CN110995391A - Data transmission method in isolated network, server and terminal - Google Patents

Data transmission method in isolated network, server and terminal Download PDF

Info

Publication number
CN110995391A
CN110995391A CN201911128526.7A CN201911128526A CN110995391A CN 110995391 A CN110995391 A CN 110995391A CN 201911128526 A CN201911128526 A CN 201911128526A CN 110995391 A CN110995391 A CN 110995391A
Authority
CN
China
Prior art keywords
data
target data
code
isolated network
encoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911128526.7A
Other languages
Chinese (zh)
Inventor
雍正
李华
夏全军
杨乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sprixin Technology Co ltd
Original Assignee
Sprixin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sprixin Technology Co ltd filed Critical Sprixin Technology Co ltd
Priority to CN201911128526.7A priority Critical patent/CN110995391A/en
Publication of CN110995391A publication Critical patent/CN110995391A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The embodiment of the invention provides a data transmission method in an isolation network, a server and a terminal, wherein the data transmission method comprises the following steps: acquiring data in an isolated network as target data; coding the target data for multiple times according to a fountain code coding algorithm; and converting the coding result of each time into a two-dimensional code so that a terminal deployed outside the isolated network can obtain the target data according to the scanning results of the two-dimensional codes. The embodiment of the invention can effectively solve the problem of data loss in the two-dimension code transmission process.

Description

Data transmission method in isolated network, server and terminal
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a data transmission method in an isolated network, a server, and a terminal.
Background
In a non-network or isolated network, data cannot be transmitted back through the internet, so the data is often copied through an external storage device and then transmitted to a server on the internet in the form of e-mail or the like.
The mode of carrying out the data copy passback through external storage device is because the external storage device of all needing the manual work to connect at every turn, copy, disconnection, internet PC, copy, send at last, consequently there are the loaded down with trivial details problem of step, inefficiency, in addition, uses external storage device to have very big potential safety hazard, after external storage device is infected with the virus, will influence the equipment in the quarantine network, causes huge economic loss.
Disclosure of Invention
Embodiments of the present invention provide a data transmission method in an isolated network, a server, and a terminal, which overcome the above problems or at least partially solve the above problems.
In a first aspect, an embodiment of the present invention provides a method for transmitting data in an isolated network, where the method is applied to a server deployed in the isolated network, and the method includes:
acquiring data in an isolated network as target data;
coding the target data for multiple times according to a fountain code coding algorithm;
and converting the coding result of each time into a two-dimensional code so that a terminal deployed outside the isolated network can obtain the target data according to the scanning results of the two-dimensional codes.
Further, the encoding the target data multiple times according to the fountain code encoding algorithm specifically includes:
converting the target data into a character string, splitting the character string into a plurality of subdata groups, wherein the number of characters contained in each subdata group is the same, and the characters are binary characters;
and continuously and randomly selecting a plurality of sub data from the plurality of sub data, carrying out XOR operation on each bit character of all the sub data randomly selected each time, and taking the result of the XOR operation of all the bits as a primary coding result.
Further, the splitting the character string into a plurality of subdata further includes:
and compressing the character string, and encrypting the compressed character string by using an encryption algorithm.
Further, the continuously and randomly selecting a plurality of sub data from the plurality of sub data includes:
randomly generating a value according to an ideal soliton wave distribution function, wherein the value is used for representing the number of the subdata selected from the plurality of subdata at this time;
selecting subdata from the plurality of subdata according to the value of the degree.
Further, the fountain code encoding algorithm is specifically one of an LT code encoding algorithm and a Raptor code encoding algorithm.
Further, the converting of each encoding result into a two-dimensional code specifically includes:
for each coding result, acquiring a corresponding check mark;
and generating a corresponding two-dimensional code according to each coding result and the check identifier so that the terminal can obtain the target data according to the scanning results of the two-dimensional codes.
In a second aspect, an embodiment of the present invention provides a method for transmitting data in an isolated network, where the method is applied to a terminal deployed outside the isolated network, and the method includes:
scanning a two-dimensional code, wherein the two-dimensional code is obtained by a server deployed in an isolation network according to a result of encoding target data by a fountain code encoding algorithm;
and analyzing each two-dimensional code according to a fountain code decoding algorithm, and obtaining target data according to a plurality of analysis results.
In a third aspect, an embodiment of the present invention provides a server, where the server is deployed in an isolated network, and the server includes:
the target data acquisition module is used for acquiring data in the isolated network as target data;
the encoding module is used for encoding the target data for multiple times according to a fountain code encoding algorithm;
and the two-dimension code conversion module is used for converting the coding result of each time into a two-dimension code so as to obtain the target data according to the scanning results of the two-dimension codes by a terminal deployed outside the isolation network.
In a fourth aspect, an embodiment of the present invention provides a terminal, where the terminal is deployed outside an isolated network, and the terminal includes:
the two-dimension code scanning module is used for scanning a two-dimension code, and the two-dimension code is obtained by a server deployed in the isolation network according to a result of encoding target data by a fountain code encoding algorithm;
and the analysis module is used for analyzing each two-dimensional code according to a fountain code decoding algorithm and obtaining target data according to a plurality of analysis results.
In a fifth aspect, an embodiment of the present invention provides a data transmission system, which includes the server described above and the terminal described above.
In a sixth aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the program to implement the steps of the method as provided in the first aspect or the second aspect.
In a seventh aspect, an embodiment of the present invention provides a non-transitory computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the method as provided in the first or second aspect.
According to the data transmission method, the server and the terminal in the isolated network, provided by the embodiment of the invention, the data in the isolated network is encoded by a fountain code encoding algorithm, the encoding result is converted into the two-dimensional code, and the advantages that the receiving sequence of an encoding structure is not required to be considered and all encoding results are not required to be completely received when the fountain code encoding result is decoded are utilized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data transmission method in an isolated network at a server according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a terminal side of a data transmission method in an isolated network according to an embodiment of the present invention;
fig. 3 is a schematic structure of a server according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a transmission method for data in an isolated network at a server according to an embodiment of the present invention, where the transmission method is applied to the server. The server side of the embodiment of the invention is deployed in the isolated network. As shown in fig. 1, the transmission method includes:
s101, acquiring data in the isolated network as target data.
And S102, coding the target data for multiple times according to a fountain code coding algorithm.
It should be noted that the fountain code has two characteristics: (1) an infinite number of code packets may be generated from the source data; (2) for the data packets divided into k, the receiver can successfully decode the data packets as long as m (m is slightly larger than k) data packets are received, without considering their sequence.
Specifically, according to a fountain code encoding algorithm, the target data is continuously converted into a plurality of encoding packets, wherein each encoding packet is used for recording an exclusive or operation result of a plurality of pieces of sub data randomly selected from all sub data obtained after splitting the data.
And S103, converting the coding result of each time into a two-dimensional code so that a terminal deployed outside the isolated network can obtain the target data according to the scanning results of the two-dimensional codes.
The two-dimensional code records data symbol information by black and white alternate graphs distributed on a plane (in a two-dimensional direction) according to a certain rule by using a certain specific geometric figure; the concept of '0' and '1' bit stream which forms the internal logic base of computer is skillfully utilized in coding, a plurality of geometric shapes corresponding to binary system are used for representing literal numerical information, and the information is automatically read by an image input device or an optoelectronic scanning device so as to realize the automatic processing of the information: it has some commonality of barcode technology: each code system has its specific character set; each character occupies a certain width; has certain checking function and the like. Meanwhile, the method also has the function of automatically identifying information of different rows and processing the graph rotation change points. The embodiment of the invention does not further limit the way of converting the coding result into the two-dimensional code, and all the prior art capable of generating the two-dimensional code can be used as the scheme of converting the coding result into the two-dimensional code.
The embodiment of the invention codes the data in the isolated network by a fountain code coding algorithm, converts the coding result into the two-dimensional code, and utilizes the advantages that the receiving sequence of a coding structure does not need to be considered and all coding results do not need to be completely received when the fountain code coding result is decoded.
On the basis of the foregoing embodiments, as an optional embodiment, the target data is encoded multiple times according to a fountain code encoding algorithm, specifically:
converting the target data into a character string, and splitting the character string into a plurality of subdata groups, wherein the length of each subdata group is the same.
It should be noted that the character string is a string of characters consisting of numbers, letters, and underlines, and a single element of each digit of the character string can be extracted. The embodiment of the invention splits the character string into a plurality of subdata, and the number of characters contained in each subdata is the same, namely the length is the same.
And continuously and randomly selecting a plurality of sub data from the plurality of sub data, carrying out XOR operation on each bit character of all the sub data randomly selected each time, and taking the result of the XOR operation of all the bits as a coding result.
In the embodiment of the present invention, a plurality of sub data needs to be continuously selected, on one hand, the number of the sub data selected each time is random, and on the other hand, the sub data selected each time is also random, for example, if the target data is divided into 10 sub data, only one sub data, namely, the 5 th sub data, may be selected for the first time, and 3 sub data, namely, the 1 st, 2 nd, and 9 th sub data, may be selected for the second time. For each bit of character, if the character of the selected sub data at the bit is the same, the result of the exclusive-or operation is 1, otherwise, the result is 0, so that an encoded result (encoded packet) can be obtained through the exclusive-or operation, and it can be understood that the length of the encoded packet is consistent with the length of the sub data.
On the basis of the foregoing embodiments, as an optional embodiment, the splitting the character string into a plurality of sub-data further includes:
and compressing the character string, and encrypting the compressed character string by using an encryption algorithm.
Specifically, the algorithm for compressing the character string according to the embodiment of the present invention may be a gzip algorithm, and the encryption algorithm may be a casser cipher algorithm, which is not specifically limited in the embodiment of the present invention. By compressing and encrypting the character strings, the purpose of data transmission can be achieved by using fewer two-dimensional codes, and meanwhile, the safety of data transmission is ensured. Data is converted into half and the position is exchanged through a Kaiser cipher algorithm, so that the length of the data is guaranteed to be unchanged while the encryption effect is achieved.
On the basis of the foregoing embodiments, as an optional embodiment, the continuously and randomly selecting a plurality of sub data from the plurality of sub data includes:
randomly generating a value according to an ideal soliton wave distribution function, wherein the value is used for representing the number of the subdata selected from the plurality of subdata at this time;
selecting subdata from the plurality of subdata according to the value of the degree.
It should be noted that the Ideal soliton distribution function (Ideal soliton distribution) can be represented by ρ (d), where d represents a degree satisfying:
Figure BDA0002277610790000061
Figure BDA0002277610790000071
wherein k represents the total number of the sub data after splitting the target data.
On the basis of the foregoing embodiments, as an optional embodiment, the embodiment of the present invention does not specifically limit the manner of converting each encoding result into a two-dimensional code, and includes but is not limited to:
for each coding result, acquiring a corresponding check mark;
and generating a corresponding two-dimensional code according to each coding result and the check identifier so that the terminal can obtain the target data according to the scanning results of the two-dimensional codes.
The embodiment of the invention can ensure the integrity and the effectiveness of data by adding the check mark to the coding result.
Based on the content of the foregoing embodiment, as an optional embodiment, the check identifier records the sequence of all the sub-data after splitting the target data, the sequence of the sub-data corresponding to the encoding result, and the timestamp of the target data.
It should be noted that the sub-data corresponding to the encoding result refers to the sub-data required for generating the encoding result, for example, if a certain encoding result is obtained by performing an exclusive or operation based on the sub-data 1, 2, and 5, the sub-data corresponding to the encoding result is the sub-data 1, 2, and 5, and the sequence of the sub-data corresponding to the encoding result is 1, 2, and 5. The validity of the data can be verified by recording the time of the target data.
Fig. 2 is a schematic flow chart of a terminal test of a data transmission method in an isolated network according to an embodiment of the present invention, as shown in fig. 2, including:
s201, scanning a two-dimensional code, wherein the two-dimensional code is obtained by a result of encoding target data by a service according to a fountain code encoding algorithm;
s202, analyzing each two-dimensional code according to a fountain code decoding algorithm, and obtaining target data according to a plurality of analysis results.
It should be noted that, the server in the embodiment of the present invention converts the target data into the two-dimensional code, the terminal capable of being connected to the external network performs scanning, and the terminal analyzes the scanning result according to the fountain code decoding algorithm to finally obtain the target data.
On the basis of the above embodiments, as an optional embodiment, each two-dimensional code includes a coding result and a check identifier.
As can be seen from the foregoing embodiments, the encoding result is used to record an xor operation result of a plurality of randomly selected sub-data in all sub-data obtained after splitting the target data, and the check identifier records a sequence of all the sub-data obtained after splitting the target data, a sequence of the sub-data corresponding to the encoding result, and a timestamp of the target data.
The fountain code decoding process comprises the following steps:
firstly, judging whether the degree of the coding result is 1, if so, indicating that the coding result is a certain character string (because the character string has no object which can be subjected to exclusive or calculation), and definitely obtaining sub-data according to the sequence of the sub-data recorded in the check identifier.
And then, analyzing other subdata in the coding result generated by carrying out XOR operation on the subdata according to the known subdata until all the subdata are obtained.
It is understood that when the xor operation of the encoding result is generated based on a plurality of sub-data, sufficient sub-data can be obtained with an encoding result of 1 and then analyzed. For example, a certain encoding result is obtained by exclusive or operation of 3 pieces of sub-data, two sub-data of the 3 pieces of sub-data can be obtained by encoding data with a utilization rate of 1, and then a third sub-data can be obtained by combining the encoding result.
On the basis of the foregoing embodiments, as an optional embodiment, obtaining target data according to a plurality of analysis results specifically includes: after all the subdata of the target data is obtained, the target data can be obtained by splicing, decrypting and decompressing the subdata. After the target data is obtained, the target data is transmitted to the server through a network to which the terminal is connected, such as 4G, 5G, WIFI, or the like.
Fig. 3 is a schematic structural diagram of a server according to an embodiment of the present invention, where the server is deployed in an isolated network, and as shown in fig. 3, the server includes: target data acquisition module 301, encoding module 302 and two-dimensional code conversion module 303, wherein:
a target data obtaining module 301, configured to obtain data in the isolated network as target data;
the encoding module 302 is configured to encode the target data multiple times according to a fountain code encoding algorithm;
a two-dimension code conversion module 303, configured to convert each encoding result into a two-dimension code, so that a terminal deployed outside the isolated network obtains the target data according to a scanning result of the multiple two-dimension codes
The server provided in the embodiment of the present invention specifically executes the flow of the data transmission method embodiment in each isolation network on the server side, and please refer to the content of the data transmission method embodiment in each isolation network on the server side in detail, which is not described herein again. The server side provided by the embodiment of the invention encodes the data in the isolated network by a fountain code encoding algorithm, converts the encoding result into the two-dimensional code, and utilizes the advantages that the receiving sequence of the encoding structure does not need to be considered and all encoding results do not need to be completely received when the fountain code encoding result is decoded.
Fig. 4 is a schematic structural diagram of a terminal provided in an embodiment of the present invention, where the terminal is deployed outside an isolated network, and as shown in fig. 4, the terminal includes: two-dimensional code scanning module 401 and analysis module 402, wherein:
the two-dimension code scanning module 401 is configured to scan a two-dimension code, where the two-dimension code is obtained by a result of encoding target data by a server deployed in an isolation network according to a fountain code encoding algorithm;
and the analysis module 402 is configured to analyze each two-dimensional code according to a fountain code decoding algorithm, and obtain target data according to a plurality of analysis results.
The terminal provided in the embodiment of the present invention specifically executes the flow of the above-mentioned data transmission method embodiment in each isolated network on the terminal side, and please refer to the content of the above-mentioned data transmission method embodiment in each isolated network on the terminal side for details, which is not described herein again. The server side converts the target data into the two-dimensional code, the terminal which can be connected with an external network scans the two-dimensional code, the terminal analyzes the scanning result according to the fountain code decoding algorithm to finally obtain the target data, and the problem of low analysis efficiency caused by data loss in the two-dimensional code analysis process is solved because the two-dimensional code is generated according to the fountain code coding algorithm.
An embodiment of the present invention further provides a data transmission system, including the server described in the foregoing embodiment and the terminal described in the foregoing embodiment.
Fig. 5 is a schematic entity structure diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 5, the electronic device may include: a processor (processor)510, a communication Interface (Communications Interface)520, a memory (memory)530 and a communication bus 540, wherein the processor 510, the communication Interface 520 and the memory 530 communicate with each other via the communication bus 540. The processor 510 may call a computer program stored on the memory 530 and operable on the processor 510 to execute the transmission method of data in the isolated network provided by the above embodiments, for example, including: acquiring data in an isolated network as target data; coding the target data for multiple times according to a fountain code coding algorithm; and converting the coding result of each time into a two-dimensional code so that a terminal deployed outside the isolated network can obtain the target data according to the scanning results of the two-dimensional codes. Or scanning a two-dimensional code, wherein the two-dimensional code is obtained by a server deployed in the isolated network according to a result of encoding target data by a fountain code encoding algorithm; and analyzing each two-dimensional code according to a fountain code decoding algorithm, and obtaining target data according to a plurality of analysis results.
Furthermore, the logic instructions in the memory 530 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
An embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the method for transmitting data in an isolated network provided in the foregoing embodiments when executed by a processor, and the method includes: acquiring data in an isolated network as target data; coding the target data for multiple times according to a fountain code coding algorithm; and converting the coding result of each time into a two-dimensional code so that a terminal deployed outside the isolated network can obtain the target data according to the scanning results of the two-dimensional codes. Or scanning a two-dimensional code, wherein the two-dimensional code is obtained by a server deployed in the isolated network according to a result of encoding target data by a fountain code encoding algorithm; and analyzing each two-dimensional code according to a fountain code decoding algorithm, and obtaining target data according to a plurality of analysis results.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A transmission method of data in an isolated network is applied to a server deployed in the isolated network, and is characterized in that the transmission method comprises the following steps:
acquiring data in an isolated network as target data;
coding the target data for multiple times according to a fountain code coding algorithm;
and converting the coding result of each time into a two-dimensional code so that a terminal deployed outside the isolated network can obtain the target data according to the scanning results of the two-dimensional codes.
2. The method for transmitting data in an isolated network according to claim 1, wherein the target data is encoded multiple times according to a fountain code encoding algorithm, specifically:
converting the target data into a character string, splitting the character string into a plurality of subdata groups, wherein the number of characters contained in each subdata group is the same, and the characters are binary characters;
and continuously and randomly selecting a plurality of sub data from the plurality of sub data, carrying out XOR operation on each bit character of all the sub data randomly selected each time, and taking the result of the XOR operation of all the bits as a primary coding result.
3. The method for transmitting data in an isolated network according to claim 2, wherein the splitting the character string into a plurality of sub-data further comprises:
and compressing the character string, and encrypting the compressed character string by using an encryption algorithm.
4. The method for transmitting data in an isolated network according to claim 2, wherein the continuously and randomly selecting a plurality of sub-data from the plurality of sub-data includes:
randomly generating a value according to an ideal soliton wave distribution function, wherein the value is used for representing the number of the subdata selected from the plurality of subdata at this time;
selecting subdata from the plurality of subdata according to the value of the degree.
5. The method for transmitting data in an isolated network according to any of claims 1 to 4, wherein the fountain code encoding algorithm is specifically one of an LT code encoding algorithm and a Raptor code encoding algorithm.
6. The method according to claim 1, wherein the converting of each encoding result into a two-dimensional code specifically comprises:
for each coding result, acquiring a corresponding check mark;
and generating a corresponding two-dimensional code according to each coding result and the check identifier so that the terminal can obtain the target data according to the scanning results of the two-dimensional codes.
7. A transmission method of data in an isolated network is applied to a terminal deployed outside the isolated network, and is characterized in that the transmission method comprises the following steps:
scanning a two-dimensional code, wherein the two-dimensional code is obtained by a server deployed in an isolation network according to a result of encoding target data by a fountain code encoding algorithm;
and analyzing each two-dimensional code according to a fountain code decoding algorithm, and obtaining target data according to a plurality of analysis results.
8. A server deployed in an isolated network, the server comprising:
the target data acquisition module is used for acquiring data in the isolated network as target data;
the encoding module is used for encoding the target data for multiple times according to a fountain code encoding algorithm;
and the two-dimension code conversion module is used for converting the coding result of each time into a two-dimension code so as to obtain the target data according to the scanning results of the two-dimension codes by a terminal deployed outside the isolation network.
9. A terminal deployed outside an isolated network, the terminal comprising:
the two-dimension code scanning module is used for scanning a two-dimension code, and the two-dimension code is obtained by a server deployed in the isolation network according to a result of encoding target data by a fountain code encoding algorithm;
and the analysis module is used for analyzing each two-dimensional code according to a fountain code decoding algorithm and obtaining target data according to a plurality of analysis results.
10. A data transmission system comprising a server according to claim 8 and a terminal according to claim 9.
CN201911128526.7A 2019-11-18 2019-11-18 Data transmission method in isolated network, server and terminal Pending CN110995391A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911128526.7A CN110995391A (en) 2019-11-18 2019-11-18 Data transmission method in isolated network, server and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911128526.7A CN110995391A (en) 2019-11-18 2019-11-18 Data transmission method in isolated network, server and terminal

Publications (1)

Publication Number Publication Date
CN110995391A true CN110995391A (en) 2020-04-10

Family

ID=70084793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911128526.7A Pending CN110995391A (en) 2019-11-18 2019-11-18 Data transmission method in isolated network, server and terminal

Country Status (1)

Country Link
CN (1) CN110995391A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112416642A (en) * 2020-11-25 2021-02-26 国能日新科技股份有限公司 Remote operation and maintenance method and device
CN112468262A (en) * 2020-09-30 2021-03-09 苏州健联医疗信息技术有限公司 Data one-way transmission method and system and two-dimensional code data generation method and device
CN115632661A (en) * 2022-12-22 2023-01-20 互丰科技(北京)有限公司 Efficient compression transmission method for network security information
CN116610485A (en) * 2023-07-21 2023-08-18 深圳市城市交通规划设计研究中心股份有限公司 Isolation gateway data verification method, electronic equipment and storage medium
CN116610485B (en) * 2023-07-21 2024-04-30 深圳市城市交通规划设计研究中心股份有限公司 Isolation gateway data verification method, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897382A (en) * 2016-06-08 2016-08-24 乐视控股(北京)有限公司 Data synchronization method and device
CN107666372A (en) * 2017-09-15 2018-02-06 北京邮电大学 It is a kind of based on multilink collaborative transmission method and device without rate coding
CN109254950A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 A kind of separation net spatial database ferry-boat method and system based on two dimensional code
CN109254955A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 Unidirectional file is ferried method and system between a kind of separation net based on two dimensional code
CN110351256A (en) * 2019-06-26 2019-10-18 国能日新科技股份有限公司 Data back method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897382A (en) * 2016-06-08 2016-08-24 乐视控股(北京)有限公司 Data synchronization method and device
CN107666372A (en) * 2017-09-15 2018-02-06 北京邮电大学 It is a kind of based on multilink collaborative transmission method and device without rate coding
CN109254950A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 A kind of separation net spatial database ferry-boat method and system based on two dimensional code
CN109254955A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 Unidirectional file is ferried method and system between a kind of separation net based on two dimensional code
CN110351256A (en) * 2019-06-26 2019-10-18 国能日新科技股份有限公司 Data back method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468262A (en) * 2020-09-30 2021-03-09 苏州健联医疗信息技术有限公司 Data one-way transmission method and system and two-dimensional code data generation method and device
CN112468262B (en) * 2020-09-30 2022-05-27 苏州健联医疗信息技术有限公司 Data one-way transmission method and system and two-dimensional code data generation method and device
CN112416642A (en) * 2020-11-25 2021-02-26 国能日新科技股份有限公司 Remote operation and maintenance method and device
CN115632661A (en) * 2022-12-22 2023-01-20 互丰科技(北京)有限公司 Efficient compression transmission method for network security information
CN115632661B (en) * 2022-12-22 2023-03-07 互丰科技(北京)有限公司 Efficient compression transmission method for network security information
CN116610485A (en) * 2023-07-21 2023-08-18 深圳市城市交通规划设计研究中心股份有限公司 Isolation gateway data verification method, electronic equipment and storage medium
CN116610485B (en) * 2023-07-21 2024-04-30 深圳市城市交通规划设计研究中心股份有限公司 Isolation gateway data verification method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110995391A (en) Data transmission method in isolated network, server and terminal
CN107395209B (en) Data compression method, data decompression method and equipment thereof
CN109688289B (en) Image encryption transmission method, image decryption method and device
US20180253559A1 (en) Secured lossless data compression using encrypted headers
CN112333186B (en) Data communication method, device, equipment and storage medium
CN106452607B (en) Method and device for transmitting and analyzing information
EP3640851B1 (en) Two-dimensional code error correction decoding
CN110351256A (en) Data back method and system
CN115296862A (en) Network data secure transmission method based on data coding
CN104598801B (en) A kind of Dynamic Two-dimensional code generating method based on algorithm reconstruct
CN102831504A (en) Drug administration information processing method on basis of mobile phone
CN111371963B (en) Image processing method and apparatus, storage medium, and electronic device
CN113517982B (en) Password generation method, password execution method and terminal
CN114614829A (en) Satellite data frame processing method and device, electronic equipment and readable storage medium
CN113987556B (en) Data processing method and device, electronic equipment and storage medium
CN108897721B (en) Method and device for decoding multiple kinds of coded data
CN111368575A (en) One-dimensional bar code encoding and decoding method and system
CN113162628B (en) Data encoding method, data decoding method, terminal and storage medium
CN112699366B (en) Cross-platform login-free secure communication method and device and electronic equipment
CN114239779A (en) Data transmission method, transmission system, acquisition equipment and receiving equipment
Wang et al. Security Mechanism Improvement for 2D Barcodes using Error Correction with Random Segmentation
CN111931205A (en) Method and device for encrypting shader file
Kustov et al. A steganographic model using wavelet and Arnold cat transform with multi-threshold error-correcting coding
CN116880778B (en) User privacy protection method based on regenerative coding and distributed storage
CN109391616B (en) Information management method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200410

RJ01 Rejection of invention patent application after publication