CN111355752A - File transmission method, device and equipment based on gatekeeper - Google Patents

File transmission method, device and equipment based on gatekeeper Download PDF

Info

Publication number
CN111355752A
CN111355752A CN201811566078.4A CN201811566078A CN111355752A CN 111355752 A CN111355752 A CN 111355752A CN 201811566078 A CN201811566078 A CN 201811566078A CN 111355752 A CN111355752 A CN 111355752A
Authority
CN
China
Prior art keywords
file
transmitted
network
transmission
gatekeeper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811566078.4A
Other languages
Chinese (zh)
Inventor
曾科
赵营苗
刘玄
李海军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811566078.4A priority Critical patent/CN111355752A/en
Publication of CN111355752A publication Critical patent/CN111355752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method, a device and equipment for transmitting files based on a gatekeeper, wherein the method comprises the following steps: acquiring a file to be transmitted; selecting a target gatekeeper link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a first network and a second network at different levels; and transmitting the file to be transmitted from the first network to the second network by using the target gateway link. The file to be transmitted is acquired, a target gateway link is selected from the plurality of gateway transmission links, and the file to be transmitted is transmitted from the first network to the second network by using the target gateway link, so that redundant scheduling of the plurality of gateway transmission links is realized, the availability and disaster tolerance of network resources are greatly improved, file transmission between networks of different levels is also realized, and the transmission efficiency of the file is ensured.

Description

File transmission method, device and equipment based on gatekeeper
Technical Field
The invention relates to the technical field of internet, in particular to a file transmission method, device and equipment based on a gatekeeper.
Background
With the rapid development of economy, information security is more and more emphasized by people, especially the security of data information in the relevant policy and institution. In order to improve the security of data information, networks of many government offices adopt a multi-layer isolation mode, and particularly, network security is ensured through network physical isolation, however, information cannot be transmitted between the networks, and even if a user wants to share information of a user on the other side of the network, the information cannot be normally transmitted.
Disclosure of Invention
The embodiment of the invention provides a method, a device and equipment for transmitting files based on a gatekeeper, which are used for realizing file transmission among networks of different levels.
In a first aspect, an embodiment of the present invention provides a method for file transfer based on a gatekeeper, including:
acquiring a file to be transmitted;
selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a first network and a second network at different levels;
and transmitting the file to be transmitted from the first network to the second network by using the target gateway link.
In a second aspect, an embodiment of the present invention provides a file transmission device based on a gatekeeper, including:
the acquisition module is used for acquiring a file to be transmitted;
the first selection module is used for selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, and the gatekeeper transmission links are used for realizing file transmission between a first network and a second network at different levels;
and the transmission module is used for transmitting the file to be transmitted from the first network to the second network by using the target gateway link.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the gatekeeper-based file transfer method of the first aspect.
An embodiment of the present invention provides a computer storage medium, configured to store a computer program, where the computer program, when executed, implements the gatekeeper-based file transmission method in the first aspect.
The file to be transmitted is obtained, a target gatekeeper link for transmitting the file to be transmitted is selected from a plurality of preset gatekeeper transmission links, the file to be transmitted is transmitted from a first network to a second network by using the target gatekeeper link, the redundant scheduling process of the multiple gatekeeper transmission links is realized, the availability and disaster tolerance capability of network resources are greatly improved, the file transmission between the first network and the second network at different levels is realized, the transmission efficiency of the file is ensured, the use requirement of a user is met, and the practicability of the method is improved.
In a fourth aspect, an embodiment of the present invention provides a method for file transfer based on a gatekeeper, including:
selecting a target transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a second network and a first network at different levels;
receiving a file to be transmitted sent by a first network through the target transmission link;
and processing the file to be transmitted according to a preset processing strategy.
In a fifth aspect, an embodiment of the present invention provides a file transmission device based on a gatekeeper, including:
the second selection module is used for selecting a target transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, and the gatekeeper transmission links are used for realizing file transmission between a second network and a first network at different levels;
the receiving module is used for receiving a file to be transmitted, which is sent by a first network, through a preset target gateway link;
and the processing module is used for processing the file to be transmitted according to a preset processing strategy.
In a sixth aspect, an embodiment of the present invention provides an electronic device, which includes a first processor and a first memory, where the first memory is used to store one or more computer instructions, and when the one or more computer instructions are executed by the first processor, the gatekeeper-based file transfer method in the fourth aspect is implemented.
An embodiment of the present invention provides a computer storage medium, configured to store a computer program, where the computer program, when executed, implements the gatekeeper-based file transmission method in the fourth aspect.
The file to be transmitted sent by the first network is received through the preset target transmission link, and the file to be transmitted is processed according to the preset processing strategy, so that the file transmission process between the first network and the second network in different levels is effectively realized, and the second network can also correspondingly process the file to be transmitted, so that the use requirements of users are met, and the practicability of the file transmission method is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a first flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention;
fig. 2 is a flowchart of selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating selecting a first processor for processing the file to be transmitted from a plurality of preset processors according to an embodiment of the present invention;
FIG. 4 is a first flowchart of selecting the first processor from the plurality of processors in normal operation according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating a second process for selecting the first processor from the plurality of processors in a normal operating state according to an embodiment of the present invention;
fig. 6 is a flowchart of a second method for transferring a file based on a gatekeeper according to an embodiment of the present invention;
fig. 7 is a third flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention;
fig. 8 is a flowchart of acquiring a file to be transmitted according to an embodiment of the present invention;
fig. 9 is a first flowchart of acquiring the file to be transmitted from at least one data file according to the embodiment of the present invention;
fig. 10 is a second flowchart of acquiring the file to be transmitted from at least one data file according to the embodiment of the present invention;
fig. 11 is a fourth flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention;
fig. 12 is a flowchart of transmitting the file to be transmitted from the first network to the second network by using the target gatekeeper link according to the embodiment of the present invention;
fig. 13 is a flowchart for identifying whether the file to be transmitted is a published file according to an embodiment of the present invention;
fig. 14 is a fifth flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention;
fig. 15 is a sixth flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention;
fig. 16 is a seventh flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention;
FIG. 17 is a first flowchart of another gatekeeper-based file transfer method according to an embodiment of the present invention;
fig. 18 is a flowchart illustrating selecting a target transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links according to an embodiment of the present invention;
FIG. 19 is a flowchart illustrating another gatekeeper-based file transfer method according to an embodiment of the present invention;
fig. 20 is a third flowchart of another gatekeeper-based file transfer method according to an embodiment of the present invention;
FIG. 21 is a fourth flowchart illustrating another gatekeeper-based file transfer method according to an embodiment of the present invention;
fig. 22 is a first schematic diagram illustrating a gatekeeper-based file transfer method according to an embodiment of the present invention;
fig. 23 is a second schematic diagram illustrating a gatekeeper-based file transmission method according to an embodiment of the present invention;
fig. 24 is a schematic structural diagram of a gatekeeper transmission link according to an embodiment of the present invention;
fig. 25 is a schematic structural diagram of a file transfer device based on a gatekeeper according to an embodiment of the present invention;
fig. 26 is a schematic structural diagram of an electronic device corresponding to the gatekeeper-based file transfer apparatus provided in the embodiment shown in fig. 25;
fig. 27 is a schematic structural diagram of another gatekeeper-based document transportation apparatus according to an embodiment of the present invention;
fig. 28 is a schematic structural diagram of an electronic device corresponding to the gatekeeper-based file transfer apparatus provided in the embodiment shown in fig. 27.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, and "a" and "an" generally include at least two, but do not exclude at least one, unless the context clearly dictates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
In addition, the sequence of steps in each method embodiment described below is only an example and is not strictly limited.
Fig. 1 is a first flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention; referring to fig. 1, the embodiment provides a gatekeeper-based file transfer method, where an execution subject of the file transfer method may be a server located in a first network, and when the server executes the method, file transfer between the first network and a second network of different levels may be achieved, and file transfer efficiency may also be ensured.
The first network and the second network of different levels may refer to networks with different security levels, for example: the first network may be a predetermined low-security network, and correspondingly, the second network may be a predetermined high-security network. Alternatively, the first network may be a predetermined high-security network, and correspondingly, the second network may be a predetermined low-security network. It is understood that the network differentiation according to the security level in the present embodiment may include: the system comprises a high-security level network and a low-security level network, wherein the security degree of the high-security level network is higher than that of the low-security level network. For example, the high-security network may correspond to an intranet, and may be referred to as a trusted-end network; the low-security network may correspond to an external network and may be referred to as an untrusted end network, and the acquired file to be transmitted may be transitioned from the low-security network to the high-security network, or may be transitioned from the high-security network to the low-security network.
It is understood that the first network and the second network are not limited to the above examples, for example, the first network is a non-secret network, the second network is a secret network, and so on; those skilled in the art can select the first network and the second network at different levels according to specific usage requirements and application scenarios, as long as the first network and the second network are guaranteed to belong to different levels, which is not described herein again.
Specifically, the file transmission method based on the gatekeeper may include:
s101: and acquiring a file to be transmitted.
The file to be transmitted can be stored in a preset storage area, and when the server acquires the file to be transmitted, the server can acquire the file to be transmitted by accessing the storage area. Or, for the file to be transmitted, the file to be transmitted may be actively or passively sent by another device, and the server at this time may directly receive the file to be transmitted sent by the other device. Of course, a person skilled in the art may also use other methods to obtain the file to be transmitted, as long as the accuracy and reliability of obtaining the file to be transmitted can be ensured, which is not described herein again.
It can be understood that, since the obtained file to be transmitted is used for transmission in the first network and the second network at different levels, the file to be transmitted may be a file from the first network and used for being sent to the second network; alternatively, the file to be transmitted may also be a file from the second network and sent to the first network.
S102: and selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between the first network and the second network at different levels.
For a first network, a plurality of gatekeeper transmission links are preset, and each gatekeeper transmission link at least comprises: the file transmission method comprises a task processor used for processing a file to be transmitted, a file server used for transmitting the file to be transmitted and a gateway, and particularly, after the file to be transmitted is obtained by the server, the file to be transmitted can be sent to the task processor, so that the task processor can process the received file to be transmitted, and then the file to be transmitted processed by the task processor can be transmitted to a second network through the file server and the gateway. Wherein, the processing operation of the task processor on the at least one file to be transmitted may include at least one of the following: the file address is analyzed, the file is downloaded, the file is signed, the file is packaged and the like, and the processing operation can effectively prevent the file to be transmitted from being tampered.
It should be noted that the file server in this embodiment may be specifically an sftp server or a samba server, and is used to implement file transfer with the gatekeeper component; furthermore, the software protocol of the file server can be changed according to different user requirements, so that the gatekeeper in the gatekeeper transmission link can be subjected to cold switching, the defects that the gatekeeper in the prior art cannot be compatible with hardware of multiple manufacturers and has strong dependence on manufacturers are effectively overcome, even some manufacturers do not support general SFTP, Samba, NFS and other protocols, and only support custom private protocols, so that the application and development of the technology are severely limited. In the embodiment, the software protocol in the file server is changed, so that the gatekeeper can be compatible with different manufacturers, the use safety is guaranteed, and the gatekeeper has higher usability.
In addition, because a plurality of gatekeeper transmission links may exist between the first network and the second network, the plurality of gatekeeper transmission links may be deployed in a distributed manner across the machine room, and each gatekeeper transmission link may include a task processor and a file server, for the first network, a plurality of task processors, file servers, and gatekeepers may be included, and one task processor may correspond to one or more files to be transmitted, one file server may also correspond to one or more files to be transmitted, and a plurality of gatekeeper transmission links may also share one gatekeeper; or, the multiple gatekeeper transmission links have multiple gatekeeper components, wherein the gatekeeper components may be gatekeepers and/or optical gates; in particular, in application, a gatekeeper is a network security device that is capable of cutting link layer connections between networks on a circuit and performing secure and appropriate application data exchange between networks. The optical gate is a unidirectional isolation software and hardware system based on optical unidirectionality, and is suitable for a data exchange scene of a network with extremely high requirements on safety. The mixed use of the net gate and the optical gate can be realized, so that the use flexibility of the net gate piece is effectively improved, and the usability of the net gate piece is further improved.
After the file to be transmitted is obtained, a suitable target gatekeeper link may be selected from the multiple gatekeeper transmission links according to the file to be transmitted (for example, file characteristics of the file to be transmitted), and/or a preset scheduling rule, where the target gatekeeper link may at least include: the file transmission method includes a first processor for processing a file to be transmitted, and a first file server and a gateway component for transmitting the file to be transmitted, where it can be understood that the first processor may be one of a plurality of preset task processors in a first network that is suitable for processing the file to be transmitted, and the first file server may be one of a plurality of preset file servers in the first network that is suitable for transmitting the file to be transmitted. Thus, the communication link formed by the first processor, the first file server, and the gatekeeping component forms a target gatekeeping link of the first network, which enables file transfer between other components (e.g., servers, processors, etc.) in the first network and the second network.
S103: and transmitting the file to be transmitted from the first network to the second network by using the target gateway link.
After the target gatekeeper link is determined, the obtained file to be transmitted can be ferried from the first network to the second network by using the target gatekeeper link, so that the file transmission process between the first network and the second network in different levels is realized.
According to the file transmission method based on the gatekeeper, the file to be transmitted is obtained, and the target gatekeeper link for transmitting the file to be transmitted is selected from the preset multiple gatekeeper transmission links, so that the file to be transmitted is transmitted from the first network to the second network by using the target gatekeeper link, a redundant scheduling process of the multiple gatekeeper transmission links is realized, the availability and disaster tolerance of network resources are greatly improved, meanwhile, the file transmission between the first network and the second network of different levels is also realized, the transmission efficiency of the file is ensured, the use requirements of users are met, and the practicability of the method is improved.
Fig. 2 is a flowchart illustrating selecting a target gatekeeper link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links according to an embodiment of the present invention; on the basis of the foregoing embodiment, as can be seen by referring to fig. 2 continuously, in this embodiment, a specific implementation manner for selecting the target gatekeeper link is not limited, and a person skilled in the art may set the target gatekeeper link according to a specific design requirement, and preferably, the selecting the target gatekeeper link for transmitting the file to be transmitted in the preset gatekeeper transmission links in this embodiment may include:
s1021: selecting a first processor for processing a file to be transmitted from a plurality of preset processors.
Since the first processor is used for processing the file to be transmitted, in order to ensure the quality and efficiency of processing the file to be transmitted, an appropriate processor can be selected from the plurality of processors as the first processor.
When selecting the first processor, an achievable manner is that, referring to fig. 3, the selecting a first processor for processing the file to be transmitted from the predetermined plurality of processors in the embodiment may include:
s10211: an operating state of each of a plurality of processors is obtained.
The operating state of the processor may include a normal operating state and a fault operating state, where the normal operating state may also be referred to as a healthy state, and the fault operating state may be referred to as an unhealthy state. When the working state of the processor is obtained, an implementation manner is that heartbeat information may be sent to the processor according to a preset access cycle, whether feedback information sent by the processor according to the heartbeat information may be received within a preset time period is detected, if the feedback information is received, the processor may be determined to be in a normal working state, otherwise, the processor is determined to be in a fault working state. Or, another way to implement the method is to obtain the operating parameters of the processor according to a preset period, and determine the operating state of the processor according to the operating parameters, for example: if the working parameters belong to a preset normal range, determining that the processor is in a normal working state; and if the working parameters do not belong to the normal range, determining that the processor is in a fault working state. Of course, those skilled in the art may also use other manners to obtain the operating state of the processor, as long as the stability and reliability of obtaining the operating state of the processor can be ensured, which is not described herein again.
S10212: a first processor is selected among the plurality of processors in a normal operating state.
After the working states of the processors are acquired, in order to ensure the quality and efficiency of processing the file to be transmitted, one processor may be selected from the processors in the normal working state as a first processor, and at this time, the first processor may perform normal processing operation on the file to be transmitted.
Further, when selecting the first processor, an achievable way is that, as shown in fig. 4, the selecting the first processor in the plurality of processors in the normal operating state in the embodiment may include:
s102121: obtaining a file processing capability of each of the plurality of processors, the file processing capability including at least one of: load information, file capacity information, file transfer volume.
It is understood that the plurality of processors in the present embodiment are all processors in a normal operating state. After acquiring a plurality of processors in normal working state, in order to select a more suitable processor as a first processor, the file processing capability of each processor may be acquired first, and for the file processing capability of the processor, the load information of the processor refers to the maximum number of tasks that the processor can perform task processing; the file capacity information of the processor may refer to capacity information of all files currently processed by the processor, and may specifically be the number of files × the file size; when the file capacity information is larger, the processing tasks of the processor are more, namely the processor is in a busy state; when the file capacity information is smaller, the processing tasks of the processor are less, namely the processor is in a relatively idle state; and the file transfer size of a processor is the amount of data per task that needs to be processed per processor.
Specifically, when acquiring the file processing capability of the processor, an implementation manner is that a file processing capability request may be sent to the processor, the processor may return a corresponding file processing parameter after receiving the file processing capability request, receive the file processing parameter sent by the processor, and determine the corresponding file processing capability according to the file processing parameter. Or, another way to realize the method is to directly access the processor, obtain the working parameters of the processor, and determine the file processing capability of the processor through the working parameters. Of course, those skilled in the art may also use other manners to obtain the file processing capability of the processor, as long as the stability and reliability of obtaining the file processing capability of the processor can be ensured, which is not described herein again.
S102122: a first processor is selected among the plurality of processors based on the file processing capability.
After the file processing capability is obtained, the first processor may be selected from the multiple processors according to the file processing capability, and specifically, a processor with a relatively strong file processing capability may be selected as the first processor. For example, when the file processing capability includes load information, the load information of each of the plurality of processors may be analyzed and compared with a preset standard load, and a processor whose load information is at a normal level among the plurality of processors is used as the first processor, where the load information belongs to a range of the standard load, it may be determined that the load information of the processor is at the normal level, otherwise, the load information of the processor is at an abnormal level.
When the file processing capability includes file capacity information, the file capacity information of each of the plurality of processors may be analyzed and compared with a preset standard capacity, and a processor having file capacity information smaller than the standard capacity may be used as the first processor, that is, a processor having less file capacity information may be preferentially scheduled as the first processor.
When the file processing capacity includes the file transfer amount, the file transfer amount of each processor in the multiple processors can be used for acquiring the data amount of the file to be transmitted, and the processor corresponding to the file transfer amount close to the data amount is used as the first processor, so that the overall transmission time of all processors in the system to the file to be processed can be reduced, and the overall transmission time of all files can be reduced. For example: the size of the existing file P to be transmitted is 100M, two processors can process the file P at present, namely a processor A and a processor B, wherein 10 files in the processor A wait to be transmitted, the average size of the files is 200M, 20 files in the processor B wait to be transmitted, and the average size of the files is 80M. At this time, the server may use the processor B as the first processor, because the file transfer amount of the processor B is 80M, and the file transfer amount of the processor a is 200M, obviously, the file transfer amount of the processor B is closer to the data amount of the file to be transferred relative to the processor a, and when the file transfer amount of the processor B is close to the data amount of the file to be transferred, the efficiency of concurrently transferring the file on the gatekeeper communication link is higher, because the transfer time of the file is close, thereby reducing the occurrence of the situation that the small file transfer waits for the large file transfer. Therefore, the average size of the file transmission quantity of the queued files in each processor can be calculated according to the size of the files, and the processor with the file transmission quantity closest to the files to be transmitted is selected as the first processor, so that the large, medium and small files can be classified and transmitted as much as possible on the premise of waiting and time consuming fairness, and the transmission efficiency of the large, medium and small files is improved.
It is understood that, when the file processing capability includes load information, file capacity information, and file transmission amount, the first processor may be selected by referring to any one of the file processing factors according to a preset scheduling rule, and in this case, the selection influence of other file processing factors on the first processor may be ignored, for example: the first processor is selected among the plurality of processors based only on the load information of the processors, or the first processor is selected among the plurality of processors based on the load information and the file capacity information of the processors. Or, a preset weighted value of each file processing factor may be obtained, a comprehensive value of the file processing capability of each processor is obtained according to the weighted value of each file processing factor, the first processor is determined according to the comprehensive value of the file processing capability, and specifically, a processor with a higher comprehensive value is used as the first processor. Of course, those skilled in the art may also use other manners to implement the selection of the first processor, as long as the first processor can be ensured to accurately process the file to be transmitted, which is not described herein again.
Alternatively, when selecting the first processor, in a further realizable manner, as shown in fig. 5, the selecting the first processor from the plurality of processors in the normal operating state in the embodiment may include:
s102123: and acquiring the historical transmission times of the file to be transmitted.
S102124: and if the historical transmission times are greater than or equal to a preset time threshold, determining a second processor for analyzing and processing the file to be transmitted in the historical transmission process.
S102125: the first processor is selected among the other processors excluding the second processor among the plurality of processors.
The preset threshold may be preset, and those skilled in the art may set according to specific design requirements, for example: the preset threshold value may be 1 or 2, and when the historical transmission times are greater than the preset threshold value, it is indicated that the file to be transmitted is a file to be retransmitted. Each file to be transmitted can be transmitted for one time or multiple times, and specifically, when the file to be transmitted is transmitted for the first time, if the file to be transmitted is successfully transmitted, the transmission flow of the file is finished; if the transmission of the file to be transmitted fails, the file to be transmitted can be transmitted for the second time, so that each file to be transmitted can be transmitted for one time or multiple times. Therefore, in order to ensure the normal transmission process of the file to be transmitted, if the current file to be transmitted is a retry task, different task processors of different machine rooms are preferentially selected to process the file to be transmitted when the retry task fails and the task processing fails. Furthermore, in order to ensure the reliability of the transmission of the file to be transmitted again, the second processors which process the file to be transmitted in history can be acquired, the number of the second processors can be one or more, and then the first processor is selected from other processors except the second processor in the plurality of processors.
Through the technical scheme, the selection of the first processor is effectively realized, and the characteristics of the file to be transmitted and the state of the processor are specifically and comprehensively considered, for example: the data size of the file to be transmitted, the load state of the processor, different types of the file to be transmitted (whether the file is a retransmission file or not) and the condition of the queuing task of the processor are achieved, comprehensive intelligent scheduling is achieved, the performance of physical hardware is effectively improved, meanwhile, the processing quality and efficiency of the first processor on the file to be transmitted are guaranteed, the occurrence of abnormity is avoided, and the adaptability of an internet service scene is greatly improved.
S1022: selecting a first file server for transmitting a file to be transmitted from a plurality of preset file servers;
s1023: and determining a communication link formed by the first processor, the first file server and the gateway as a target gateway link.
The plurality of file servers are in communication connection with the plurality of processors, and the plurality of file servers can be in communication connection with the gatekeeper; therefore, after the first processor is determined, a first file server can be selected from the file servers, and the first file server is in communication connection with the first processor, so that a file to be transmitted, which is processed by the first processor, can be transmitted to a second network through the first file server and the gatekeeper, wherein a communication link formed by the first processor, the first file server and the gatekeeper is a target gatekeeper link in the first network.
By the method, the accuracy and reliability of the selection of the target gatekeeper link are effectively ensured, so that the centralized scheduling of a plurality of gatekeeper transmission links distributed across a machine room is realized, the influence on the transmission of files due to single-point faults is effectively avoided, and the expandability and disaster tolerance performance of the gatekeeper transmission links are improved, so that a plurality of possible identification approaches exist; and the stable processing and transmission of the file to be transmitted are ensured, and the transmission quality and efficiency of the file to be transmitted are improved.
Fig. 6 is a flowchart of a second method for transferring a file based on a gatekeeper according to an embodiment of the present invention; on the basis of the foregoing embodiment, with reference to fig. 6 continuously, in order to improve the quality and efficiency of the file to be transmitted, after selecting a first processor for processing the file to be transmitted from a plurality of preset processors, the method in this embodiment may further include:
s1024: and acquiring the data volume of the file to be transmitted.
The data size of the file to be transmitted refers to the data size of the file to be transmitted, and specifically, the data size of the file to be transmitted can be obtained by adopting a mode in the prior art.
S1025: and determining a file transmission channel in the first processor according to the data volume of the file to be transmitted.
Determining a file transmission channel arranged in the first processor according to the data volume of the file to be transmitted may include:
s10251: and if the data volume of the file to be transmitted is greater than or equal to a first preset threshold value, determining a first task channel in the first processor as a file transmission channel.
The first preset threshold is preset, and a person skilled in the art may set a specific value according to a specific design requirement, where the first preset threshold may be a minimum value for determining a large task, and the first preset threshold may be 1G, 1.3G, 1.5G, or 2G, and so on. When the data volume of the file to be transmitted is greater than or equal to a first preset threshold value, it is indicated that the data volume of the file to be transmitted is large, the file to be transmitted at this time may be a preset large file, at this time, in order to ensure the transmission quality and efficiency of the file to be transmitted, after the file to be transmitted is processed by the first processor, the file to be transmitted may be transmitted by using a first task channel in the first processor, where the first task channel is a preset large task channel for transmitting the large file.
S10252: and if the data volume of the file to be transmitted is smaller than a first preset threshold value, determining a second task channel in the first processor as a file transmission channel.
When the data volume of the file to be transmitted is smaller than a first preset threshold value, it is indicated that the data volume of the file to be transmitted is large, the file to be transmitted at this time can be a preset small file, at this time, in order to avoid the waste of transmission resources, after the file to be transmitted is processed by the first processor, the file to be transmitted can be transmitted by using a second task channel in the first processor, and the second task channel is a preset small task channel for transmitting the small file.
Further, referring to fig. 7, after the data amount of the file to be transmitted is smaller than the preset threshold, the method in this embodiment may further include:
s201: state information of the first task channel is obtained.
It can be understood that the state information of the first task channel may include an idle state and a non-idle state, and when there are more transmission tasks of the first task channel, it may be determined that the first task channel is in the non-idle state at this time; when the transmission tasks of the first task channel are less, determining that the first task channel is in an idle state at the moment; specifically, when acquiring the state information of the first task channel, an implementation manner may be that a state acquisition request is sent to the processor, feedback information sent by the processor is received, and the state information of the first task channel is determined according to the feedback information. Or, another implementation manner is to obtain the working parameters of the first task channel, and determine the state information of the first task channel according to the working parameters, for example: if the working parameter is smaller than the preset normal parameter, determining that the first task channel is in an idle state; and if the working parameter is greater than or equal to the preset normal parameter, determining that the first task channel is in a non-idle state. Of course, those skilled in the art may also use other manners to obtain the state information of the first task channel, as long as the accurate reliability of obtaining the state information of the first task channel can be ensured, which is not described herein again.
S202: and when the first task channel is in an idle state, determining the first task channel in the first processor as a file transmission channel.
S203: and when the first task channel is in a non-idle state, determining a second task channel in the first processor as a file transmission channel.
After the working state of the first task channel is obtained, the first task channel is suitable for transmitting a file to be transmitted of a large task, and for the file to be transmitted of a small task, when the first task channel is in an idle state, the first task channel can be determined as a file transmission channel of the file to be transmitted in order to improve the transmission efficiency of the file to be transmitted of the small task; when the first task channel is in a non-idle state, the second task channel may be determined as a file transmission channel of a file to be transmitted, where a standard for size differentiation of the file to be transmitted may be configured, in general, a first preset threshold may be set to 2G, when the data amount of the file to be transmitted is greater than or equal to 2G, the file to be transmitted may be determined to belong to a large task, and otherwise, the file to be transmitted is a small task.
By the aid of the transmission process of the files to be transmitted by different task channels in the processor, the files to be transmitted in a large size can be transmitted through the first task channel, the files to be transmitted in a small size can be transmitted through the first task channel, and the files to be transmitted in a small size can be transmitted through the second task channel when the first task channel is in a non-idle state, so that transmission quality of the files to be transmitted is guaranteed, and waste of transmission resources is reduced.
Fig. 8 is a flowchart of acquiring a file to be transmitted according to an embodiment of the present invention; on the basis of the foregoing embodiment, with reference to fig. 8, a specific obtaining manner of the file to be transmitted is not limited in this embodiment, and a person skilled in the art may select different obtaining manners according to specific design requirements, and preferably, obtaining the file to be transmitted in this embodiment may include:
s1011: and monitoring MQ messages of a message queue for submitting at least one file transmission task.
Where the message queue MQ messages may be from a business application that needs to pass data, it will be appreciated that one MQ message may correspond to one or more file transfer tasks.
S1012: and acquiring the data file corresponding to the at least one file transmission task according to the MQ message.
After the service side application sends the MQ message, the server may listen to the MQ message, and after a new file transfer task is listened to, the server may consume the MQ message, so that the data file corresponding to the file transfer task may be acquired, and the related information of the file transfer task may be stored in a preset database.
S1013: and acquiring a file to be transmitted from at least one data file.
When acquiring the file to be transmitted, an achievable way is that, as shown in fig. 9, acquiring the file to be transmitted in the at least one data file may include:
s10131: priority information of each data file in the at least one data file is obtained.
Each data file can correspond to different priority information according to a preset scheduling rule, and the priority information includes at least one of the following: transmission priority, traffic priority, content priority. Specifically, the transmission priority refers to the priority of the data file determined according to the transmission requirement of the file; the service priority is the priority of the data file determined according to the service type and the service characteristics of the file; the content priority is the priority of the data file determined from the content of the file.
S10132: and acquiring the file to be transmitted in at least one data file according to the priority information.
After the priority information of each data file is acquired, the file to be transmitted can be acquired from at least one data file according to the priority information, and specifically, the data file with higher priority information can be selected as the file to be transmitted. For example, when the priority information includes the transmission priority, the transmission priority of each data file in the at least one data file may be analyzed and compared, and one data file with the highest transmission priority is selected as the file to be transmitted, or several data files with higher transmission priorities are selected as the files to be transmitted.
When the priority information includes the service priority, the service priority of each data file in at least one data file can be analyzed and compared, and one data file with the highest service priority is selected as a file to be transmitted, or a plurality of data files with higher service priorities are selected as files to be transmitted.
When the priority information includes the content priority, the content priority of each data file in at least one data file can be analyzed and compared, and one data file with the highest content priority is selected as the file to be transmitted, or a plurality of data files with higher content priority are selected as the files to be transmitted.
It can be understood that, when the priority information includes a transmission priority, a service priority and a content priority, the file to be transmitted may be selected according to any one or any several pieces of priority information according to a preset scheduling rule, and at this time, the influence of the other priority information on the selection of the file to be transmitted may be ignored. For example, the file to be transmitted may be obtained from at least one data file according to the transmission priority of each data file; or, the file to be transmitted can be acquired from at least one data file according to the transmission priority and the service priority of each data file; or, the file to be transmitted may be acquired in at least one data file according to the service priority and the content priority of each data file. Or, preset weighted values of different priorities of each data file may also be acquired, that is: for each data file, different weighting proportions are correspondingly set for each type of priority information, the total priority weighting value of each data file is obtained according to a preset calculation mode, the file to be transmitted is obtained according to the total priority weighting value, and specifically, the file with the highest total priority weighting value can be used as the file to be transmitted. Of course, those skilled in the art may also use other manners to obtain the file to be transmitted, as long as it is ensured that the obtained file to be transmitted can meet the use requirement of the user, which is not described herein again.
Alternatively, when acquiring the file to be transmitted, another achievable way is that, as shown in fig. 10, acquiring the file to be transmitted in the at least one data file may include:
s10133: the transmission times of each data file in the at least one data file are obtained.
S10134: and determining the data file with the transmission times larger than or equal to a preset time threshold value as a file to be transmitted.
When the data file is transmitted, two transmission results exist in the data file, one is transmission failure, and the other is transmission success. When the data file transmission fails, in order to realize the data file transmission, the transmission task of the data file can be reset, so that the data task can be retransmitted, and the retransmitted data file can have a priority transmission characteristic relative to other data files which are transmitted for the first time, namely, the retransmitted data file can be transmitted preferentially. For example: the prior art is as follows: the method comprises the steps that files 1 and 2 are transmitted for 3 times, the transmission frequency of the file 2 is 1 time, the transmission frequency of the file 1 and the transmission frequency of the file 2 are respectively compared with a frequency threshold value 2, the transmission frequency of the file 1 is greater than 2, the transmission frequency of the file 2 is less than 2, at the moment, the file 1 can be preferentially determined to be a file to be transmitted, and therefore the file 1 can be preferentially transmitted.
The file to be transmitted is acquired by the method, so that the flexible reliability of acquiring the file to be transmitted is effectively ensured, the use requirements of different users are met, and the stable reliability of the method is further improved.
Fig. 11 is a fourth flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention; on the basis of the foregoing embodiment, with reference to fig. 11, in this embodiment, after acquiring the file to be transmitted, the method may further include:
s301: and acquiring the data volume of the file to be transmitted.
S302: and determining the transmission mode of the file to be transmitted according to the data volume.
After the data volume of the file to be transmitted is obtained, the data volume of the file to be transmitted can be analyzed and compared with a second preset threshold and a third preset threshold which are preset, and specifically, determining the transmission mode of the file to be transmitted according to the data volume can include:
s3021: and if the data volume of the file to be transmitted is greater than or equal to a second preset threshold value, splitting the file to be transmitted into a plurality of subfiles, and respectively transmitting the plurality of subfiles. Alternatively, the first and second electrodes may be,
the second preset threshold is preset, the specific numerical range of the second preset threshold is not limited in this embodiment, and those skilled in the art may set the second preset threshold according to specific design requirements, for example: the second preset threshold may be 1G, 2G, 3G, or the like, and is used as a criterion for determining whether to split the file to be transmitted, and when the data amount of the file to be transmitted is greater than or equal to the second preset threshold, it indicates that the file to be transmitted is large at this time, and in order to improve the transmission efficiency and transmission quality of the file to be transmitted, the file to be transmitted may be split into a plurality of subfiles, where the data amounts of the plurality of subfiles may be the same or may not be used, and the plurality of subfiles are transmitted respectively; at this point, one or more processors and one or more file servers may be employed to perform processing and transfer operations on the sub-files.
It can be understood that the data volume of each sub-file after the splitting process is greater than or equal to the third preset threshold, that is, the data volume of each sub-file after the splitting process is not very small, so that the waste of transmission resources can be effectively reduced while the quality and efficiency of transmission of the file to be transmitted are ensured.
S3022: and if the data volume of the file to be transmitted is smaller than a third preset threshold value, combining the file to be transmitted and other files to be transmitted into a file set, and transmitting the file set.
The third preset threshold is preset, the specific numerical range of the third preset threshold is not limited in this embodiment, and a person skilled in the art may set the third preset threshold according to specific design requirements, for example: the third preset threshold may be 0.1G, 0.22G, 0.53G, or the like, and is used as a criterion for determining whether to merge the files to be transmitted, and when the data amount of the files to be transmitted is smaller than the third preset threshold, it is indicated that the files to be transmitted are smaller.
It can be understood that the data size of the file set obtained after the merging is smaller than the second preset threshold, that is, the data size of the file set after the merging is not very large, so that the waste of transmission resources can be effectively reduced while the quality and efficiency of the transmission of the file to be transmitted are ensured.
Fig. 12 is a flowchart of a process for transferring a file to be transferred from a first network to a second network by using a target gatekeeper link according to an embodiment of the present invention; on the basis of the foregoing embodiment, with reference to fig. 12, in this embodiment, a specific implementation manner for transmitting a file to be transmitted from a first network to a second network by using a target gatekeeper link is not limited, and a person skilled in the art may select different implementation manners according to specific design requirements, which is more preferable, in this embodiment, transmitting the file to be transmitted from the first network to the second network by using the target gatekeeper link may include:
s1031: and identifying whether the file to be transmitted is a published file, wherein the published file is a file sent to a second network through a first network.
The purpose of identifying whether the file to be transmitted is a published file is as follows: the file transfer method includes the steps of detecting whether a file to be transferred is transited to a second network through a first network, and if the file to be transferred is transferred, storing the file to be transferred and corresponding file characteristics in a second storage area, so that when the file to be transferred is identified to be a published file, first file characteristics of the file to be transferred can be obtained first, wherein the first file characteristics include at least one of the following: file signature, file label, file abstract; and then judging whether the file to be transmitted is a published file or not according to the first file characteristic.
Specifically, referring to fig. 13, the identifying whether the file to be transmitted is a published file in this embodiment may include:
s10311: searching whether a standard file characteristic matched with the first file characteristic is stored in a preset second storage area, wherein the second storage area is used for storing the published file and the standard file characteristic corresponding to the published file,
s10312: and if so, determining the file to be transmitted as the published file.
S10313: and if not, determining that the file to be transmitted is an unreleased file.
After the first file features of the file to be transmitted are obtained, whether standard file features matched with the first file features exist or not can be searched in the second storage area, where matching may mean that the standard file features are completely the same, or similarity is greater than or equal to a preset similarity threshold. Further, if the second storage area has a standard file feature matched with the first file feature, it is indicated that the file to be transmitted corresponding to the first file feature is a published file, and if the second storage area does not have the standard file feature matched with the first file feature, it is indicated that the file to be transmitted corresponding to the first file feature is an unpublished file, where the unpublished file is a file that is not sent to the second network through the first network.
S1032: if the file to be transmitted is a published file, acquiring first file characteristics for identifying the file to be transmitted, and transmitting the first file characteristics to a second network through a target gateway link; alternatively, the first and second electrodes may be,
after the file to be transmitted is determined to be the published file, in order to improve the transmission efficiency of the file, the file to be transmitted does not need to be transmitted again, but the first file characteristic used for identifying the file to be transmitted is directly sent to a second network through a target gatekeeper link, so that the second transmission function of the file is realized, namely: in the files which are transited before, the files are not needed to be transited in the subsequent transmission task, and the file characteristics are transited, so that the second network can obtain the corresponding files from the local according to the file characteristics, and the efficiency and the quality of file acquisition are effectively ensured.
S1033: and if the file to be transmitted is a non-published file, wherein the non-published file is a file which is not sent to the second network through the first network, the file to be transmitted is sent to the second network through the target gatekeeper link.
After determining that the file to be transmitted is an unpublished file, the file to be transmitted may be directly sent to the second network through the target gatekeeper link, so that the second network may perform corresponding processing on the sent file to be transmitted, for example: browsing, auditing, etc.
Further, after obtaining the first file feature for identifying the file to be transmitted, the method in this embodiment may further include:
s401: and storing the file to be transmitted and the first file characteristics in a preset first storage area.
In order to facilitate the retrieval and viewing of the file to be transmitted by a user in the first network, the file to be transmitted and the first file feature may be correspondingly stored in the first storage area.
Through the process, different transmission modes can be effectively adopted for different files to be transmitted, if the files to be transmitted are published files, the first file characteristics of the files to be transmitted can be directly ferried to the second network, and if the files to be transmitted are non-published files, the files to be transmitted can be directly ferried to the second network, so that the files to be transmitted, which can be quickly and accurately obtained by the second network, are effectively ensured, and the flexibility and reliability of the file transmission method are further improved.
Fig. 14 is a fifth flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention; on the basis of the foregoing embodiment, as can be seen with reference to fig. 14, in order to ensure stable and reliable file transmission, in this embodiment, before the file to be transmitted is transmitted from the first network to the second network by using the target gatekeeper link, the method may further include:
s501: detecting the working state of a target gatekeeper link;
for the target gatekeeper link, the working state thereof can comprise a normal state and a fault state; specifically, the specific implementation process of detecting the working state of the target gatekeeper link is similar to the specific implementation process of step S10211, and reference may be specifically made to the above statements, which are not repeated herein.
S502: and when the working state of the target gateway link is a fault state, re-determining the target gateway link, and transferring the transmission task on the target gateway link in the fault state to the re-determined target gateway link.
When the working state of the target gatekeeper link is a fault state, the scheduling server can re-determine a new target gatekeeper link and transfer the transmission task on the target gatekeeper link in the fault state, so that the continuity of file transmission is effectively ensured, and the stability and reliability of the file transmission are improved.
S503, when the working state of the target gatekeeper link is a normal state, the target gatekeeper link is utilized to realize the transmission of the file to be transmitted.
It can be understood that, after the working status of the target gatekeeper link is the failure status, the method in this embodiment may further include:
s504: and removing the target gatekeeper link from the preset gatekeeper transmission links.
By eliminating the target gatekeeper link in the fault state from the plurality of gatekeeper transmission links, other transmission tasks are effectively prevented from being selected to the target gatekeeper link in the fault state, and the transmission quality and efficiency of the file to be transmitted are ensured.
Fig. 15 is a sixth flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention; on the basis of the foregoing embodiment, with continued reference to fig. 15, the method in this embodiment may further include:
s601: a second file characteristic sent by a second network is received over the target gatekeeper link.
After receiving a file to be transmitted, which is transmitted by a first network through a target gatekeeper link, by a second network, acquiring second file characteristics of the file to be transmitted, and correspondingly storing the second file characteristics and the file to be transmitted into a preset third storage area; and the second network may return the second file feature over the target gatekeeper link, such that the server in the first network may receive the second file feature over the target gatekeeper link.
S602: and comparing the first file characteristic with the second file characteristic analysis.
After the second file characteristics are obtained, the first file characteristics which are stored in advance and correspond to the files to be transmitted can be called, and then the first file characteristics and the received second file characteristics are analyzed and compared.
S603: and if the first file characteristics are consistent with the second file characteristics, correspondingly processing the file to be transmitted in the first network.
If the result of the analysis and comparison indicates that the first file feature is consistent with the second file feature, it indicates that the file to be transmitted is not modified, and therefore, for the first network, the file to be transmitted may be correspondingly processed, for example: a distribution process, a transmission process, and the like.
S604: and if the first file characteristic is inconsistent with the second file characteristic, the file to be transmitted is sent to a second network through the target gatekeeper link, and the first file characteristic is updated to be the second file characteristic.
If the analysis and comparison result shows that the first file characteristics are inconsistent with the second file characteristics, it is indicated that the file to be transmitted at the moment is modified, that is, the file to be transmitted in the second network is inconsistent with the file to be transmitted in the first network, and at this moment, in order to ensure the quality of file transmission, the file to be transmitted may be retransmitted, and the first file characteristics pre-stored in the first network are changed into the second file characteristics.
By the method, the second return function between the first network and the second network is effectively realized, namely the file which is ferried to the second network from the first network does not need to be ferried to the first network from the second network again, and only the file characteristics need to be ferried to the first network, so that the transmission efficiency of the file is effectively improved, and the stable reliability of file transmission is ensured.
Fig. 16 is a seventh flowchart of a file transmission method based on a gatekeeper according to an embodiment of the present invention; on the basis of the foregoing embodiment, with continued reference to fig. 16, before the file to be transmitted is transmitted from the first network to the second network by using the target gatekeeper link, the method in this embodiment further includes:
s701: and sending the file to be transmitted to a preset detection device so as to utilize the detection device to identify the legality of the file to be transmitted.
S702: and acquiring the identification result of the detection device.
S703: and if the file to be transmitted is legal, allowing the file to be transmitted.
S704: and if the file to be transmitted is illegal, interrupting the transmission process of the file to be transmitted.
The detection device can comprise a security check center and a sandbox, wherein the sandbox is used for carrying out validity identification on the file to be transmitted, and the security check center can obtain an identification result of the sandbox and return the identification result to the server through a target gatekeeper link, so that the server can obtain the identification result; and then different processing can be carried out on the transmission process of the file to be transmitted according to different identification results.
Specifically, when the detection device identifies the legality of the file to be transmitted, the file identifier of the file to be transmitted can be acquired; and comparing the file identification with a file identification stored in a preset file identification library in advance, and judging the legality of the file to be uploaded according to a comparison result, wherein the file identification library comprises a white list file identification library and a black list file identification library. Judging that the file to be transmitted is legal under the condition that the read file identification is matched with any one identification in the white list file identification library; and under the condition that the read file identification is matched with any one identification in the blacklist file identification library, judging that the file to be transmitted is illegal. Or, the content of the file to be transmitted may be identified, and if the content of the file to be transmitted includes illegal content, it may be determined that the file to be transmitted is illegal, otherwise, it may be determined that the file to be transmitted is legal. Or acquiring the user identity of the file to be transmitted, if the user identity is legal, determining that the file to be transmitted is legal, otherwise, determining that the file to be transmitted is illegal.
It can be understood that those skilled in the art may also implement the legitimacy identification of the file to be transmitted in other manners, as long as the identification accuracy and reliability of the file to be transmitted can be ensured, which is not described herein again.
Before the file to be transmitted is transmitted, the file to be transmitted is subjected to legality identification, so that the file to be transmitted is effectively ensured to be stably and effectively transmitted, the illegal file to be transmitted is interrupted from being transmitted, the attack of the illegal file on a network is avoided, and the safety and reliability of the file transmission method are effectively improved.
FIG. 17 is a first flowchart of another gatekeeper-based file transfer method according to an embodiment of the present invention; referring to fig. 17, another aspect of the present embodiment provides another gatekeeper-based file transfer method, where an execution subject of the file transfer method may be a server located in a second network, and when the server executes the method, file transfer between a first network and the second network of different levels may be achieved, and file transfer efficiency may also be ensured. Specifically, the method may include:
s801: and selecting a target transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the second gatekeeper transmission link is used for realizing the file transmission between the second network and the first network at different levels.
Specifically, referring to fig. 18, selecting a target transmission link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links may include:
s8011: and selecting a second processor for processing the file to be transmitted from a plurality of preset processors.
As can be seen from the above, the first processor may perform the following processing operations on the file to be transmitted: the file address is analyzed, the file is downloaded, the file is signed, the file is packaged and the like, and the processing operation can effectively prevent the file to be transmitted from being tampered. Correspondingly, the second processor may perform the following processing operations on the file to be transmitted: unpacking files, checking labels, uploading files, generating new file storage addresses, notifying related applications to receive messages, and the like.
It should be noted that the related application notified by the second processor refers to a service application that submits a transmission task, for example, a video file needs to be transmitted from a low-security network to a high-security network, the application that sends a task message may be a video application in the low-security network, a file address included in MQ message content submitted by the video application is an address of the low-security network, after the video file is transmitted to the high-security network, the file address may be replaced with a storage address corresponding to a file in the high-security network, so that the corresponding video application in the high-security network corresponds to the file address, and at this time, the message received by the related application is notified as the storage address of the file in the high-security network.
S8012: and selecting a second file server for transmitting the file to be transmitted from a plurality of preset file servers.
S8013: and determining a communication link formed by the second processor, the second file server and the network gate element as a target transmission link.
In this embodiment, a specific implementation process and an implementation effect of selecting a target transmission link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links are similar to those of selecting a target transmission link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links.
S802: and receiving the file to be transmitted sent by the first network through the target transmission link.
It should be noted that the target transmission link in this embodiment is different from the target gatekeeper link in the above embodiment, and the target transmission link in this embodiment at least includes: the file transmission system comprises a second processor and a second file server, wherein the second processor is used for processing files to be transmitted, the second file server is used for transmitting the files to be transmitted, and the second processor and the second file server belong to a second network; and the first processor and the second file server in the target gatekeeper link belong to the first network.
It is understood that the target gatekeeper link in the first network and the target transmission link in the second network constitute a whole gatekeeper link, which can implement file transmission between the first network and the second network, and the whole gatekeeper link can include: the gateway comprises a first processor and a first file server which are positioned in a first network, a second processor and a second file server which are positioned in a second network and a gateway, wherein the gateway can be positioned in the first network or the second network, the specific connection relationship is that the first processor is in communication connection with the first file server, the first file server is in communication connection with the second file server through the gateway, and the second file server is in communication connection with the second processor, so that the whole gateway link is formed.
S803: and processing the file to be transmitted according to a preset processing strategy.
The preset processing policy is preset, and the specific content of the preset processing policy is not limited in this embodiment, for example: the preset processing strategy may be a preset auditing strategy, and then auditing operation may be performed on the file to be transmitted based on the auditing strategy, or the preset processing strategy may be a preset browsing strategy, and then browsing operation may be performed on the file to be transmitted based on the browsing strategy. Of course, those skilled in the art may also adopt other processing strategies according to specific design requirements, and details are not described herein.
Referring to fig. 21, it can be understood that the method in this embodiment may further include:
s901: acquiring a processing result for processing a file to be transmitted according to a preset processing strategy;
s902: and sending the processing result to the first network through the target transmission link.
In the file transmission method based on the gatekeeper provided by the embodiment, the file to be transmitted sent by the first network is received through the preset target transmission link, and the file to be transmitted is processed according to the preset processing strategy, so that the file transmission process between the first network and the second network in different levels is effectively realized, and the file to be transmitted can be correspondingly processed by the second network, so that the use requirements of users are met, and the practicability of the file transmission method is further improved.
FIG. 19 is a flowchart illustrating another gatekeeper-based file transfer method according to an embodiment of the present invention; on the basis of the above embodiment, referring to fig. 19, the method in this embodiment may further include:
s1001: acquiring file characteristics of a file to be transmitted;
the file characteristics may be acquired by the server after analyzing and identifying the file to be transmitted, or may be acquired by the server directly receiving the file characteristics sent by the first network through the target transmission link.
S1002: and correspondingly storing the file to be transmitted and the file characteristics into a preset third storage area.
The file to be transmitted and the file characteristics are correspondingly stored in the third storage area, so that the file to be transmitted is effectively and conveniently called and checked, and the stability and the reliability of the file transmission method are further improved.
Further, referring to fig. 20, the method in this embodiment may further include:
s1101: a first file characteristic sent by a first network is received over a destination transmission link.
S1102: the transferred file corresponding to the first file characteristic is acquired in the third storage area.
S1103: and acquiring second file characteristics of the transmitted file, and sending the second file characteristics to the first network through the target transmission link.
When a file to be transmitted, which is required to be transmitted by a first network, is a published file, the first network sends a first file characteristic of the file to be transmitted to a second network, and the second network can receive the first file characteristic through a target transmission link, after receiving the first file characteristic, the corresponding transferred file can be directly called and viewed in the preset third storage area based on the first file characteristic, in order to ensure the accurate reliability of the processing operation of the transferred file by the second network, second file characteristics of the transmitted files can be obtained and returned to the first network, so that the first network judges whether the files to be transmitted are tampered according to the second file characteristics, if the file to be transmitted is tampered, the file to be transmitted needs to be retransmitted, and if the file to be transmitted is not tampered, the first network can directly perform corresponding operation on the file to be transmitted.
It can be understood that, when a corresponding transmitted file cannot be found in the preset third storage area according to the first file feature, the transmitted file may be deleted or damaged in the second network, and the server of the second network may send corresponding feedback information to the first network, so that the first network resends the file to be transmitted according to the feedback information, thereby ensuring stable reliability of transmission of the file to be transmitted.
In specific application, in order to facilitate understanding of the technical solution of this embodiment, a low-security-level network is taken as a first network, a high-security-level network is taken as a second network, and a file summary is taken as a file feature of a file to be transmitted. In one aspect, referring to fig. 22, the present application embodiment provides a file transmission method, including the following steps:
(1) a first scheduling server in the low-security network may obtain a file to be transmitted through a preset first storage area OSS 1.
The service side application submits the transmission task through the MQ message, the first scheduling server can monitor the MQ message, and when a new MQ message is monitored, the first scheduling server can consume the MQ message, so that the file to be transmitted related to the transmission task is obtained.
(2) The file to be transmitted is stored in the OSS4 in a preset fourth storage area.
(3) And the file to be transmitted is transited to the high-security network through a pre-selected network gate link, and at the moment, a second scheduling server in the high-security network can receive the file to be transmitted.
As for the gatekeeper links, as can be seen with reference to fig. 24, each gatekeeper link may include: the system comprises a task processor and a file server in a low-security network, gatekeeper hardware, and a task processor and a file server in a high-security network; that is, a cross-level unidirectional gatekeeper link is formed by the task processor, the file server, the gatekeeper hardware, the file server and the task processor, and the file to be transmitted can be transmitted only in a unidirectional way through the gatekeeper link, so that the file server and the gatekeeper hardware are in a corresponding relation of N: 1.
In addition, as for the gatekeeper link, there may be a plurality of gatekeeper links between the low-security network and the high-security network, and at least 4 gatekeeper links between the low-security network and the high-security network are taken as an example for description: the first gatekeeper link is arranged in the host computer room and used for realizing the purpose that the low-security network sends a file to the high-security network; the second gatekeeper link is arranged in the standby machine room and used for realizing the purpose that the low-security network sends a file to the high-security network; the third gatekeeper link is arranged in the host computer room and is used for realizing the transmission of a file from the high-security network to the low-security network; the fourth gatekeeper link is arranged in the standby machine room and used for realizing the purpose that the high-security network sends files to the low-security network; the network brake link structure of the standby machine room is the same as the network brake link structure in the main machine room. Moreover, when selecting the task processor in the gatekeeper link, the task processor needs to process the file to be transmitted, and the task processor may include, with respect to the file to be transmitted: and the task processors are positioned in the same machine room and cross machine rooms. Specifically, the scheduling server can select to schedule the task processors in the same machine room or across machine rooms, wherein the selection of the task processors in the same machine room can enable the transmission efficiency of the gatekeeper link to be faster; the task processors which cross the machine room can be selected to have better disaster tolerance requirements, and the task processors in the same machine room are preferably selected to be common.
The machine room-crossing distributed deployment is realized through the plurality of network gate links, at least two network gate links in each direction are distributed in the main machine room and the standby machine room, the scheduling server can schedule all the network gate links of the main machine room and the standby machine room, and when one network gate link fails, the scheduling server can quickly transfer the transmission task on the network gate link to other available network gate links, so that the task is ensured not to be interrupted.
(4) The second scheduling server may store the received file to be transmitted in a preset second storage area OSS2, and perform corresponding service processing on the file to be transmitted, such as: browsing and approving, etc.
(5) The second dispatch server may ferry the file digest S1 of the file to be transmitted back to the low-security level network through the pre-selected gatekeeper link.
(6) The first dispatch server in the low-security level network may receive the file digest S1, obtain the pre-stored file digest S2 in the OSS4, compare S2 with S1, and determine whether the two are consistent.
(7) When the comparison result of S1 and S2 is consistent, it indicates that the file to be transmitted is not tampered, so that the file to be transmitted can be moved from the OSS4 to the preset third storage area OSS3 for stable storage, and the file to be transmitted can also be directly obtained from the OSS3 or OSS4 of the low-security-level network, and the file to be transmitted is subjected to subsequent service processing, for example: publish the file, etc.
The above process effectively realizes the function of second return between the low-security network and the high-security network, namely that the low-security network ferries the file of the high-security network, and the file is not ferred from the high-security network to the low-security network, but the characteristics of the file are ferred to the low-security network, so that the transmission efficiency of the file is effectively improved.
On the other hand, referring to fig. 23, the present application embodiment provides another file transmission method, including the following steps:
(11) a first scheduling server in the low-security network may obtain a file to be transmitted and a file summary of the file to be transmitted through a preset first storage area OSS 1.
(12) The file to be transmitted and the file digest of the file to be transmitted are stored in the OSS4 in the preset fourth storage area.
(13) And judging whether a transmitted file identical to the file digest exists in a preset third storage area OSS3 or OSS4, if so, only raising the file digest to a high-security network, and at the moment, a second scheduling server in the high-security network can receive the file digest.
(14) The second scheduling server acquires files identical to the file digests in a preset second storage area according to the file digests; and can perform corresponding service processing on the file to be transmitted, such as: browsing and approving, etc.
(5) The second dispatch server may ferry the file digest S1 of the file to be transmitted back to the low-security level network through the pre-selected gatekeeper link.
(6) The first dispatch server in the low-security level network may receive the file digest S1, obtain the pre-stored file digest S2 in OSS3 or OSS4, compare S2 with S1, and determine whether the two are consistent.
(7) When the comparison result of S1 and S2 is consistent, it indicates that the file to be transmitted has not been tampered, so that the file to be transmitted can be moved from OSS4 to OSS3 for stable storage; alternatively, files already stored in the OSS3 may be executed.
The process effectively realizes the function of second transmission between the low-security network and the high-security network, namely, the low-security network is used for ferrying the file to the high-security network before, the file is not required to be ferred again in the subsequent transmission task, and only the file abstract is required to be ferred to the high-security network, so that the high-security network can obtain the file locally according to the file abstract, and the file can be ensured not to be falsified through signature verification.
Theoretically, the second return and the second return process can save at least half of the transmitted data volume, and from the measured data in the following table, for the service scenes of the examination and approval, the repeated modification of the examination and approval part of the contents or other different application scenes, the second return and the second return functions of the file can actually save at least half of the transmitted data volume practically, and the file transmission efficiency is improved by dozens of times to hundreds of times.
Contrast item Before second transmission After second transmission
200GB file task time consumption 5 hours 5 minutes
40GB file task time consumption 3 hours 4 minutes
2375 Total File task time 1500s
2216 File tasks Total time consumption 50s
In addition, it should be noted that, no matter in the second transmission process or the second transmission process, before the file to be transmitted is transmitted, the method in this embodiment further includes:
(31) the security of the file to be transmitted is detected through a preset detection device, wherein the detection device can be a third-party device in communication connection with the scheduling server, and at the moment, the detection device can interact with the scheduling server through MQ messages; alternatively, the detection means may be integrated in other devices of the first network or the second network.
The detection device can safely scan the file to be transmitted submitted by the service party, and continues to process tasks after no problem exists, so that a safe distributed gatekeeper is formed. The detection device can integrate a plurality of third-party scanning tools to realize omnibearing file scanning, including conventional file formats, APT and the like. For example, the detection device comprises a cross-level file security inspection center and an advanced persistent threat APT sandbox, and the specific flow is as follows: carrying out security scanning on a file to be transmitted which is transited from a low-security-level network to a high-security-level network through an APT sandbox so as to prevent the high-security-level network from being damaged by unsafe files; if the file is found to be in a problem by scanning, the transmission flow of the file can be interrupted, an alarm is given, and the file is relocated to a high-density network after manual treatment without the problem; the cross-level file security check center can acquire a file to be transmitted, send the file to be transmitted to the APT sandbox, periodically query a scanning result according to a preset query period, return the scanning result to the low-security level network, and specifically provide a manual processing interface and subsequent flow processing.
In the embodiment, the second transmission and second return functions effectively realize that the file ferrying efficiency is greatly improved on the basis of ensuring safe blocking/physical isolation, and the second return function can theoretically improve the efficiency of a common gateway by one time; in addition, before the file is transmitted, the file can be scanned safely, and the task is processed continuously after no problem exists, so that a safe distributed network gate communication link is formed, the omnibearing file scanning is realized, including a conventional file format, APT and the like, and the safety and the reliability of the file transmission are effectively improved.
Fig. 25 is a schematic structural diagram of a file transfer device based on a gatekeeper according to an embodiment of the present invention; referring to fig. 25, the present embodiment provides a gatekeeper-based document transmission apparatus, which can execute the document transmission method described above, and specifically, the apparatus may include:
the acquisition module 11 is used for acquiring a file to be transmitted;
the first selection module 12 is configured to select a target gatekeeper link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, where the gatekeeper transmission links are used to implement file transmission between a first network and a second network at different levels;
and the transmission module 13 is configured to transmit the file to be transmitted from the first network to the second network by using the target gatekeeper link.
Wherein, the target gatekeeper link at least comprises: the system comprises a first processor used for processing files to be transmitted, a first file server used for transmitting the files to be transmitted and a network gate element. The first network is a preset low-density network, and the second network is a preset high-density network; or the first network is a preset high-security network, and the second network is a preset low-security network.
Optionally, when the first selecting module 12 selects a target gatekeeper link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, the first selecting module 12 may be configured to perform: selecting a first processor for processing a file to be transmitted from a plurality of preset processors; selecting a first file server for transmitting a file to be transmitted from a plurality of preset file servers; and determining a communication link formed by the first processor, the first file server and the gateway as a target gateway link.
Optionally, when the first selecting module 12 selects a first processor for processing the file to be transmitted from a plurality of preset processors, the first selecting module 12 may be configured to perform: acquiring the working state of each processor in a plurality of processors; a first processor is selected among the plurality of processors in a normal operating state.
When the first selection module 12 selects the first processor from the plurality of processors in the normal operating state, in an achievable manner, the first selection module 12 may be configured to perform: obtaining a file processing capability of each of the plurality of processors, the file processing capability including at least one of: load information, file capacity information, file transfer volume; a first processor is selected among the plurality of processors based on the file processing capability. In another implementation, the first selection module 12 may be configured to perform: acquiring historical transmission times of a file to be transmitted; if the historical transmission times are larger than or equal to a preset time threshold, determining a second processor for analyzing and processing the file to be transmitted in the historical transmission process; the first processor is selected among the other processors excluding the second processor among the plurality of processors.
Optionally, after the first selecting module 12 selects a first processor for processing the file to be transmitted from a plurality of preset processors, the first selecting module 12 in this embodiment may be further configured to: acquiring the data volume of a file to be transmitted; and determining a file transmission channel in the first processor according to the data volume of the file to be transmitted.
When the first selection module 12 determines the file transmission channel arranged in the first processor according to the data amount of the file to be transmitted, the first selection module 12 may be configured to perform: if the data volume of the file to be transmitted is larger than or equal to a first preset threshold value, determining a first task channel in the first processor as a file transmission channel; or if the data volume of the file to be transmitted is smaller than a first preset threshold value, determining a second task channel in the first processor as a file transmission channel.
Optionally, after the data amount of the file to be transmitted by the first selection module 12 is smaller than the preset threshold, the first selection module 12 in this embodiment may be further configured to: acquiring state information of a first task channel; when the first task channel is in an idle state, determining the first task channel in the first processor as a file transmission channel; or, when the first task channel is in a non-idle state, determining the second task channel in the first processor as a file transfer channel.
Optionally, when the obtaining module 11 obtains the file to be transmitted, the obtaining module 11 may be configured to perform: monitoring message queue MQ messages for submitting at least one file transmission task; acquiring a data file corresponding to at least one file transmission task according to the MQ message; and acquiring a file to be transmitted from at least one data file.
When the obtaining module 11 obtains the file to be transmitted in the at least one data file, an achievable manner is that the obtaining module 11 may be configured to perform: acquiring priority information of each data file in at least one data file; and acquiring the file to be transmitted in at least one data file according to the priority information. In another implementation, the obtaining module 11 may be configured to perform: acquiring the transmission times of each data file in at least one data file; and determining the data file with the transmission times larger than or equal to a preset time threshold value as a file to be transmitted.
Optionally, the obtaining module 11 in this embodiment may be further configured to obtain the data size of the file to be transmitted after obtaining the file to be transmitted; and determining the transmission mode of the file to be transmitted according to the data volume.
When the obtaining module 11 determines the transmission mode of the file to be transmitted according to the data amount, the obtaining module 11 may be configured to execute: if the data volume of the file to be transmitted is larger than or equal to a second preset threshold value, splitting the file to be transmitted into a plurality of subfiles, and respectively transmitting the plurality of subfiles; or if the data volume of the file to be transmitted is smaller than a third preset threshold, combining the file to be transmitted and other files to be transmitted into a file set, and transmitting the file set.
Optionally, when the transmission module 13 transmits the file to be transmitted from the first network to the second network by using the target gatekeeper link, the transmission module 13 is specifically configured to perform the steps of identifying whether the file to be transmitted is a published file, wherein the published file is a file sent to the second network through the first network; if the file to be transmitted is a published file, acquiring first file characteristics for identifying the file to be transmitted, and transmitting the first file characteristics to a second network through a target gateway link; or if the file to be transmitted is a non-published file, wherein the non-published file is a file which is not sent to the second network through the first network, the file to be transmitted is sent to the second network through the target gatekeeper link.
Wherein the first file characteristic comprises at least one of: file signature, file label, file abstract.
Optionally, the transmission module 13 may be further configured to store the file to be transmitted and the first file feature in a preset first storage area after obtaining the first file feature for identifying the file to be transmitted.
Optionally, when the transmission module 13 identifies whether the file to be transmitted is a published file, the transmission module 13 may be configured to perform: searching whether a standard file feature matched with the first file feature is stored in a preset second storage area, wherein the second storage area is used for storing the published file and the standard file feature corresponding to the published file; if so, determining the file to be transmitted as a published file; or if the file does not exist, determining that the file to be transmitted is an unreleased file.
Optionally, the transmission module 13 in this embodiment may also be configured to detect a working state of the target gatekeeper link before the target gatekeeper link is used to transmit the file to be transmitted from the first network to the second network; and when the working state of the target gateway link is a fault state, re-determining the target gateway link, and transferring the transmission task on the target gateway link in the fault state to the re-determined target gateway link.
Optionally, the transmission module 13 in this embodiment may be further configured to remove the target gatekeeper link from the preset multiple gatekeeper transmission links after the working state of the target gatekeeper link is the failure state.
Optionally, the obtaining module 11 in this embodiment may be further configured to perform: receiving, over a target gatekeeper link, a second file characteristic transmitted by a second network; comparing the first file characteristic with the second file characteristic analysis; if the first file characteristics are consistent with the second file characteristics, correspondingly processing the file to be transmitted in the first network; or if the first file characteristic is inconsistent with the second file characteristic, the file to be transmitted is sent to the second network through the target gatekeeper link, and the first file characteristic is updated to be the second file characteristic.
Optionally, the transmission module 13 in this embodiment may be further configured to send the file to be transmitted to a preset detection device before the file to be transmitted is transmitted from the first network to the second network by using the target gatekeeper link, so as to perform validity identification on the file to be transmitted by using the detection device; acquiring an identification result of the detection device; if the file to be transmitted is legal, allowing the file to be transmitted; or if the file to be transmitted is illegal, interrupting the transmission process of the file to be transmitted.
The apparatus shown in fig. 25 can perform the method of the embodiment shown in fig. 1-16, and the detailed description of this embodiment can refer to the related description of the embodiment shown in fig. 1-16. The implementation process and technical effect of the technical solution are described in the embodiments shown in fig. 1 to 16, and are not described herein again.
In one possible design, the structure of the gatekeeper-based file transfer apparatus shown in fig. 25 may be implemented as an electronic device, which may be a mobile phone, a tablet computer, a server, or other devices. As shown in fig. 26, the electronic device may include: a first processor 21 and a first memory 22. Wherein the first memory 22 is used for storing a program for supporting the electronic device to execute the gatekeeper-based file transmission method provided in the embodiments shown in fig. 1 to 16, and the first processor 21 is configured to execute the program stored in the first memory 22.
The program comprises one or more computer instructions, wherein the one or more computer instructions, when executed by the first processor 21, are capable of performing the steps of:
acquiring a file to be transmitted;
selecting a target gatekeeper link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a first network and a second network at different levels;
and transmitting the file to be transmitted from the first network to the second network by using the target gateway link.
Optionally, the first processor 21 is further configured to perform all or part of the steps in the embodiments shown in fig. 1 to 16.
The electronic device may further include a first communication interface 23 for communicating with other devices or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the gatekeeper-based file transfer method in the method embodiments shown in fig. 1 to 16.
Fig. 27 is a schematic structural diagram of another gatekeeper-based document transportation apparatus according to an embodiment of the present invention; referring to fig. 27, this embodiment provides another gatekeeper-based document transportation apparatus, which can perform another document transportation method described above, and specifically, the apparatus may include:
a second selecting module 31, configured to select a target transmission link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, where the gatekeeper transmission links are used to implement file transmission between a second network and a first network at different levels;
a receiving module 32, configured to receive, through a preset target gatekeeper link, a file to be transmitted, where the file is sent by a first network;
and the processing module 33 is configured to process the file to be transmitted according to a preset processing policy.
Wherein, the target transmission link at least comprises: the second processor is used for processing the file to be transmitted and the second file server is used for transmitting the file to be transmitted.
Optionally, when the second selecting module 31 selects a target transmission link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, the second selecting module 31 may be configured to perform: selecting a second processor for processing the file to be transmitted from a plurality of preset processors; selecting a second file server for transmitting a file to be transmitted from a plurality of preset file servers; and determining a communication link formed by the second processor, the second file server and the network gate element as a target transmission link.
Optionally, the receiving module 32 in this embodiment may also be configured to perform obtaining file characteristics of a file to be transmitted; and correspondingly storing the file to be transmitted and the file characteristics into a preset third storage area.
Optionally, the processing module 33 in this embodiment may be configured to perform: receiving, over a target transmission link, a first file characteristic sent by a first network; acquiring a transmitted file corresponding to the first file characteristic in a third storage area; and acquiring second file characteristics of the transmitted file, and sending the second file characteristics to the first network through the target transmission link.
Optionally, the processing module 33 in this embodiment may be configured to perform: acquiring a processing result for processing a file to be transmitted according to a preset processing strategy; and sending the processing result to the first network through the target transmission link.
The apparatus shown in fig. 27 can perform the method of the embodiment shown in fig. 17-21, and reference may be made to the related description of the embodiment shown in fig. 17-21 for parts of this embodiment that are not described in detail. The implementation process and technical effect of the technical solution are described in the embodiments shown in fig. 17 to 21, and are not described herein again.
In one possible design, the structure of the gatekeeper-based file transfer apparatus shown in fig. 27 may be implemented as an electronic device, which may be a device such as a mobile phone, a tablet computer, a server, or the like. As shown in fig. 28, the electronic device may include: a second processor 41 and a second memory 42. Wherein the second memory 42 is used for storing programs that support the electronic device to execute the gatekeeper-based file transfer method provided in the embodiments shown in fig. 17-21, and the second processor 41 is configured to execute the programs stored in the second memory 42.
The program comprises one or more computer instructions, wherein the one or more computer instructions, when executed by the second processor 41, are capable of performing the steps of:
selecting a target transmission link for transmitting a file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a second network and a first network at different levels;
receiving a file to be transmitted sent by a first network through a target transmission link;
and processing the file to be transmitted according to a preset processing strategy.
Optionally, the second processor 41 is further configured to perform all or part of the steps in the embodiments of fig. 17-21.
The electronic device may further include a second communication interface 43 for communicating with other devices or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the gatekeeper-based file transfer method in the method embodiments shown in fig. 17 to 21.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by adding a necessary general hardware platform, and of course, can also be implemented by a combination of hardware and software. With this understanding in mind, the above-described aspects and portions of the present technology which contribute substantially or in part to the prior art may be embodied in the form of a computer program product, which may be embodied on one or more computer-usable storage media having computer-usable program code embodied therein, including without limitation disk storage, CD-ROM, optical storage, and the like.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (33)

1. A file transmission method based on a network gate is characterized by comprising the following steps:
acquiring a file to be transmitted;
selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a first network and a second network at different levels;
and transmitting the file to be transmitted from the first network to the second network by using the target gateway link.
2. The method of claim 1, wherein the target gatekeeper link comprises at least: the file transmission system comprises a first processor used for processing the file to be transmitted, a first file server used for transmitting the file to be transmitted and a network gateway.
3. The method of claim 2, wherein selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links comprises:
selecting a first processor for processing the file to be transmitted from a plurality of preset processors;
selecting a first file server for transmitting the file to be transmitted from a plurality of preset file servers;
and determining a communication link formed by the first processor, the first file server and the gateway element as the target gateway link.
4. The method according to claim 3, wherein selecting a first processor for processing the file to be transmitted from a plurality of preset processors comprises:
acquiring the working state of each processor in a plurality of processors;
selecting the first processor among a plurality of the processors in a normal operating state.
5. The method of claim 4, wherein selecting the first processor among the plurality of processors in a normal operating state comprises:
obtaining a file processing capability of each processor of a plurality of processors, the file processing capability comprising at least one of: load information, file capacity information, file transfer volume;
selecting the first processor among the plurality of processors according to the file processing capability.
6. The method of claim 4, wherein selecting the first processor among the plurality of processors in a normal operating state comprises:
acquiring historical transmission times of the file to be transmitted;
if the historical transmission times are larger than or equal to a preset time threshold, determining a second processor for analyzing and processing the file to be transmitted in the historical transmission process;
selecting the first processor among the other processors excluding the second processor among the plurality of processors.
7. The method according to claim 3, wherein after selecting a first processor for processing the file to be transmitted from a preset plurality of processors, the method further comprises:
acquiring the data volume of the file to be transmitted;
and determining a file transmission channel in the first processor according to the data volume of the file to be transmitted.
8. The method according to claim 7, wherein determining a file transmission channel provided in the first processor according to the data amount of the file to be transmitted comprises:
if the data volume of the file to be transmitted is larger than or equal to a first preset threshold value, determining a first task channel in the first processor as a file transmission channel; alternatively, the first and second electrodes may be,
and if the data volume of the file to be transmitted is smaller than a first preset threshold value, determining a second task channel in the first processor as a file transmission channel.
9. The method according to claim 8, wherein after the amount of data of the file to be transmitted is less than a preset threshold, the method further comprises:
acquiring state information of the first task channel;
when the first task channel is in an idle state, determining the first task channel in the first processor as a file transmission channel; alternatively, the first and second electrodes may be,
and when the first task channel is in a non-idle state, determining a second task channel in the first processor as a file transmission channel.
10. The method of claim 1, wherein obtaining the file to be transmitted comprises:
monitoring message queue MQ messages for submitting at least one file transmission task;
acquiring a data file corresponding to at least one file transmission task according to the MQ message;
and acquiring the file to be transmitted from at least one data file.
11. The method according to claim 10, wherein obtaining the file to be transmitted from at least one of the data files comprises:
acquiring priority information of each data file in at least one data file;
and acquiring the file to be transmitted in at least one data file according to the priority information.
12. The method according to claim 10, wherein obtaining the file to be transmitted from at least one of the data files comprises:
acquiring the transmission times of each data file in at least one data file;
and determining the data file with the transmission times larger than or equal to a preset time threshold value as the file to be transmitted.
13. The method of claim 1, wherein after obtaining the file to be transmitted, the method further comprises:
acquiring the data volume of the file to be transmitted;
and determining the transmission mode of the file to be transmitted according to the data volume.
14. The method according to claim 13, wherein determining the transmission mode of the file to be transmitted according to the data volume comprises:
if the data volume of the file to be transmitted is larger than or equal to a second preset threshold value, splitting the file to be transmitted into a plurality of subfiles, and respectively transmitting the plurality of subfiles; alternatively, the first and second electrodes may be,
and if the data volume of the file to be transmitted is smaller than a third preset threshold value, combining the file to be transmitted and other files to be transmitted into a file set, and transmitting the file set.
15. The method of claim 1, wherein transmitting the file to be transmitted from the first network to the second network using the target gatekeeper link comprises:
identifying whether the file to be transmitted is a published file, wherein the published file is a file sent to a second network through a first network;
if the file to be transmitted is a published file, acquiring first file characteristics for identifying the file to be transmitted, and sending the first file characteristics to the second network through the target gatekeeper link; alternatively, the first and second electrodes may be,
and if the file to be transmitted is a non-published file, wherein the non-published file is a file which is not sent to the second network through the first network, the file to be transmitted is sent to the second network through the target gateway link.
16. The method of claim 15, wherein the first file characteristic comprises at least one of:
file signature, file label, file abstract.
17. The method of claim 15, wherein after obtaining the first file characteristic for identifying the file to be transmitted, the method further comprises:
and storing the file to be transmitted and the first file characteristics in a preset first storage area.
18. The method of claim 15, wherein identifying whether the file to be transmitted is a published file comprises:
searching whether a standard file feature matched with the first file feature is stored in a preset second storage area, wherein the second storage area is used for storing published files and standard file features corresponding to the published files;
if so, determining the file to be transmitted as a published file; alternatively, the first and second electrodes may be,
and if not, determining that the file to be transmitted is an unreleased file.
19. The method of claim 1, wherein prior to transmitting the file to be transmitted from the first network to the second network using the target gatekeeper link, the method further comprises:
detecting the working state of the target gatekeeper link;
and when the working state of the target network gate link is a fault state, re-determining the target network gate link, and transferring the transmission task on the target network gate link in the fault state to the re-determined target network gate link.
20. The method of claim 19, wherein after the operational state of the target gatekeeper link is a failure state, the method further comprises:
and removing the target gatekeeper link from a plurality of preset gatekeeper transmission links.
21. The method according to any one of claims 15-18, further comprising:
receiving, over the target gatekeeper link, a second file feature transmitted by the second network;
comparing the first file feature with a second file feature analysis;
if the first file characteristics are consistent with the second file characteristics, correspondingly processing the file to be transmitted in the first network; alternatively, the first and second electrodes may be,
and if the first file characteristic is inconsistent with the second file characteristic, the file to be transmitted is sent to the second network through the target gatekeeper link, and the first file characteristic is updated to be the second file characteristic.
22. The method according to any of claims 1-20, wherein before transmitting the file to be transmitted from the first network to the second network using the target gatekeeper link, the method further comprises:
sending the file to be transmitted to a preset detection device so as to carry out legality identification on the file to be transmitted by utilizing the detection device;
acquiring an identification result of the detection device;
if the file to be transmitted is legal, allowing the file to be transmitted; alternatively, the first and second electrodes may be,
and if the file to be transmitted is illegal, interrupting the transmission process of the file to be transmitted.
23. The method according to any one of claims 1-20, wherein the first network is a predetermined low-density network and the second network is a predetermined high-density network; alternatively, the first and second electrodes may be,
the first network is a preset high-security network, and the second network is a preset low-security network.
24. A file transmission method based on a network gate is characterized by comprising the following steps:
selecting a target transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, wherein the gatekeeper transmission links are used for realizing file transmission between a second network and a first network at different levels;
receiving a file to be transmitted sent by a first network through the target transmission link;
and processing the file to be transmitted according to a preset processing strategy.
25. The method of claim 24, wherein the destination transmission link comprises at least: the second processor is used for processing the file to be transmitted and the second file server is used for transmitting the file to be transmitted.
26. The method of claim 25, wherein selecting a destination transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links comprises:
selecting a second processor for processing the file to be transmitted from a plurality of preset processors;
selecting a second file server for transmitting the file to be transmitted from a plurality of preset file servers;
and determining a communication link formed by the second processor, the second file server and the network gate element as the target transmission link.
27. The method of claim 25, further comprising:
acquiring file characteristics of the file to be transmitted;
and correspondingly storing the file to be transmitted and the file characteristics into a preset third storage area.
28. The method of claim 27, further comprising:
receiving, over the target transmission link, a first file characteristic sent by a first network;
acquiring a transmitted file corresponding to the first file characteristic in the third storage area;
and acquiring second file characteristics of the transmitted file, and sending the second file characteristics to the first network through the target transmission link.
29. The method according to any one of claims 24-28, further comprising:
acquiring a processing result of processing the file to be transmitted according to a preset processing strategy;
and sending the processing result to the first network through the target transmission link.
30. A file transmission device based on a network gate is characterized by comprising:
the acquisition module is used for acquiring a file to be transmitted;
the first selection module is used for selecting a target gatekeeper link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, and the gatekeeper transmission links are used for realizing file transmission between a first network and a second network at different levels;
and the transmission module is used for transmitting the file to be transmitted from the first network to the second network by using the target gateway link.
31. An electronic device, comprising: a memory, a processor; wherein the memory is to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the gatekeeper-based file transfer method of any one of claims 1 to 23.
32. A file transmission device based on a network gate is characterized by comprising:
the second selection module is used for selecting a target transmission link for transmitting the file to be transmitted from a plurality of preset gatekeeper transmission links, and the gatekeeper transmission links are used for realizing file transmission between a second network and a first network at different levels;
the receiving module is used for receiving a file to be transmitted, which is sent by a first network, through a preset target gateway link;
and the processing module is used for processing the file to be transmitted according to a preset processing strategy.
33. An electronic device, comprising: a memory, a processor; wherein the memory is to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the gatekeeper-based file transfer method of any one of claims 24 to 29.
CN201811566078.4A 2018-12-20 2018-12-20 File transmission method, device and equipment based on gatekeeper Pending CN111355752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811566078.4A CN111355752A (en) 2018-12-20 2018-12-20 File transmission method, device and equipment based on gatekeeper

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811566078.4A CN111355752A (en) 2018-12-20 2018-12-20 File transmission method, device and equipment based on gatekeeper

Publications (1)

Publication Number Publication Date
CN111355752A true CN111355752A (en) 2020-06-30

Family

ID=71193747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811566078.4A Pending CN111355752A (en) 2018-12-20 2018-12-20 File transmission method, device and equipment based on gatekeeper

Country Status (1)

Country Link
CN (1) CN111355752A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865969A (en) * 2020-07-17 2020-10-30 江苏润易联信息技术有限公司 Secure transmission method and system suitable for financial information
CN112347050A (en) * 2020-10-27 2021-02-09 杭州安恒信息技术股份有限公司 File cross-network transmission method and device, computer equipment and storage medium
CN112492001A (en) * 2020-11-18 2021-03-12 深圳市商汤科技有限公司 Data transmission method, device and equipment and computer storage medium
CN112887385A (en) * 2021-01-19 2021-06-01 中国联合网络通信集团有限公司 File transmission method and device
CN113037710A (en) * 2021-02-03 2021-06-25 南京物通物语科技有限公司 Processing method for big data transmission for industrial Internet of things
CN113507480A (en) * 2021-07-23 2021-10-15 北京众享比特科技有限公司 Network equipment, network gate equipment and system, and data transmission and reporting method between networks
CN113746866A (en) * 2021-11-02 2021-12-03 国网浙江省电力有限公司 Multi-dimensional internetwork information transmission method and device based on middleboxes and storage medium
CN113992366A (en) * 2021-10-15 2022-01-28 厦门市美亚柏科信息股份有限公司 Network data transmission method, device, equipment and storage medium
CN114374562A (en) * 2022-01-14 2022-04-19 中国建设银行股份有限公司 Data transmission method, device, equipment and computer storage medium
CN114745186A (en) * 2022-04-19 2022-07-12 同方赛威讯信息技术有限公司 Method for realizing data exchange between two different networks isolated from each other
CN114745451A (en) * 2022-04-26 2022-07-12 Oppo广东移动通信有限公司 Data transmission method and device, electronic equipment and computer readable medium
CN115550289A (en) * 2022-11-28 2022-12-30 网御安全技术(深圳)有限公司 Data transmission method, device and storage medium
CN114745451B (en) * 2022-04-26 2024-07-12 Oppo广东移动通信有限公司 Data transmission method and device, electronic equipment and computer readable medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092701A (en) * 2011-10-31 2013-05-08 联想(北京)有限公司 Communication method, communication device and electronic device
CN103516791A (en) * 2013-09-16 2014-01-15 北京电视台 File transmission method and system
CN104601576A (en) * 2015-01-16 2015-05-06 网神信息技术(北京)股份有限公司 File transmission method and device based on one-way safety isolation gap
US20160294793A1 (en) * 1998-10-30 2016-10-06 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
CN106101274A (en) * 2016-08-10 2016-11-09 玉环看知信息科技有限公司 A kind of document transmission method, Apparatus and system
CN106850188A (en) * 2017-01-24 2017-06-13 中国航天系统科学与工程研究院 A kind of data transmission system based on multichannel isomery one-way transmission path
CN107172112A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 A kind of computer documents transmission method and device
CN108040060A (en) * 2017-12-18 2018-05-15 杭州优云软件有限公司 The method and device of inter-network lock communication
CN109039809A (en) * 2018-07-17 2018-12-18 中国电子科技集团公司电子科学研究院 A kind of detection method, device and the intranet server of gateway cluster exception

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160294793A1 (en) * 1998-10-30 2016-10-06 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
CN103092701A (en) * 2011-10-31 2013-05-08 联想(北京)有限公司 Communication method, communication device and electronic device
CN103516791A (en) * 2013-09-16 2014-01-15 北京电视台 File transmission method and system
CN104601576A (en) * 2015-01-16 2015-05-06 网神信息技术(北京)股份有限公司 File transmission method and device based on one-way safety isolation gap
CN107172112A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 A kind of computer documents transmission method and device
CN106101274A (en) * 2016-08-10 2016-11-09 玉环看知信息科技有限公司 A kind of document transmission method, Apparatus and system
CN106850188A (en) * 2017-01-24 2017-06-13 中国航天系统科学与工程研究院 A kind of data transmission system based on multichannel isomery one-way transmission path
CN108040060A (en) * 2017-12-18 2018-05-15 杭州优云软件有限公司 The method and device of inter-network lock communication
CN109039809A (en) * 2018-07-17 2018-12-18 中国电子科技集团公司电子科学研究院 A kind of detection method, device and the intranet server of gateway cluster exception

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
齐朝晖: ""基于跨网闸的安全隔离交换平台的设计与实现"", 《道客巴巴》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865969A (en) * 2020-07-17 2020-10-30 江苏润易联信息技术有限公司 Secure transmission method and system suitable for financial information
CN112347050A (en) * 2020-10-27 2021-02-09 杭州安恒信息技术股份有限公司 File cross-network transmission method and device, computer equipment and storage medium
CN112492001A (en) * 2020-11-18 2021-03-12 深圳市商汤科技有限公司 Data transmission method, device and equipment and computer storage medium
CN112887385A (en) * 2021-01-19 2021-06-01 中国联合网络通信集团有限公司 File transmission method and device
CN113037710A (en) * 2021-02-03 2021-06-25 南京物通物语科技有限公司 Processing method for big data transmission for industrial Internet of things
CN113507480B (en) * 2021-07-23 2023-10-27 北京众享比特科技有限公司 Network equipment, gateway equipment and system and inter-network data transmission and reporting method
CN113507480A (en) * 2021-07-23 2021-10-15 北京众享比特科技有限公司 Network equipment, network gate equipment and system, and data transmission and reporting method between networks
CN113992366A (en) * 2021-10-15 2022-01-28 厦门市美亚柏科信息股份有限公司 Network data transmission method, device, equipment and storage medium
CN113746866A (en) * 2021-11-02 2021-12-03 国网浙江省电力有限公司 Multi-dimensional internetwork information transmission method and device based on middleboxes and storage medium
CN114374562A (en) * 2022-01-14 2022-04-19 中国建设银行股份有限公司 Data transmission method, device, equipment and computer storage medium
CN114745186A (en) * 2022-04-19 2022-07-12 同方赛威讯信息技术有限公司 Method for realizing data exchange between two different networks isolated from each other
CN114745451A (en) * 2022-04-26 2022-07-12 Oppo广东移动通信有限公司 Data transmission method and device, electronic equipment and computer readable medium
CN114745451B (en) * 2022-04-26 2024-07-12 Oppo广东移动通信有限公司 Data transmission method and device, electronic equipment and computer readable medium
CN115550289A (en) * 2022-11-28 2022-12-30 网御安全技术(深圳)有限公司 Data transmission method, device and storage medium
CN115550289B (en) * 2022-11-28 2023-03-21 网御安全技术(深圳)有限公司 Data transmission method, device and storage medium

Similar Documents

Publication Publication Date Title
CN111355752A (en) File transmission method, device and equipment based on gatekeeper
US11106479B2 (en) Virtual provisioning with implementation resource boundary awareness
US10904184B2 (en) Smart message delivery based on transaction processing status
CN108696581B (en) Distributed information caching method and device, computer equipment and storage medium
US10812314B2 (en) Methods and apparatuses for pushing a message
CN106446168B (en) A kind of load client realization method of Based on Distributed data warehouse
US10936386B2 (en) Method, device and computer program product for monitoring access request
WO2019205788A1 (en) Data storage method, storage server and cloud storage system
US8914517B1 (en) Method and system for predictive load balancing
CN110839023B (en) Electric power marketing multi-channel customer service system
CN104092754B (en) Document storage system and file memory method
US10397071B2 (en) Automated deployment of cloud-hosted, distributed network monitoring agents
US11811894B2 (en) Reduction of data transmissions based on end-user context
KR20180080450A (en) Apparatus for malware detection based on cloud and method using the same
US8095980B2 (en) Detecting malicious behavior in data transmission of a de-duplication system
CN113765871B (en) Method and device for managing fort machine
US10936968B2 (en) Ticket routing
US8768985B2 (en) Automated file relocation
CN113141403B (en) Log transmission method and device
US20180123866A1 (en) Method and apparatus for determining event level of monitoring result
CN112783845B (en) Data reconciliation system, method, device and medium
US11082484B2 (en) Load balancing system
CN111459653B (en) Cluster scheduling method, device and system and electronic equipment
CN113190347A (en) Edge cloud system and task management method
CN115145473A (en) Data processing method, device and equipment between heterogeneous storage media

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200630

RJ01 Rejection of invention patent application after publication