of the bad illegal information is required.
In an alternative embodiment of the present invention,
if no malicious virus exists in the data to be transmitted, the step of passing the information security verification comprises the following steps:
if no malicious virus exists in the data to be transmitted, detecting whether bad information exists in the data to be transmitted; and if no bad information exists in the data to be transmitted, the information security verification is passed.
In this embodiment, if no malicious virus exists in the data to be transmitted, whether bad information exists in the data to be transmitted is detected. Specifically, whether yellow/violent characters, yellow/violent pictures and/or yellow/violent text videos exist in the data to be transmitted or not can be detected. And if the bad information does not exist in the data to be transmitted, the information security verification is passed.
Further, in an embodiment, the step of detecting whether the bad information exists in the data to be transmitted includes:
acquiring one or more sub-data included in the data to be transmitted;
detecting whether at least one piece of sub data in the one or more pieces of sub data is any one of bad text information, bad pictures and bad video files;
if at least one piece of sub data is any one of bad text information, bad picture and bad video file, the bad information exists in the data to be transmitted;
if the one or more sub data are not any one of bad text information, bad pictures and bad video files, the bad information does not exist in the data to be transmitted.
In this embodiment, the data to be transmitted may include one or more sub-data, for example, the data to be transmitted includes sub-data 1, sub-data 2, and sub-data 3. After the sub data 1, the sub data 2 and the sub data 3 are acquired, the data type of each sub data is determined according to the file name suffix of each sub data. For example, if the sub data 1 is determined to be text information according to the file name suffix of the sub data 1, detecting whether the sub data 1 is bad text information; determining that the sub data 2 is a picture according to the file name suffix of the sub data 2, and detecting whether the sub data 2 is a bad picture; and detecting whether the sub data 3 is a bad video file or not according to the file name suffix of the sub data 3.
If the sub data 1 is bad text information and/or the sub data 2 is a bad picture and/or the sub data 3 is a bad video file, determining that bad information exists in the data to be transmitted. If the sub data 1 is not the bad text information, the sub data 2 is not the bad picture and the sub data 3 is not the bad video file, determining that the bad information does not exist in the data to be transmitted.
And S50, transmitting the data to be transmitted to the 5G receiving end through terminal through communication when the information security verification passes.
In this embodiment, when the information security verification passes, data transmission can be performed, that is, the data to be transmitted is transmitted to the 5G receiving end through the direct communication of the terminal. Wherein the terminal is directly connected, namely the Device-to-Device. D2D communication technology refers to a communication manner in which two peer user nodes communicate directly. As shown in fig. 2, fig. 2 is a schematic diagram of a scenario in which data transmission is performed based on terminal through communication. The base station discovers the D2D communication equipment (a 5G transmitting end and a 5G receiving end), establishes logic connection, then controls the resource allocation of the D2D equipment, and performs resource scheduling and interference management. And the 5G sending end and the 5G receiving end are communicated through a terminal to carry out data transmission.
In a decentralized network of D2D communication subscribers, each subscriber node is capable of transmitting and receiving signals and has the function of automatic routing (forwarding messages). The participants of the network share some of the hardware resources they own, including information processing, storage, and network connection capabilities. These shared resources provide services and resources to the network that can be accessed directly by other users without going through intermediate entities. In a D2D communication network, user nodes act as both servers and clients, and users are aware of each other's presence, forming a virtual or actual community, self-organised.
In this embodiment, whether a 5G transmission condition is currently satisfied is detected; if the 5G transmission condition is met currently, the 5G transmitting end puts the data to be transmitted into the virtual isolation area; when a transmission instruction fed back by a 5G base station is received, a read-only channel between the virtual isolation area and a 5G receiving end is established through the 5G base station; the 5G receiving end performs information security verification on the data to be transmitted in the virtual isolation area based on the read-only channel; and when the information security verification is passed, transmitting the data to be transmitted to the 5G receiving end through terminal through communication. According to the embodiment, before data transmission is carried out by the two terminals based on 5G communication, information security verification is carried out on the data to be transmitted, and data transmission is carried out based on the 5G communication only after the information security verification is passed, so that poor information is prevented from being transmitted between the terminals, and the information system security of the receiving terminal is ensured.
Further, in an embodiment of the data transmission method of the present invention, the data transmission method further includes:
when the sub data is text information, detecting whether the text information comprises sensitive words or not;
and if the text information comprises sensitive words, determining that the sub-data is bad text information.
In this embodiment, when the sub data is text information, whether the text information includes sensitive words is detected, wherein the sensitive words are words commonly found in yellow/riot content, and the sensitive words are specifically selected and set according to actual needs. In this embodiment, word segmentation is performed on the text information to obtain a plurality of words, and then whether preset sensitive words exist in the plurality of words is detected, if so, the text information is described to include the sensitive words, and the sub-data is determined to be bad text information.
Further, in an embodiment of the data transmission method of the present invention, the data transmission method further includes:
when the sub data is a picture, acquiring a face image in the picture;
in this embodiment, when the sub data is a picture, based on a face recognition technology, whether a face exists in the picture (for example, whether a face image exists in the picture is detected through OpenCV or whether a face image exists in the picture is detected through a neural network model) is recognized, and when the face exists in the picture, the face image in the picture is extracted.
Calculating the similarity between the face image and each preset face image to obtain a plurality of similarity calculation results;
in this embodiment, the preset face image is a face frequently appearing in yellow/riot content. For example, the preset face images include face image 1 to face image 100. And face feature extraction is performed on the face images 1 to 100 in advance, and the face features 1 to 100 obtained by extraction are stored. When the similarity between the face image and each preset face image is calculated, firstly extracting the face features of the face image, then respectively calculating the Euclidean distances from the face features 1 to 100, and taking the 100 Euclidean distances obtained by calculation as the similarity calculation result between the face image and each preset face image; or respectively calculating cosine distances from the face features to the face features 1 to 100, and taking the 100 cosine distances obtained by calculation as a similarity calculation result of the face image and each preset face image; or firstly, respectively calculating the Euclidean distance between the face feature and the face feature 1 to the face feature 100, respectively calculating the cosine distance between the face feature and the face feature 1 to the face feature 100, and taking the average value of the Euclidean distance between the face feature and the face feature 1 and the cosine distance as the similarity calculation result of the face feature and the face image 1; the average value of the euclidean distance and the cosine distance between the face feature and the face feature 2 is taken as the similarity calculation result … … of the face feature and the face image 2, and so on.
Detecting whether a maximum similarity calculation result in the plurality of similarity calculation results is larger than or equal to a first preset threshold value; and if the maximum similarity calculation result is greater than or equal to a first preset threshold value, determining that the sub-data is a bad picture.
In this embodiment, the first preset threshold is set according to actual needs, for example, set to 90%. Firstly searching a maximum similarity calculation result in a plurality of similarity calculation results, then comparing the maximum similarity calculation result with a first preset threshold value, and if the maximum similarity calculation result is larger than or equal to the first preset threshold value, indicating a face in the current picture, namely a preset face for which the maximum similarity calculation result is specific, so that the sub-data is determined to be a bad picture.
Further, in an embodiment of the data transmission method of the present invention, the data transmission method further includes:
when the sub data is a video file, acquiring a plurality of video frames from the video file;
in this embodiment, when the sub data is a video file, since the video file is composed of video frames, a plurality of video frames are acquired from the video file, for example, video frames at 15 video time points are acquired randomly, that is, 15 video frames are acquired.
Detecting human skin color of each video frame, and determining a skin color area corresponding to each video frame;
in this embodiment, skin color detection mainly detects skin color regions in an image according to distribution characteristics of skin colors in a color space, and since YCbCr space can separate luminance and chromaticity, cgCr chromaticity is less affected by luminance variation and is two-dimensionally and independently distributed, each video frame is converted into YCbCr color space. And traversing each pixel in each video frame using the expression (Cb >77And Cb < 127) And (Cr >133And Cr < 173), the determined skin color belonging to the expression range, thereby determining the skin color region for each video.
Extracting the human body contour of each video frame to obtain a human body contour area corresponding to each video frame;
in this embodiment, human body contour extraction can be performed on each video frame by using a human body contour extraction algorithm, so as to obtain a human body contour region corresponding to each video frame. The human body contour extraction of each video frame by the human body contour extraction algorithm is a mature technology at present, and is not described herein.
Calculating the duty ratio of a skin color region corresponding to each video frame in a corresponding human body contour region to obtain a plurality of proportion values;
in this embodiment, taking the video frame 1 as an example, if the skin color area corresponding to the video frame 1 includes X pixels, the human contour area corresponding to the video frame 1 includes Y pixels, the duty ratio of the skin color area corresponding to the video frame 1 in the corresponding human contour area is calculated, that is, the ratio value corresponding to the video frame 1 is calculated. The corresponding proportion value of each video frame can be obtained in the same way.
Detecting whether at least one proportion value in the plurality of proportion values is larger than or equal to a second preset threshold value; and if at least one proportion value in the plurality of proportion values is larger than or equal to a second preset threshold value, determining that the sub-data is a bad video file.
In this embodiment, if at least one proportion value in the plurality of proportions is greater than or equal to a second preset threshold (the second preset threshold is set according to actual needs), it is indicated that the exposed skin area of the human body in at least one video frame is larger, and therefore, the sub-data is determined to be a bad video file.
Further, in an embodiment of the data transmission method of the present invention, step S50 includes:
when the information security verification is passed, the 5G receiving end outputs prompt information;
and when the 5G receiving end receives the confirmation instruction, transmitting the data to be transmitted to the 5G receiving end through terminal direct communication.
In this embodiment, when the information security verification passes, the 5G receiving end outputs a prompt message for prompting the security of the information to be transmitted currently by the user of the 5G receiving end. When a user of the 5G receiving end is willing to receive data to be transmitted of the 5G sending end, relevant operation is carried out, a confirmation instruction is triggered, and when the 5G receiving end receives the confirmation instruction, the data to be transmitted from the 5G sending end is received through terminal direct communication, namely the data to be transmitted is transmitted to the 5G receiving end.
In this embodiment, based on information security detection, the user needs to rely on his own will to perform data transmission, so as to improve the control force of the user on data transmission.
In addition, the invention also provides a data transmission system, which comprises: the data transmission method comprises the steps of a 5G sending end, a 5G receiving end, a 5G base station, a memory, a processor and a data transmission program which is stored in the memory and can run on the processor, wherein the steps of the data transmission method are realized when the data transmission program is executed by the processor.
The specific embodiments of the data transmission system of the present invention are substantially the same as the embodiments of the data transmission method described above, and will not be described herein.
In addition, the embodiment of the invention also provides a computer readable storage medium, wherein the computer readable storage medium stores a data transmission program, and the data transmission program realizes the steps of each embodiment of the data transmission method when being executed by the processor.
The specific embodiments of the computer readable storage medium of the present invention are substantially the same as the embodiments of the data transmission method described above, and will not be described herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (8)

1. A data transmission method, the data transmission method comprising:
detecting whether a 5G transmission condition is met currently;
if the 5G transmission condition is met currently, the 5G transmitting end puts the data to be transmitted into a virtual isolation area, wherein the 5G transmitting end puts the data to be transmitted into the virtual isolation area specifically means that the 5G transmitting end virtually isolates the data to be transmitted in a magnetic disk;
when a transmission instruction fed back by a 5G base station is received, a read-only channel between the virtual isolation area and a 5G receiving end is established through the 5G base station, wherein the 5G transmitting end and the 5G receiving end specifically refer to a 5G transmitting end and a 5G receiving end which need to carry out data transmission, and the 5G base station specifically refers to a currently selected 5G base station;
the 5G receiving end detects whether malicious viruses exist in data to be transmitted in the virtual isolation area or not based on the read-only channel; if the data to be transmitted contains malicious viruses, the information security verification fails; if no malicious virus exists in the data to be transmitted, detecting whether bad information exists in the data to be transmitted; if no bad information exists in the data to be transmitted, the information security verification is passed, and the bad information refers to yellow/explosion-related information;
when the information security verification is passed, the data to be transmitted is transmitted to the 5G receiving end through terminal through communication;
the step of detecting whether the 5G transmission condition is currently satisfied includes:
the 5G sending end or the 5G receiving end informs the 5G base station in a signaling mode and verifies the secret key, if the secret key verification is successful, whether the bandwidth of the 5G base station meets the 5G transmission condition is judged, and if the bandwidth of the 5G base station meets the 5G transmission condition, the current condition is determined to be met.
2. The data transmission method as claimed in claim 1, wherein the step of detecting whether there is bad information in the data to be transmitted comprises:
acquiring one or more sub-data included in the data to be transmitted;
detecting whether at least one piece of sub data in the one or more pieces of sub data is any one of bad text information, bad pictures and bad video files;
if at least one piece of sub data is any one of bad text information, bad picture and bad video file, the bad information exists in the data to be transmitted;
if the one or more sub data are not any one of bad text information, bad pictures and bad video files, the bad information does not exist in the data to be transmitted.
3. The data transmission method according to claim 2, wherein the data transmission method further comprises:
when the sub data is text information, detecting whether the text information comprises sensitive words or not;
and if the text information comprises sensitive words, determining that the sub-data is bad text information.
4. The data transmission method according to claim 2, wherein the data transmission method further comprises:
when the sub data is a picture, acquiring a face image in the picture;
calculating the similarity between the face image and each preset face image to obtain a plurality of similarity calculation results;
detecting whether a maximum similarity calculation result in the plurality of similarity calculation results is larger than or equal to a first preset threshold value;
and if the maximum similarity calculation result is greater than or equal to a first preset threshold value, determining that the sub-data is a bad picture.
5. The data transmission method according to claim 2, wherein the data transmission method further comprises:
when the sub data is a video file, acquiring a plurality of video frames from the video file;
detecting human skin color of each video frame, and determining a skin color area corresponding to each video frame;
extracting the human body contour of each video frame to obtain a human body contour area corresponding to each video frame;
calculating the duty ratio of a skin color region corresponding to each video frame in a corresponding human body contour region to obtain a plurality of proportion values;
detecting whether at least one proportion value in the plurality of proportion values is larger than or equal to a second preset threshold value;
and if at least one proportion value in the plurality of proportion values is larger than or equal to a second preset threshold value, determining that the sub-data is a bad video file.
6. The data transmission method as claimed in claim 1, wherein the step of transmitting the data to be transmitted to the 5G receiving end through terminal through communication when the information security verification is passed comprises:
when the information security verification is passed, the 5G receiving end outputs prompt information;
when the 5G receiving end receives a confirmation instruction, the data to be transmitted is transmitted to the 5G receiving end through direct communication of the terminal, wherein the prompt information specifically refers to safe prompt information for prompting the user of the 5G receiving end to currently transmit information, and the confirmation instruction specifically refers to a confirmation instruction triggered when the user of the 5G receiving end is willing to receive the data to be transmitted of the 5G transmitting end.
7. A data transmission system, the data transmission system comprising: a 5G transmitting end, a 5G receiving end, a 5G base station, a memory, a processor and a data transmission program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the data transmission method according to any one of claims 1 to 6.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a data transmission program which, when executed by a processor, implements the steps of the data transmission method according to any one of claims 1 to 6.
CN201910690716.1A 2019-07-29 2019-07-29 Data transmission method, system and computer readable storage medium Active CN110366181B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910690716.1A CN110366181B (en) 2019-07-29 2019-07-29 Data transmission method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910690716.1A CN110366181B (en) 2019-07-29 2019-07-29 Data transmission method, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110366181A CN110366181A (en) 2019-10-22
CN110366181B true CN110366181B (en) 2024-02-13

Family

ID=68222711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910690716.1A Active CN110366181B (en) 2019-07-29 2019-07-29 Data transmission method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110366181B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112512023A (en) * 2020-12-04 2021-03-16 中国联合网络通信集团有限公司 Communication method, device and system
CN113163153A (en) * 2021-04-06 2021-07-23 游密科技(深圳)有限公司 Method, device, medium and electronic equipment for processing violation information in video conference
CN113992384B (en) * 2021-10-22 2023-10-20 延安大学 Secret communication method based on fractional Fourier transform order multiplexing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297961A (en) * 2012-03-05 2013-09-11 上海贝尔股份有限公司 Device and system used for device-to-device secure communication
CN106664664A (en) * 2014-05-09 2017-05-10 三星电子株式会社 Method and apparatus for performing communication by d2d communication terminal
CN107113594A (en) * 2015-01-16 2017-08-29 三星电子株式会社 The safety of device-to-device communication system sends and receives the method for finding message
CN108028961A (en) * 2015-09-07 2018-05-11 三星电子株式会社 The method and apparatus that data are sent and received in communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10063371B2 (en) * 2014-10-30 2018-08-28 Samsung Electronics Co., Ltd. Method of performing device to device communication between user equipments

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297961A (en) * 2012-03-05 2013-09-11 上海贝尔股份有限公司 Device and system used for device-to-device secure communication
CN106664664A (en) * 2014-05-09 2017-05-10 三星电子株式会社 Method and apparatus for performing communication by d2d communication terminal
CN107113594A (en) * 2015-01-16 2017-08-29 三星电子株式会社 The safety of device-to-device communication system sends and receives the method for finding message
CN108028961A (en) * 2015-09-07 2018-05-11 三星电子株式会社 The method and apparatus that data are sent and received in communication system

Also Published As

Publication number Publication date
CN110366181A (en) 2019-10-22

Similar Documents

Publication Publication Date Title
CN110366181B (en) Data transmission method, system and computer readable storage medium
CN108810900B (en) Detection of fraudulent call information
US9705913B2 (en) Wireless hotspot attack detection
US20150271741A1 (en) Device Association Method, Apparatus, and System
CN105379190A (en) System and method for indicating service set identifier
US20180367535A1 (en) Method And Apparatus For Preventing Nuisance Call
US11871223B2 (en) Authentication method and apparatus and device
US10716043B2 (en) Access point handover method and device
US10306058B2 (en) Methods, telecommunication switches and computer programs for processing call setup signalling
CN112203336A (en) Wireless access control method, device and system
CN112417497B (en) Privacy protection method, device, electronic equipment and storage medium
CN111381962A (en) Edge service migration method and device
CN105721511A (en) Identity verifying method of mobile terminal
EP3043581B1 (en) Proximity map request method, server and network entity using the same, proximity request validating method, and server and network entity using the same
CN109040050B (en) Data interaction method and related product
CN112399420A (en) Anti-harassment method and system, computer storage medium
CN104202462B (en) Communication control method and system
CN109428870B (en) Network attack processing method, device and system based on Internet of things
Khasanova Detection of attacks on Wi-Fi access points
CN107566325A (en) Access the method and device of network
CN113038467B (en) Event information reporting method and communication device
CN113316152A (en) DoS attack detection method and defense method for terminal in LTE system
CN114095929B (en) Account security enhancement method in B-trunk system
CN108449517B (en) Call method and device based on one-number multi-card service
CN102263927A (en) Visual communication processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant