CN110768990A - Data transmission method, system, equipment and computer readable storage medium - Google Patents

Data transmission method, system, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110768990A
CN110768990A CN201911039329.8A CN201911039329A CN110768990A CN 110768990 A CN110768990 A CN 110768990A CN 201911039329 A CN201911039329 A CN 201911039329A CN 110768990 A CN110768990 A CN 110768990A
Authority
CN
China
Prior art keywords
data
security level
terminal
encrypted data
receiving terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911039329.8A
Other languages
Chinese (zh)
Inventor
杨峰
姜正文
叶升路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN201911039329.8A priority Critical patent/CN110768990A/en
Publication of CN110768990A publication Critical patent/CN110768990A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a data transmission method, a system, equipment and a computer readable storage medium, which are used for acquiring target data when being applied to a sending terminal; if the target data needs to be transmitted out of the sending terminal, the target data is automatically encrypted to obtain encrypted data; the encrypted data is transmitted to the receiving terminal. According to the data transmission method, when the target data needs to be transmitted out of the transmitting terminal, the transmitting terminal automatically encrypts the target data and transmits the encrypted data to the receiving terminal, so that the data transmitted by the transmitting terminal are all encrypted data, the external cannot acquire the original target data, and the safety of the target data is protected; in addition, the supervision on the data on the sending terminal can be reduced under the condition of ensuring the data safety, and the data on the sending terminal can be protected quickly. The data transmission system, the data transmission equipment and the computer readable storage medium solve the corresponding technical problems.

Description

Data transmission method, system, equipment and computer readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data transmission method, system, device, and computer-readable storage medium.
Background
At present, due to uncontrollable environment of the terminal, data on the terminal is easy to be leaked or lost, for example, data security of the terminal is poor due to data leakage caused by external copy, stolen and leaked hard disks, access and leaked through the internet, leaked through internal mailboxes of enterprises, leaked through intranet communication software, data loss caused by hard disk faults, data loss caused by virus infection and the like.
In order to improve data security of a terminal, an existing method manages and controls all data sources, taking files as examples, such as real-time file encryption and decryption, global file monitoring, application layer process Hook (Hook), monitoring file editing process behavior, clipboard monitoring, and the like.
However, in the existing method for managing and controlling all data sources, monitoring points are scattered, a large amount of performance is consumed, and instability may be caused to the system due to compatibility problems with other software, for example, the system security is affected due to incompatibility with antivirus software, files are damaged, and the like.
In summary, how to rapidly improve the security of data on a terminal is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide a data transmission method which can solve the technical problem of how to rapidly improve the security of data on a terminal to a certain extent. The application also provides a data transmission system, a device and a computer readable storage medium.
In order to achieve the above purpose, the present application provides the following technical solutions:
a data transmission method is applied to a sending terminal and comprises the following steps:
acquiring target data;
if the target data needs to be transmitted out of the sending terminal, the target data is automatically encrypted to obtain encrypted data;
and transmitting the encrypted data to a receiving terminal.
Preferably, the automatically encrypting the target data to obtain encrypted data includes:
automatically encrypting the target data through communication software remotely issued by a server to obtain the encrypted data;
the transmitting the encrypted data to a receiving terminal includes:
transmitting the encrypted data to the server through the communication software so that the server transmits the encrypted data to the receiving terminal through the communication software.
Preferably, after transmitting the encrypted data to the server, the method further includes:
and transmitting the first security level of the sending terminal to the server so that the receiving terminal acquires the first security level from the server.
A data transmission method applied to the receiving terminal as described above, comprising:
if the encrypted data needs to be transmitted into the receiving terminal, acquiring a first security level of a transmitting terminal which transmits the encrypted data;
automatically processing the encrypted data based on the first security level and the second security level of the receiving terminal to obtain processed data;
and transmitting the processing data into the receiving terminal.
Preferably, the automatically processing the encrypted data based on the first security level and the second security level of the receiving terminal includes:
automatically processing the encrypted data based on the first security level and the second security level through communication software remotely issued by a server;
the transmitting the processed data into the receiving terminal includes:
and transmitting the processing data into the receiving terminal through the communication software.
Preferably, the automatically processing the encrypted data based on the first security level and the second security level includes:
and judging whether the first security level is higher than the second security level, if so, directly taking the encrypted data as the processing data.
Preferably, the automatically processing the encrypted data based on the first security level and the second security level includes:
and judging whether the first security level is equal to the second security level, if so, automatically decrypting the encrypted data to obtain target data, and taking the target data as the processing data.
Preferably, the automatically processing the encrypted data based on the first security level and the second security level includes:
and judging whether the first security level is lower than the second security level, if so, automatically decrypting the encrypted data to obtain target data, and taking the target data as the processing data.
A data transmission method is applied to a server and comprises the following steps:
the communication software is released to a sending terminal and a receiving terminal in a remote release mode;
receiving the encrypted data transmitted by the sending terminal through the communication software;
and transmitting the encrypted data to the receiving terminal through the communication software.
A data transmission system applied to a transmission terminal, comprising:
the first acquisition module is used for acquiring target data;
the first encryption module is used for automatically encrypting the target data to obtain encrypted data when the target data needs to be transmitted out of the sending terminal;
and the first transmission module is used for transmitting the encrypted data to a receiving terminal.
A data transmission system applied to a receiving terminal, comprising:
the second acquisition module is used for acquiring a first security level of a sending terminal sending the encrypted data when the encrypted data needs to be transmitted into the receiving terminal;
the first processing module is used for automatically processing the encrypted data based on the first security level and the second security level of the receiving terminal to obtain processed data;
and the second transmission module is used for transmitting the processing data into the receiving terminal.
A data transmission system applied to a server comprises:
the first issuing module is used for issuing the communication software to the sending terminal and the receiving terminal in a remote issuing mode;
the first receiving module is used for receiving the encrypted data transmitted by the sending terminal through the communication software;
and the third transmission module is used for transmitting the encrypted data to the receiving terminal through the communication software.
A data transmission device comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data transmission method as described above when executing the computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the data transmission method as set forth in any one of the preceding claims.
The data transmission method is applied to a sending terminal and used for obtaining target data; if the target data needs to be transmitted out of the sending terminal, the target data is automatically encrypted to obtain encrypted data; the encrypted data is transmitted to the receiving terminal. According to the data transmission method, when the target data needs to be transmitted out of the transmitting terminal, the transmitting terminal automatically encrypts the target data and transmits the encrypted data to the receiving terminal, so that the data transmitted by the transmitting terminal are all encrypted data, the external cannot acquire the original target data, and the safety of the target data is protected; in addition, because the data transmitted out of the sending terminal are all encrypted data, the internal data of the sending terminal do not need to be encrypted, supervised and the like, the supervision on the data on the sending terminal can be reduced under the condition of ensuring the data safety, and the data on the sending terminal can be protected quickly. The data transmission system, the data transmission equipment and the computer readable storage medium solve the corresponding technical problems.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a first flowchart of a data transmission method according to an embodiment of the present application;
fig. 2 is a second flowchart of a data transmission method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a prior art data transmission method;
FIG. 4 is a diagram of a system architecture of a prior art data transmission method;
FIG. 5 is a schematic diagram of a data transfer method of the present application;
FIG. 6 is a system architecture diagram of the data transmission method of the present application;
fig. 7 is a schematic structural diagram of a data transmission system according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a data transmission device according to an embodiment of the present application;
fig. 9 is another schematic structural diagram of a data transmission device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a first flowchart of a data transmission method according to an embodiment of the present application.
The data transmission method provided by the embodiment of the application can comprise the following steps:
step S101: the sending terminal acquires target data.
In practical application, the target data acquired by the sending terminal may be determined according to actual needs, for example, the data to be transmitted selected by the user in the sending terminal may be used as the target data. The type of the target data can also be determined according to actual needs, for example, the target data can be video, audio, pictures, and the like.
Step S102: and if the target data needs to be transmitted out of the sending terminal, the sending terminal automatically encrypts the target data to obtain encrypted data.
In practical application, when the target data needs to be transmitted out of the transmitting terminal, the transmitting terminal can automatically encrypt the target data to obtain encrypted data, so that the data transmitted out of the transmitting terminal are all encrypted data, the target data are difficult to obtain by the outside, and the safety of the target data is protected; it is understood that when the target data is lost or leaked secret, the target data is required to be transmitted out of the sending terminal, and the sending terminal still encrypts the target data at the moment, so that the lost or leaked secret is only encrypted data but not the target data, and the leakage or loss of the target data is avoided.
It should be noted that the manner in which the sending terminal encrypts the target data may be determined according to actual needs, and is not described herein again; in addition, in a specific application scenario, in order to facilitate management of a data transmission process by the outside, an option whether to enable automatic encryption may be set in the sending terminal, so that the outside can control whether to encrypt target data or not when the sending terminal needs to transmit data out of the sending terminal itself through the option.
Step S103: the transmitting terminal transmits the encrypted data to the receiving terminal.
Step S104: if the encrypted data needs to be transmitted into the receiving terminal, the receiving terminal acquires a first security level of a transmitting terminal that transmits the encrypted data.
Step S105: and the receiving terminal automatically processes the encrypted data based on the first security level and the second security level of the receiving terminal to obtain processed data.
Step S106: the receiving terminal transmits the processed data into itself.
In practical application, the sending terminal transmits the encrypted data to the receiving terminal, and when the receiving terminal needs to transmit the encrypted data into itself, the first security level of the sending terminal can be obtained, and the encrypted data is automatically processed based on the first security level and the second security level of itself, and the processed data is transmitted into itself. It should be noted that, the sending terminal automatically encrypts data when transmitting data, and the receiving terminal automatically processes data when transmitting data, so that the sending terminal and the receiving terminal can automatically complete data protection without affecting user experience.
In a specific application scenario, when encrypted data is transmitted by a sending terminal, the first security level of the sending terminal can be transmitted to a receiving terminal together, so that the receiving terminal can directly obtain the first security level; in addition, the first security level of the sending terminal may also be set in the receiving terminal in advance, so that the receiving terminal may directly search for the first security level of the sending terminal and the like in itself.
It should be noted that the types of the sending terminal and the receiving terminal may be determined according to actual needs, for example, the sending terminal and the receiving terminal may be cloud terminals, tablets, mobile phones, notebook computers, PC hosts, and the like.
The data transmission method is applied to a sending terminal and used for obtaining target data; if the target data needs to be transmitted out of the sending terminal, the target data is automatically encrypted to obtain encrypted data; the encrypted data is transmitted to the receiving terminal. According to the data transmission method, when the target data needs to be transmitted out of the transmitting terminal, the transmitting terminal automatically encrypts the target data and transmits the encrypted data to the receiving terminal, so that the data transmitted by the transmitting terminal are all encrypted data, the external cannot acquire the original target data, and the safety of the target data is protected; in addition, because the data transmitted out of the sending terminal are all encrypted data, the internal data of the sending terminal do not need to be encrypted, supervised and the like, the supervision on the data on the sending terminal can be reduced under the condition of ensuring the data safety, and the data on the sending terminal can be protected quickly.
Referring to fig. 2, fig. 2 is a second flowchart of a data transmission method according to an embodiment of the present application.
The data transmission method provided by the embodiment of the application can comprise the following steps:
step S201: and the server distributes the communication software to the sending terminal and the receiving terminal in a remote distribution mode.
In practical application, on the basis of managing data of a weakened terminal, in order to strengthen the management and control of data transmitted by the terminal and to realize automatic encryption and automatic processing of the data by the terminal, a principle of remote release application may be adopted to perform unified management and control on a communication mode between a sending terminal and a receiving terminal, that is, to perform unified management and control on channels through which data are transmitted by the terminal. Specifically, the server may be used to remotely release the communication software for the sending terminal and the receiving terminal, so that the sending terminal and the receiving terminal apply the communication software released by the server in a remote calling manner, and thus, the server may define a manner in which the sending terminal automatically encrypts data and the receiving terminal automatically processes data through the communication software, and bring the sending terminal and the receiving terminal under the management of the server. In addition, because the communication software applied by the sending terminal and the receiving terminal is remotely issued by the server, the data transmitted by the sending terminal and the receiving terminal need to pass through the server, namely, by means of the technology of remotely issuing the communication software by the server, the data channels of the sending terminal and the receiving terminal can be brought under the server, and the data safety protection of the sending terminal and the receiving terminal on the level of the data channel through the server is realized; in addition, the unified management of the sending terminal and the receiving terminal can be realized only by the server, and the complexity and the difficulty in protecting the data security of the terminal are reduced.
It should be noted that the type of the communication software may be determined according to actual needs, for example, it may be Notes and other mail software, RTX and other IM communication software, and the like. In addition, in order to reduce the influence of the communication software on other applications of the transmitting terminal and the receiving terminal, the transmitting terminal and the receiving terminal may deploy the communication software on themselves in an Application Virtualization (Application Virtualization) manner.
Step S202: the sending terminal acquires target data.
Step S203: and if the target data needs to be transmitted out of the sending terminal, the sending terminal automatically encrypts the target data based on the communication software to obtain encrypted data.
In practical application, the mode that the sending terminal automatically encrypts the target data can be built in the communication software, so that the server can conveniently manage and control the encryption mode of the sending terminal through the communication software.
Step S204: the transmitting terminal transmits the encrypted data to the server based on the communication software.
Step S205: the server transmits the encrypted data to the receiving terminal based on the communication software.
Step S206: if the encrypted data needs to be transmitted into the receiving terminal, the receiving terminal acquires the first security level of the transmitting terminal from the server based on the communication software.
In practical application, the first security level of the sending terminal may be pre-stored in the server, or the sending terminal may send the first security level to the server based on the communication software, so that the receiving terminal can quickly obtain the first security level from the server only based on the communication software.
Step S207: and the receiving terminal automatically processes the encrypted data based on the first security level and the second security level of the receiving terminal in a communication mode to obtain processed data.
Step S208: the receiving terminal transmits the processed data into itself through the communication software.
In a specific application scenario, when the receiving terminal automatically processes the encrypted data based on the first security level and the second security level, whether the first security level is higher than the second security level can be judged, and if yes, the encrypted data is directly used as processing data; whether the first security level is equal to the second security level or not can be judged, if yes, the encrypted data are automatically decrypted to obtain target data, and the target data are used as processing data; and whether the first security level is lower than the second security level or not can be judged, if yes, the encrypted data are automatically decrypted to obtain target data, and the target data are used as processing data.
For ease of understanding, the data transmission method provided in the present application is now described with reference to the system architecture and fig. 3 to 6. Fig. 3 is a schematic diagram of a conventional data transmission method, and fig. 4 is a system architecture diagram of the conventional data transmission method; fig. 5 is a schematic diagram of a data transmission method of the present application, and fig. 6 is a system architecture diagram of the data transmission method of the present application. In fig. 3 to 6, the high-density region indicates a terminal with a high security level, and the low-density region indicates a terminal with a low security level. In fig. 3, the conventional data transmission method does not manage the data transmission channel between the high-density region and the low-density region. In the system architecture diagram shown in fig. 4, the high-density area and the low-density area are isolated by a network and a core switch to ensure the safe transmission of data; the wireless terminal is connected with the core switch through the AR + access device; the central data center performs information interaction with the high-density region and the low-density region through the core switch, and data safety needs to be ensured through a data center safety boundary; the internet data needs to exchange information with the core switch through an internet security boundary. In fig. 5, the data transmission method provided by the present application focuses on the data exchange channel between the high-density area and the low-density area. In fig. 6, the high-density region is connected to the low-density region through the application distribution server and the intranet data center; the Internet data is also connected with the high-density region or the intranet data center through the application release server; the access area is directly connected with the high-density area, and the high-density area can directly provide a physical machine such as a desktop computer and the like for the access area to use or provide a virtual machine for the access area to use.
As can be seen from fig. 3 and 4, in the conventional data transmission method, both file operation and user behavior in the terminal are considered to be untrustworthy, so that a large number of security measures, such as real-time file encryption and decryption, global file monitoring, and the like, need to be applied to the interior of the terminal, which causes additional burden and a series of problems to the terminal. It can be known from fig. 5 and fig. 6 that, in the data transmission method provided in the present application, all behaviors occurring inside the terminal are considered to be trusted, and only the process of leaving the terminal or entering the terminal by data needs to be safely controlled, so that the data leaving the terminal or entering the terminal is safe, and the data inside the terminal does not need to be safely controlled, the control process is convenient and strong, on the basis, in order to improve the control efficiency, a data channel can be further set on the terminal, and the data on the terminal is quickly controlled by controlling the data channel.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a data transmission system according to an embodiment of the present application.
The data transmission system provided in the embodiment of the present application is applied to a sending terminal, and may include:
a first obtaining module 101, configured to obtain target data;
the first encryption module 102 is configured to automatically encrypt target data to obtain encrypted data when the target data needs to be transmitted out of a sending terminal;
a first transmission module 103, configured to transmit the encrypted data to the receiving terminal.
The data transmission system is applied to a sending terminal, and a first acquisition module acquires target data; the first encryption module automatically encrypts the target data to obtain encrypted data when the target data needs to be transmitted out of the sending terminal; the first transmission module transmits the encrypted data to the receiving terminal. According to the data transmission system, when the target data needs to be transmitted out of the transmitting terminal, the transmitting terminal automatically encrypts the target data and transmits the encrypted data to the receiving terminal, so that the data transmitted by the transmitting terminal are all encrypted data, the external cannot acquire the original target data, and the safety of the target data is protected; in addition, because the data transmitted out of the sending terminal are all encrypted data, the internal data of the sending terminal do not need to be encrypted, supervised and the like, the supervision on the data on the sending terminal can be reduced under the condition of ensuring the data safety, and the data on the sending terminal can be protected quickly.
The data transmission system provided in the embodiment of the present application is applied to a sending terminal, and the first encryption module may include:
the first encryption unit is used for automatically encrypting the target data through communication software remotely issued by the server to obtain encrypted data;
the first transmission module may include:
and the first transmission unit is used for transmitting the encrypted data to the server through the communication software so that the server transmits the encrypted data to the receiving terminal through the communication software.
The data transmission system provided in the embodiment of the present application is applied to a sending terminal, and may further include:
and the fourth transmission module is used for transmitting the first security level of the sending terminal to the server after the first transmission module transmits the encrypted data to the server so that the receiving terminal acquires the first security level from the server.
The data transmission system provided in the embodiment of the present application is applied to a receiving terminal, and may include:
the second acquisition module is used for acquiring the first security level of the sending terminal sending the encrypted data when the encrypted data needs to be transmitted into the receiving terminal;
the first processing module is used for automatically processing the encrypted data based on the first security level and the second security level of the receiving terminal to obtain processed data;
and the second transmission module is used for transmitting the processing data into the receiving terminal.
The data transmission system provided in the embodiment of the present application is applied to a receiving terminal, and the first processing module may include:
the first processing unit is used for automatically processing the encrypted data based on the first security level and the second security level through communication software remotely issued by the server;
the second transmission module may include:
and the second transmission unit is used for transmitting the processing data into the receiving terminal through the communication software.
The data transmission system provided in the embodiment of the present application is applied to a receiving terminal, and the first processing module may include:
and the first judging unit is used for judging whether the first security level is higher than the second security level, and if so, directly taking the encrypted data as the processing data.
The data transmission system provided in the embodiment of the present application is applied to a receiving terminal, and the first processing module may include:
and the second judgment unit is used for judging whether the first security level is equal to the second security level or not, if so, automatically decrypting the encrypted data to obtain target data, and taking the target data as processing data.
The data transmission system provided in the embodiment of the present application is applied to a receiving terminal, and the first processing module may include:
and the third judging unit is used for judging whether the first security level is lower than the second security level, if so, automatically decrypting the encrypted data to obtain target data, and taking the target data as processing data.
The data transmission system provided by the embodiment of the application is applied to a server and can comprise:
the first issuing module is used for issuing the communication software to the sending terminal and the receiving terminal in a remote issuing mode;
the first receiving module is used for receiving the encrypted data transmitted by the sending terminal through the communication software;
and the third transmission module is used for transmitting the encrypted data to the receiving terminal through the communication software.
The data transmission system provided by the embodiment of the application is applied to a server, and a first publishing module publishes communication software to a sending terminal and a receiving terminal in a remote publishing mode; the first receiving module receives the encrypted data transmitted by the sending terminal through communication software; and the third transmission module transmits the encrypted data to the receiving terminal through the communication software. The data transmission system provided by the embodiment of the application is applied to the server, and the server remotely releases the communication software for the sending terminal and the receiving terminal, so that the sending terminal and the receiving terminal can apply the communication software released by the server in a remote calling mode, and thus, the server can define a mode that the sending terminal automatically encrypts data and the receiving terminal automatically processes data through the communication software, and the sending terminal and the receiving terminal are brought under the management of the server. In addition, because the communication software applied by the sending terminal and the receiving terminal is remotely issued by the server, the data transmitted by the sending terminal and the receiving terminal need to pass through the server, namely, by means of the technology of remotely issuing the communication software by the server, the data channels of the sending terminal and the receiving terminal can be brought under the server, and the data safety protection of the sending terminal and the receiving terminal on the level of the data channel through the server is realized; in addition, the unified management of the sending terminal and the receiving terminal can be realized only by the server, and the complexity and the difficulty in protecting the data security of the terminal are reduced.
The application also provides a data transmission device and a computer readable storage medium, which both have the corresponding effects of the data transmission method provided by the embodiment of the application. Referring to fig. 8, fig. 8 is a schematic structural diagram of a data transmission device according to an embodiment of the present application.
The data transmission device provided by the embodiment of the application includes a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the steps of the data transmission method described in any one of the above embodiments when executing the computer program.
Referring to fig. 9, another data transmission device provided in the embodiment of the present application may further include: an input port 203 connected to the processor 202, for transmitting externally input commands to the processor 202; a display unit 204 connected to the processor 202, for displaying the processing result of the processor 202 to the outside; and the communication module 205 is connected with the processor 202 and is used for realizing the communication between the data transmission device and the outside. The display unit 204 may be a display panel, a laser scanning display, or the like; the communication method adopted by the communication module 205 includes, but is not limited to, mobile high definition link technology (HML), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), and wireless connection: wireless fidelity technology (WiFi), bluetooth communication technology, bluetooth low energy communication technology, ieee802.11s based communication technology.
The computer-readable storage medium provided in the embodiments of the present application stores a computer program, and the computer program, when executed by a processor, implements the steps of the data transmission method described in any of the above embodiments.
The computer-readable storage media to which this application relates include Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage media known in the art.
For a description of a relevant part in a data transmission system, a device and a computer-readable storage medium provided in the embodiments of the present application, refer to a detailed description of a corresponding part in a data transmission method provided in the embodiments of the present application, which is not described herein again. In addition, parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of corresponding technical solutions in the prior art, are not described in detail so as to avoid redundant description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (14)

1. A data transmission method, applied to a transmitting terminal, comprising:
acquiring target data;
if the target data needs to be transmitted out of the sending terminal, the target data is automatically encrypted to obtain encrypted data;
and transmitting the encrypted data to a receiving terminal.
2. The method of claim 1, wherein automatically encrypting the target data to obtain encrypted data comprises:
automatically encrypting the target data through communication software remotely issued by a server to obtain the encrypted data;
the transmitting the encrypted data to a receiving terminal includes:
transmitting the encrypted data to the server through the communication software so that the server transmits the encrypted data to the receiving terminal through the communication software.
3. The method of claim 2, wherein after transmitting the encrypted data to the server, further comprising:
and transmitting the first security level of the sending terminal to the server so that the receiving terminal acquires the first security level from the server.
4. A data transmission method applied to the receiving terminal according to any one of claims 1 to 3, comprising:
if the encrypted data needs to be transmitted into the receiving terminal, acquiring a first security level of a transmitting terminal which transmits the encrypted data;
automatically processing the encrypted data based on the first security level and the second security level of the receiving terminal to obtain processed data;
and transmitting the processing data into the receiving terminal.
5. The method of claim 4, wherein automatically processing the encrypted data based on the first security level and a second security level of the receiving terminal comprises:
automatically processing the encrypted data based on the first security level and the second security level through communication software remotely issued by a server;
the transmitting the processed data into the receiving terminal includes:
and transmitting the processing data into the receiving terminal through the communication software.
6. The method of claim 5, wherein automatically processing the encrypted data based on the first security level and the second security level comprises:
and judging whether the first security level is higher than the second security level, if so, directly taking the encrypted data as the processing data.
7. The method of claim 5, wherein automatically processing the encrypted data based on the first security level and the second security level comprises:
and judging whether the first security level is equal to the second security level, if so, automatically decrypting the encrypted data to obtain target data, and taking the target data as the processing data.
8. The method of claim 5, wherein automatically processing the encrypted data based on the first security level and the second security level comprises:
and judging whether the first security level is lower than the second security level, if so, automatically decrypting the encrypted data to obtain target data, and taking the target data as the processing data.
9. A data transmission method is applied to a server and comprises the following steps:
the communication software is released to a sending terminal and a receiving terminal in a remote release mode;
receiving the encrypted data transmitted by the sending terminal through the communication software;
and transmitting the encrypted data to the receiving terminal through the communication software.
10. A data transmission system, applied to a transmission terminal, comprising:
the first acquisition module is used for acquiring target data;
the first encryption module is used for automatically encrypting the target data to obtain encrypted data when the target data needs to be transmitted out of the sending terminal;
and the first transmission module is used for transmitting the encrypted data to a receiving terminal.
11. A data transmission system, applied to a receiving terminal, comprising:
the second acquisition module is used for acquiring a first security level of a sending terminal sending the encrypted data when the encrypted data needs to be transmitted into the receiving terminal;
the first processing module is used for automatically processing the encrypted data based on the first security level and the second security level of the receiving terminal to obtain processed data;
and the second transmission module is used for transmitting the processing data into the receiving terminal.
12. A data transmission system, applied to a server, comprising:
the first issuing module is used for issuing the communication software to the sending terminal and the receiving terminal in a remote issuing mode;
the first receiving module is used for receiving the encrypted data transmitted by the sending terminal through the communication software;
and the third transmission module is used for transmitting the encrypted data to the receiving terminal through the communication software.
13. A data transmission device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data transmission method according to any one of claims 1 to 9 when executing the computer program.
14. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the data transmission method according to one of claims 1 to 9.
CN201911039329.8A 2019-10-29 2019-10-29 Data transmission method, system, equipment and computer readable storage medium Pending CN110768990A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911039329.8A CN110768990A (en) 2019-10-29 2019-10-29 Data transmission method, system, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911039329.8A CN110768990A (en) 2019-10-29 2019-10-29 Data transmission method, system, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110768990A true CN110768990A (en) 2020-02-07

Family

ID=69334845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911039329.8A Pending CN110768990A (en) 2019-10-29 2019-10-29 Data transmission method, system, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110768990A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111352900A (en) * 2020-02-26 2020-06-30 深信服科技股份有限公司 Virtualized application file access method, device, server and storage medium
CN114827133A (en) * 2022-06-27 2022-07-29 浪潮云信息技术股份公司 Application software management method and device and computer

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105119928A (en) * 2015-09-07 2015-12-02 百度在线网络技术(北京)有限公司 Data transmission method, device and system for Android intelligent terminal
CN105187216A (en) * 2015-08-28 2015-12-23 宇龙计算机通信科技(深圳)有限公司 Data safety processing method, device and system
KR20170038340A (en) * 2015-09-30 2017-04-07 (주)비엑스엠 Data leakage prevention apparatus and method thereof
CN109104279A (en) * 2018-08-31 2018-12-28 国网河北省电力有限公司沧州供电分公司 A kind of encryption method of electric power data, system and terminal device
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal
CN110099062A (en) * 2019-05-07 2019-08-06 山东渔翁信息技术股份有限公司 A kind of encryption method of network data, decryption method and relevant apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187216A (en) * 2015-08-28 2015-12-23 宇龙计算机通信科技(深圳)有限公司 Data safety processing method, device and system
CN105119928A (en) * 2015-09-07 2015-12-02 百度在线网络技术(北京)有限公司 Data transmission method, device and system for Android intelligent terminal
KR20170038340A (en) * 2015-09-30 2017-04-07 (주)비엑스엠 Data leakage prevention apparatus and method thereof
CN109104279A (en) * 2018-08-31 2018-12-28 国网河北省电力有限公司沧州供电分公司 A kind of encryption method of electric power data, system and terminal device
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal
CN110099062A (en) * 2019-05-07 2019-08-06 山东渔翁信息技术股份有限公司 A kind of encryption method of network data, decryption method and relevant apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111352900A (en) * 2020-02-26 2020-06-30 深信服科技股份有限公司 Virtualized application file access method, device, server and storage medium
CN111352900B (en) * 2020-02-26 2024-02-23 深信服科技股份有限公司 Virtualized application file access method, device, server and storage medium
CN114827133A (en) * 2022-06-27 2022-07-29 浪潮云信息技术股份公司 Application software management method and device and computer

Similar Documents

Publication Publication Date Title
US10666440B2 (en) Authentication method, device, server, and system, and storage medium
CN110580262B (en) Private data query method and device based on intelligent contract
KR101894232B1 (en) Method and apparatus for cloud-assisted cryptography
EP3192002B1 (en) Preserving data protection with policy
EP3216188B1 (en) Roaming content wipe actions across devices
EP3937041A1 (en) Trusted startup methods and apparatuses of dedicated blockchain node device
US20200104528A1 (en) Data processing method, device and system
CN110580417B (en) Private data query method and device based on intelligent contract
EP3082123B1 (en) File storage system, file storage apparatus, and user terminal
CN111339543B (en) File processing method and device, equipment and storage medium
CN103748592A (en) System and method for controlling access to protected content
JP2019502208A (en) Document processing method and apparatus
CN106033503A (en) Method, device and system of online writing application secret key into digital content equipment
KR20220039779A (en) Enhanced security encryption and decryption system
CN112165490A (en) Encryption method, decryption method, storage medium and terminal equipment
WO2023207975A1 (en) Data transmission method and apparatus, and electronic device
CN110768990A (en) Data transmission method, system, equipment and computer readable storage medium
WO2015176394A1 (en) File encryption method and device, and encrypted file reading method, device and terminal
US11722295B2 (en) Methods, apparatus, and articles of manufacture to securely audit communications
CN111181905A (en) File encryption method and device
CN108154037B (en) Inter-process data transmission method and device
CN111431887B (en) Reverse Shell monitoring method and device, terminal equipment and medium
TWI501106B (en) Storage medium securing method and media access device thereof background
KR20160146623A (en) A Method for securing contents in mobile environment, Recording medium for storing the method, and Security sytem for mobile terminal
CN102624722B (en) Safe transferring method of data based on network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207

RJ01 Rejection of invention patent application after publication