CN111405039A - Data transparent transmission method, device and system, client and server - Google Patents

Data transparent transmission method, device and system, client and server Download PDF

Info

Publication number
CN111405039A
CN111405039A CN202010181440.7A CN202010181440A CN111405039A CN 111405039 A CN111405039 A CN 111405039A CN 202010181440 A CN202010181440 A CN 202010181440A CN 111405039 A CN111405039 A CN 111405039A
Authority
CN
China
Prior art keywords
nodes
target
proxy
node
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010181440.7A
Other languages
Chinese (zh)
Inventor
祁朋祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN202010181440.7A priority Critical patent/CN111405039A/en
Publication of CN111405039A publication Critical patent/CN111405039A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/288Distributed intermediate devices, i.e. intermediate devices for interaction with other intermediate devices on the same level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • H04L67/145Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a data transparent transmission method, which comprises the following steps: determining a plurality of target agent nodes according to the node attribute information of all the agent nodes; sending the request message to a plurality of target agent nodes so that the plurality of target agent nodes can forward the request message to a server; and receiving a response message which is forwarded by a designated proxy node and is determined by the server according to the request message, wherein the designated proxy node is the target proxy node corresponding to the received first response message. The plurality of target agent nodes determined by the method are variable and not easy to expose, the possibility of being attacked is greatly reduced, and the stability and reliability of data transmission are improved. The application also provides a data transparent transmission device, a client, a server and a data transparent transmission system, and the data transparent transmission device, the client, the server and the data transparent transmission system all have the beneficial effects.

Description

Data transparent transmission method, device and system, client and server
Technical Field
The present application relates to the field of data transmission technologies, and in particular, to a data transparent transmission method, a data transparent transmission device, a client, a server, and a data transparent transmission system.
Background
In order to maintain that a background server is not exposed, in the related art, a proxy node is adopted for data transparent transmission, a client sends a request message to the proxy node, the proxy node is connected with the server and forwards the request message to the server, after the server completes a corresponding task according to the request message, response information is fed back to the proxy node, the proxy node forwards a feedback response to the client, and communication between the client and the server is completed.
Therefore, how to provide a solution to the above technical problem is a problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a data transparent transmission method, a data transparent transmission device, a client, a server and a data transparent transmission system, which can improve the stability and reliability of data transmission. The specific scheme is as follows:
in order to achieve the above object, the present application discloses a data transparent transmission method, which includes:
determining a plurality of target agent nodes according to the node attribute information of all the agent nodes;
sending a request message to a plurality of target agent nodes so that the target agent nodes can forward the request message to a server;
and receiving a response message which is forwarded by a designated proxy node and is determined by the server according to the request message, wherein the designated proxy node is the target proxy node corresponding to the received first response message.
Optionally, the determining a plurality of target proxy nodes according to the node attribute information of all the proxy nodes includes:
detecting the response speed of all the agent nodes every other preset period, and establishing a routing table of the agent nodes and the response speed;
and determining a plurality of target proxy nodes according to the response speed of the proxy nodes in the routing table within the time range of the preset period.
Optionally, the determining a plurality of target proxy nodes according to the node attribute information of all the proxy nodes includes:
and determining a plurality of target proxy nodes according to the historical transparent transmission information of all the proxy nodes.
Optionally, before determining the plurality of target proxy nodes according to the node attribute information of all the proxy nodes, the method further includes:
and acquiring request data, and packaging and encrypting the request data to obtain the request message.
Optionally, the receiving a response packet, which is forwarded by an appointed proxy node and determined by the server according to the request packet, where the appointed proxy node is after the target proxy node corresponding to the received first response packet, further includes:
and disconnecting all the target agent nodes.
In order to achieve the above object, the present application discloses a data transparent transmission device, including:
the target agent node determining module is used for determining a plurality of target agent nodes according to the node attribute information of all the agent nodes;
a request message sending module, configured to send a request message to the multiple target proxy nodes, so that the multiple target proxy nodes forward the request message to a server;
and the response message receiving module is used for receiving a response message which is forwarded by a designated proxy node and is determined by the server according to the request message, wherein the designated proxy node is the target proxy node corresponding to the received first response message.
To achieve the above object, the present application discloses a client, comprising:
a memory for storing a computer program;
and the processor is used for realizing the steps of the data transmission method when executing the computer program.
In order to achieve the above object, the present application discloses a data transparent transmission method, which includes:
receiving a request message sent by a client and forwarded by a plurality of target agent nodes, wherein the plurality of target agent nodes are nodes in the nodes determined by the client according to node attribute information of all agent nodes;
determining a response message according to the request message;
and sending the response message to the corresponding target agent node, so that the target agent nodes forward the corresponding response message to the client, and the client receives the response message corresponding to the designated agent node in the target agent nodes.
In order to achieve the above object, the present application discloses a data transparent transmission device, including:
a request message receiving module, configured to receive a request message sent by a client and forwarded by multiple target proxy nodes, where the multiple target proxy nodes are nodes in nodes determined by the client according to node attribute information of all proxy nodes;
a response message determining module, configured to determine a response message according to the request message;
and the response message sending module is used for sending the response message to the corresponding target agent node so that the target agent nodes can forward the response message to the client, and the client can receive the response message corresponding to the designated agent node in the target agent nodes.
To achieve the above object, the present application discloses a server, comprising:
a memory for storing a computer program;
and the processor is used for realizing the steps of the data transmission method when executing the computer program.
In order to achieve the above object, the present application discloses a data transparent transmission system, including:
the client terminal as described above;
the server as described above;
the proxy nodes comprise other proxy nodes and a plurality of target proxy nodes, and the target proxy nodes are used for forwarding the request message sent by the client to the server; and forwarding a response message determined by the server according to the request message to the client.
The application provides a data transparent transmission method, which comprises the following steps: determining a plurality of target agent nodes according to the node attribute information of all the agent nodes; sending the request message to a plurality of target agent nodes so that the plurality of target agent nodes can forward the request message to a server; and receiving a response message which is forwarded by the appointed proxy node and is determined by the server according to the request message, wherein the appointed proxy node is a target proxy node corresponding to the received first response message.
Therefore, in the application, a client determines a plurality of target proxy nodes according to node attribute information of the proxy nodes, the node attribute information of the proxy nodes at different times is different, then the plurality of target proxy nodes send a request message to a server, the server determines a response message according to the request message, the server sends the response message to the plurality of target proxy nodes, the target proxy nodes are forwarded to the client, at the moment, the target proxy node received by the client first serves as a designated proxy node, and the client receives the response message sent by the designated proxy node; therefore, the plurality of target proxy nodes determined at each moment are different, so that the addresses of the proxy nodes are not regular and can not be exposed easily, the possibility of being attacked is greatly reduced, and the stability and the reliability of data transmission are improved.
This application still provides data simultaneously and passes device, customer end and server and data and pass system thoroughly, all has above-mentioned beneficial effect, and it is no longer repeated here.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a data transparent transmission method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a data transparent transmission device according to an embodiment of the present application;
fig. 3 is a structural diagram of a client according to an embodiment of the present application;
fig. 4 is a block diagram of another client according to an embodiment of the present disclosure;
fig. 5 is a flowchart of a data transparent transmission method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a data transparent transmission device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a data transparent transmission system according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
In order to maintain that a background server is not exposed, in the related art, a proxy node is adopted for data transparent transmission, a client sends a request message to the proxy node, the proxy node is connected with the server and forwards the request message to the server, after the server completes a corresponding task according to the request message, response information is fed back to the proxy node, the proxy node forwards a feedback response to the client, and communication between the client and the server is completed. Based on the technical problem, the present embodiment provides a data transparent transmission method, in this embodiment, a client determines a plurality of target proxy nodes according to node attribute information of the proxy nodes, the node attribute information of the proxy nodes at different times is different, then the plurality of target proxy nodes send a request message to a server, the server determines a response message according to the request message, the server sends the response message to the plurality of target proxy nodes, the target proxy nodes forward to the client, at this time, the target proxy node received by the client first is taken as an assigned proxy node, and the client receives the response message sent by the assigned proxy node; therefore, a plurality of target proxy nodes determined at each moment may be different, and therefore, the addresses of the proxy nodes are not regularly circulated and are not easily exposed, so that the possibility of being attacked is greatly reduced, and the stability and reliability of data transmission are improved, specifically referring to fig. 1, where fig. 1 is a flowchart of a data transparent transmission method provided in an embodiment of the present application, specifically including:
s101, determining a plurality of target agent nodes according to the node attribute information of all the agent nodes.
The embodiment is mainly applied to the client, the client corresponds to a plurality of proxy nodes, the number of the proxy nodes is not limited in the embodiment, and a user can set the proxy nodes by himself/herself. It can be understood that the agent nodes can be communicated with each other, the communication process, i.e., the networking process, can be performed by a certain agent node, and after the networking is successful, the agent nodes maintain the connection by sending heartbeat packets to each other. The node attribute information includes but is not limited to response speed, historical transparent transmission information and transmission success rate; the determining mode of the response speed can be that the client sends a response signal to the proxy node, the sending time is recorded, the proxy node sends a feedback signal to the client after receiving the response signal, the receiving time of the client is recorded, and the client determines the response speed according to the difference value between the sending time and the receiving time; the historical transparent transmission information comprises historical record information of realizing transparent transmission of the agent node, and comprises information of successful transparent transmission and failure of transparent transmission.
The number of target agent nodes in this embodiment includes, but is not limited to, 2, 3, and 4.
S102, the request message is sent to a plurality of target agent nodes, so that the plurality of target agent nodes can forward the request message to a server.
And the client sends the request message to a plurality of target agent nodes, wherein when the number of the target agent nodes is multiple, the client sends the request message to all the target agent nodes in a concurrent manner. And after receiving the request message, the target agent node forwards the request message to a server through an http transparent transmission technology. Because the request message of the client is sent to the plurality of target agent nodes in a concurrent manner, even if a certain target agent node is attacked and stops service, the requests of other target agent nodes still have the opportunity to be forwarded to the server, so that the stability and reliability of the service are ensured, and meanwhile, because the plurality of target agent nodes are mutually backed up and redundant, the fastest target agent node can be found and forwarded to the server, so that the high quality of the service can be ensured. In an implementation manner, when the number of the target proxy nodes is at least two, after all the target proxy nodes receive the request message, all the target proxy nodes forward the request message to the server.
S103, receiving a response message which is determined by the server and forwarded by the appointed proxy node according to the request message, wherein the appointed proxy node is a target proxy node corresponding to the received first response message.
It can be understood that, after the server receives the request messages forwarded by the plurality of target proxy nodes, the server determines corresponding response messages according to the request messages. The server sends the response message to the corresponding target agent nodes, all the target agent nodes forward the response message to the client, at the moment, the target agent nodes complete the transparent transmission function, and after the client receives the first response message sent by the appointed agent node, the client does not receive the response messages sent by other target agent nodes. It can be seen that the present embodiment scatters the agent nodes, and when one or some of the agent nodes stop service due to an attack, other target agent nodes can quickly replace the availability of the maintenance service. The whole process well protects the background server from being exposed, so that the background server is prevented from being attacked by hackers. In this embodiment, there is no centralized server, and the target agent nodes used by the user to access the server each time may be different, so that even if some transparent transmission machines, that is, the target agent nodes are attacked, the system may still select other target agent nodes for transparent transmission, and when other target agent nodes are attacked, the original machine may have recovered service, thereby making the service more robust.
Based on the above technical solution, in this embodiment, the client determines a plurality of target proxy nodes according to node attribute information of the proxy nodes, the node attribute information of the proxy nodes at different times is different, then the plurality of target proxy nodes send the request packet to the server, the server determines a response packet according to the request packet, the server sends the response packet to the plurality of target proxy nodes, and the target proxy nodes forward to the client, at this time, the target proxy node received first by the client is taken as a designated proxy node, and the client receives the response packet sent by the designated proxy node; therefore, the plurality of target proxy nodes determined at each moment are different, so that the addresses of the proxy nodes are not regular and can not be exposed easily, the possibility of being attacked is greatly reduced, and the stability and the reliability of data transmission are improved.
As further elaborated with respect to step S101, determining a plurality of target proxy nodes according to the node attribute information of all the proxy nodes includes: detecting the response speed of all the agent nodes every other preset period, and establishing a routing table of the agent nodes and the response speed;
and determining a plurality of target proxy nodes according to the response speed of the proxy nodes in the routing table within the time range of the preset period.
The determining method of the response speed may be that the client sends a response signal to the proxy node, records the sending time, sends a feedback signal to the client after the proxy node receives the response signal, records the receiving time of the client, and determines the response speed according to a difference between the sending time and the receiving time. The target proxy node with high transmission rate can be determined according to the response speed, and the data transmission efficiency is improved.
In this embodiment, the response speeds of all the proxy nodes are detected every preset period, the response speeds and the IDs of the corresponding proxy nodes are recorded, and a routing table of the proxy nodes and the response speeds is established, where the routing information in the routing table includes, but is not limited to, path information and response speeds, and may also include other information, which is not limited in this embodiment, and the user may set the routing table by user-definition. At this time, in a time range corresponding to the preset period, that is, in a time range between two detection response speeds, the target proxy node is determined according to the corresponding speed of the proxy node in the routing table. It can be understood that, when the preset period is shorter, the frequency of detecting the response speed is increased, the real-time performance of the obtained response speed is higher, and when a certain proxy node goes offline or connection fails due to network fluctuation, it may be determined that all new target proxy nodes complete the data transparent transmission function, so as to provide an uninterrupted transparent transmission service for the whole data transmission, and improve the reliability and stability of data processing.
As further elaborated with respect to step S101, determining a plurality of target proxy nodes according to the node attribute information of all the proxy nodes includes: and determining a plurality of target agent nodes according to the historical transparent transmission information of all the agent nodes.
The historical transparent transmission information comprises historical record information of realizing transparent transmission of the agent node, and comprises information of successful transparent transmission and failure of transparent transmission. And determining that the transparent transmission is successful according to the historical transparent transmission information, and taking the proxy node with the transparent transmission success rate larger than the preset threshold value as a target proxy node to obtain a plurality of target proxy nodes, so that the connection between the target proxy node and the server can be successfully established, the occurrence of connection failure is avoided, the connection success rate of the proxy node and the server is improved, and the reliability and the stability of data transmission are further ensured.
Before step S101, the method may further include: and acquiring request data, and packaging and encrypting the request data to obtain a request message.
The request message is an encrypted message, so that when the proxy node stops service due to attack, the content of the request message cannot be acquired because the request data is encrypted data, and the risk of data leakage is reduced. Meanwhile, because the request data is encrypted, the characteristics of the data packet cannot be analyzed through packet capturing, and the transmitted data content cannot be determined, so that the service node is ensured not to be exposed through the node consistency.
In an implementation mode, when the target agent nodes are three target agent nodes, the client packages and encrypts the request data to obtain a request message, the client sends the request message to the three target agent nodes in parallel, after the three target agent nodes receive the request message, the three target agent nodes forward the request message to the server, in the process, if one target agent node stops service, the data transmission of other target agent nodes cannot be influenced, other target agent nodes forward the request message to the server, the reliability of the data transmission is ensured, and due to the fact that the target agent nodes are multiple target agent nodes, and the target agent nodes are constantly changing and are not fixed, the redundant forwarding technology of the multiple target agent nodes is adopted, so node information cannot be exposed, the reliability and the safety of data transmission are ensured.
After step S103, the method may further include: the connection with all the target agent nodes is disconnected. In an implementation manner, if the server sends the response packet to all the target proxy nodes, after one of the target proxy nodes successfully forwards the response packet to the client, the client disconnects from all the target proxy nodes, and it is ensured that the response packet is not repeatedly received.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a data transparent transmission device provided in an embodiment of the present application, where the data transparent transmission device described below and the method described above are referred to in a corresponding manner, and the relevant modules are all disposed in a client, and fig. 2 is a schematic structural diagram of the data transparent transmission device provided in the embodiment of the present application, and includes:
a target agent node determining module 210, configured to determine a plurality of target agent nodes according to node attribute information of all agent nodes;
a request packet sending module 220, configured to send a request packet to multiple target proxy nodes, so that the multiple target proxy nodes forward the request packet to a server;
the response packet receiving module 230 is configured to receive a response packet that is determined by the server and forwarded by the designated proxy node according to the request packet, where the designated proxy node is a target proxy node corresponding to the received first response packet.
Optionally, the target agent node determining module 210 includes:
a routing table establishing subunit, configured to detect response speeds of all the proxy nodes every other preset period, and establish a routing table of the proxy nodes and the response speeds;
and the target agent node determining subunit is used for determining a plurality of target agent nodes according to the response speed of the agent nodes in the routing table within the time range of the preset period.
Optionally, the target agent node determining module 210 includes:
and the second target agent node determining unit is used for determining a plurality of target agent nodes according to the historical transparent transmission information of all the agent nodes.
Optionally, the method further includes:
and the data encryption module is used for acquiring the request data, and encrypting the request data after packaging to obtain the request message.
Optionally, the method further includes:
and the disconnection module is used for disconnecting the connection with all the target agent nodes.
Since the embodiment of the data transparent transmission device part corresponds to the embodiment of the data transparent transmission method part, please refer to the description of the embodiment of the data transparent transmission method part for the embodiment of the data transparent transmission device part, which is not repeated here.
Referring to fig. 3, fig. 3 is a structural diagram of a client according to an embodiment of the present disclosure, where the client is described below, and the client and the data transparent transmission method described above are referred to correspondingly, and the structural diagram includes:
a memory 100 for storing a computer program;
the processor 200, when executing the computer program, may implement the steps provided by the above embodiments.
Specifically, the memory 100 includes a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and computer-readable instructions, and the internal memory provides an environment for the operating system and the computer-readable instructions in the non-volatile storage medium to run. The processor 200 provides the computing and control capabilities for the electronic device and, when executing the computer program stored in the memory 100, may perform the following steps: determining a plurality of target agent nodes according to the node attribute information of all the agent nodes; sending the request message to a plurality of target agent nodes so that the plurality of target agent nodes can forward the request message to a server; and receiving a response message which is determined by the server and forwarded by the appointed proxy node according to the request message, wherein the appointed proxy node is a target proxy node corresponding to the received first response message.
In some specific embodiments, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: detecting the response speed of all the agent nodes every other preset period, and establishing a routing table of the agent nodes and the response speed; and determining a plurality of target proxy nodes according to the response speed of the proxy nodes in the routing table within the time range of the preset period.
In some specific embodiments, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and determining a plurality of target agent nodes according to the historical transparent transmission information of all the agent nodes.
In some specific embodiments, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and acquiring request data, and packaging and encrypting the request data to obtain a request message.
In some specific embodiments, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and acquiring request data, and packaging and encrypting the request data to obtain a request message.
In some specific embodiments, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: the connection with all the target agent nodes is disconnected.
Since the embodiment of the client portion and the embodiment of the data transparent transmission method portion correspond to each other, please refer to the description of the embodiment of the data transparent transmission method portion for the embodiment of the client portion, which is not repeated here.
On the basis of the foregoing embodiment, as a preferred implementation, refer to fig. 4, where fig. 4 is a structural diagram of another client provided in the embodiment of the present application, and the client further includes:
and an input interface 300 connected to the processor 200, for acquiring computer programs, parameters and instructions imported from the outside, and storing the computer programs, parameters and instructions into the memory 100 under the control of the processor 200. The input interface 300 may be connected to an input device for receiving parameters or instructions manually input by a user. The input device may be a touch layer covered on a display screen, or a button, a track ball or a touch pad arranged on a terminal shell, or a keyboard, a touch pad or a mouse, etc.
And a display unit 400 connected to the processor 200 for displaying data transmitted by the processor 200. The display unit 400 may be a display screen on a PC, a liquid crystal display screen, or an electronic ink display screen.
The communication technology adopted by the communication connection can be a wired communication technology or a wireless communication technology, such as mobile high-definition link technology (MH L), a Universal Serial Bus (USB), a high-definition multimedia interface (HDMI), wireless fidelity (WiFi), a Bluetooth communication technology, a low-power Bluetooth communication technology, an IEEE802.11s-based communication technology and the like.
In the following, a computer-readable storage medium provided by an embodiment of the present application is described, where the computer-readable storage medium described below and the data transparent transmission method described above are referred to correspondingly, and the storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. The storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of: determining a plurality of target agent nodes according to the node attribute information of all the agent nodes; sending the request message to a plurality of target agent nodes so that the plurality of target agent nodes can forward the request message to a server; and receiving a response message which is determined by the server and forwarded by the appointed proxy node according to the request message, wherein the appointed proxy node is a target proxy node corresponding to the received first response message.
In some embodiments, a computer subroutine stored in a computer readable storage medium, when executed by a processor, may perform the steps of: detecting the response speed of all the agent nodes every other preset period, and establishing a routing table of the agent nodes and the response speed; and determining a plurality of target proxy nodes according to the response speed of the proxy nodes in the routing table within the time range of the preset period.
In some embodiments, a computer subroutine stored in a computer readable storage medium, when executed by a processor, may perform the steps of: and determining a plurality of target agent nodes according to the historical transparent transmission information of all the agent nodes.
In some embodiments, a computer subroutine stored in a computer readable storage medium, when executed by a processor, may perform the steps of: and acquiring request data, and packaging and encrypting the request data to obtain a request message.
In some embodiments, a computer subroutine stored in a computer readable storage medium, when executed by a processor, may perform the steps of: the connection with all the target agent nodes is disconnected.
Since the embodiment of the computer-readable storage medium portion corresponds to the embodiment of the data transparent transmission method portion, please refer to the description of the embodiment of the data transparent transmission method portion for the embodiment of the computer-readable storage medium portion, which is not repeated here.
Referring to fig. 5, fig. 5 is a flowchart of a data transparent transmission method according to an embodiment of the present application, which specifically includes:
s501, receiving a request message sent by a client and forwarded by a plurality of target agent nodes, wherein the plurality of target agent nodes are nodes in the nodes determined by the client according to the node attribute information of all the agent nodes.
S502, determining a response message according to the request message.
S503, the response messages are sent to the corresponding target agent nodes, so that the plurality of target agent nodes forward the corresponding response messages to the client, and the client receives the response messages corresponding to the designated agent nodes in the plurality of target agent nodes.
In this embodiment, determining the response packet according to the request packet may specifically include: analyzing the request message to obtain request data; obtaining response data according to the request data, and packaging the response data to obtain a response message; the method can also comprise the steps of decrypting the request message to obtain request data; and determining response data according to the request data, and encrypting and packaging the response data to obtain a response message.
Based on the above technical solution, in this embodiment, the client determines a plurality of target proxy nodes according to node attribute information of the proxy nodes, the node attribute information of the proxy nodes at different times is different, then the plurality of target proxy nodes send the request packet to the server, the server determines a response packet according to the request packet, the server sends the response packet to the plurality of target proxy nodes, and the target proxy nodes forward to the client, at this time, the target proxy node received first by the client is taken as a designated proxy node, and the client receives the response packet sent by the designated proxy node; therefore, the plurality of target proxy nodes determined at each moment are different, so that the addresses of the proxy nodes are not regular and can not be exposed easily, the possibility of being attacked is greatly reduced, and the stability and the reliability of data transmission are improved.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a data transparent transmission device provided in an embodiment of the present application, where the data transparent transmission device described below and the data transparent transmission method described above are referred to in a mutually corresponding manner, and the relevant modules are all disposed in a server, and the data transparent transmission device provided in the embodiment of the present application includes:
a request message receiving module 610, configured to receive a request message sent by a client and forwarded by multiple target proxy nodes, where the multiple target proxy nodes are nodes in nodes determined by the client according to node attribute information of all proxy nodes;
a response message determining module 620, configured to determine a response message according to the request message;
the response packet sending module 630 is configured to send the response packet to the corresponding target agent node, so that the plurality of target agent nodes forward the response packet to the client, so that the client receives the response packet corresponding to the designated agent node in the plurality of target agent nodes.
Since the embodiment of the data transparent transmission device part corresponds to the embodiment of the data transparent transmission method part, please refer to the description of the embodiment of the data transparent transmission method part for the embodiment of the data transparent transmission device part, which is not repeated here.
In the following, a server provided in an embodiment of the present application is introduced, and a server described below and a data transparent transmission method described above may be referred to correspondingly, where the server includes:
a memory for storing a computer program;
a processor, configured to execute the computer program, may implement the steps provided by the above embodiments.
Specifically, the memory includes a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and computer-readable instructions, and the internal memory provides an environment for the operating system and the computer-readable instructions in the non-volatile storage medium to run. The processor provides computing and control capabilities for the electronic device, and when executing the computer program stored in the memory, the following steps may be implemented: receiving a request message transmitted by a client and forwarded by a plurality of target agent nodes, wherein the plurality of target agent nodes are nodes in the nodes determined by the client according to node attribute information of all the agent nodes; determining a response message according to the request message; and sending the response message to the corresponding target agent node so that the plurality of target agent nodes forward the corresponding response message to the client, so that the client receives the response message corresponding to the designated agent node in the plurality of target agent nodes.
Since the embodiment of the client portion and the embodiment of the data transparent transmission method portion correspond to each other, please refer to the description of the embodiment of the data transparent transmission method portion for the embodiment of the client portion, which is not repeated here.
In the following, a computer-readable storage medium provided by an embodiment of the present application is described, and the computer-readable storage medium described below and the data transparent transmission method described above may be referred to correspondingly.
The storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. The storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of: receiving a request message transmitted by a client and forwarded by a plurality of target agent nodes, wherein the plurality of target agent nodes are nodes in the nodes determined by the client according to node attribute information of all the agent nodes; determining a response message according to the request message; and sending the response message to the corresponding target agent node so that the plurality of target agent nodes forward the corresponding response message to the client, so that the client receives the response message corresponding to the designated agent node in the plurality of target agent nodes.
Since the embodiment of the computer-readable storage medium portion corresponds to the embodiment of the data transparent transmission method portion, please refer to the description of the embodiment of the data transparent transmission method portion for the embodiment of the computer-readable storage medium portion, which is not repeated here.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a data transparent transmission system provided in an embodiment of the present application, which includes:
the client 10 as described above;
the server 30 as described above;
the proxy nodes 20 comprise other proxy nodes 21 and a plurality of target proxy nodes 22, and the plurality of target proxy nodes 22 are used for forwarding the request message sent by the client 10 to the server 30; the forwarding server 30 forwards the response message determined from the request message to the client 10.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The data transparent transmission method, the data transparent transmission device, the client, the server and the data transparent transmission system provided by the application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.

Claims (11)

1. A method for transparent data transmission, comprising:
determining a plurality of target agent nodes according to the node attribute information of all the agent nodes;
sending a request message to a plurality of target agent nodes so that the target agent nodes can forward the request message to a server;
and receiving a response message which is forwarded by a designated proxy node and is determined by the server according to the request message, wherein the designated proxy node is the target proxy node corresponding to the received first response message.
2. The data pass-through method of claim 1, wherein the determining a plurality of target proxy nodes according to the node attribute information of all the proxy nodes comprises:
detecting the response speed of all the agent nodes every other preset period, and establishing a routing table of the agent nodes and the response speed;
and determining a plurality of target proxy nodes according to the response speed of the proxy nodes in the routing table within the time range of the preset period.
3. The data pass-through method of claim 1, wherein the determining a plurality of target proxy nodes according to the node attribute information of all the proxy nodes comprises:
and determining a plurality of target proxy nodes according to the historical transparent transmission information of all the proxy nodes.
4. The data transparent transmission method according to claim 1, wherein before determining the plurality of target proxy nodes according to the node attribute information of all the proxy nodes, the method further comprises:
and acquiring request data, and packaging and encrypting the request data to obtain the request message.
5. The data transparent transmission method according to any one of claims 1 to 4, wherein the receiving of the response packet forwarded by the designated proxy node and determined by the server according to the request packet, wherein the designated proxy node is the target proxy node corresponding to the first received response packet, further includes:
and disconnecting all the target agent nodes.
6. A data pass-through device, comprising:
the target agent node determining module is used for determining a plurality of target agent nodes according to the node attribute information of all the agent nodes;
a request message sending module, configured to send a request message to the multiple target proxy nodes, so that the multiple target proxy nodes forward the request message to a server;
and the response message receiving module is used for receiving a response message which is forwarded by a designated proxy node and is determined by the server according to the request message, wherein the designated proxy node is the target proxy node corresponding to the received first response message.
7. A client, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data pass-through method of any one of claims 1 to 5 when executing said computer program.
8. A method for transparent data transmission, comprising:
receiving a request message sent by a client and forwarded by a plurality of target agent nodes, wherein the plurality of target agent nodes are nodes in the nodes determined by the client according to node attribute information of all agent nodes;
determining a response message according to the request message;
and sending the response message to the corresponding target agent node, so that the target agent nodes forward the corresponding response message to the client, and the client receives the response message corresponding to the designated agent node in the target agent nodes.
9. A data pass-through device, comprising:
a request message receiving module, configured to receive a request message sent by a client and forwarded by multiple target proxy nodes, where the multiple target proxy nodes are nodes in nodes determined by the client according to node attribute information of all proxy nodes;
a response message determining module, configured to determine a response message according to the request message;
and the response message sending module is used for sending the response message to the corresponding target agent node so that the target agent nodes can forward the response message to the client, and the client can receive the response message corresponding to the designated agent node in the target agent nodes.
10. A server, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data pass-through method of claim 8 when executing said computer program.
11. A data pass-through system, comprising:
the client of claim 7;
the server of claim 10;
the proxy nodes comprise other proxy nodes and a plurality of target proxy nodes, and the target proxy nodes are used for forwarding the request message sent by the client to the server; and forwarding a response message determined by the server according to the request message to the client.
CN202010181440.7A 2020-03-16 2020-03-16 Data transparent transmission method, device and system, client and server Pending CN111405039A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010181440.7A CN111405039A (en) 2020-03-16 2020-03-16 Data transparent transmission method, device and system, client and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010181440.7A CN111405039A (en) 2020-03-16 2020-03-16 Data transparent transmission method, device and system, client and server

Publications (1)

Publication Number Publication Date
CN111405039A true CN111405039A (en) 2020-07-10

Family

ID=71436321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010181440.7A Pending CN111405039A (en) 2020-03-16 2020-03-16 Data transparent transmission method, device and system, client and server

Country Status (1)

Country Link
CN (1) CN111405039A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104523A (en) * 2020-09-11 2020-12-18 中国联合网络通信集团有限公司 Detection method, device and equipment for flow transparent transmission and storage medium
CN112835655A (en) * 2021-02-26 2021-05-25 深圳市晨北科技有限公司 Transparent data transmission method, system, transmission terminal and storage medium
CN113992448A (en) * 2021-12-28 2022-01-28 北京瑞莱智慧科技有限公司 Data transparent transmission method, system, medium and computing device
CN114363294A (en) * 2020-09-27 2022-04-15 华为云计算技术有限公司 Tenant server management method, device and system
CN114866466A (en) * 2022-03-29 2022-08-05 深圳会当科技有限公司 Device communication method and device, electronic device and readable storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031134A (en) * 2006-02-28 2007-09-05 华为技术有限公司 Agent server and method and safety telecommunication system therewith
CN103209175A (en) * 2013-03-13 2013-07-17 深圳市同洲电子股份有限公司 Method and device for building data transmission connection
CN103944994A (en) * 2014-04-25 2014-07-23 中国联合网络通信集团有限公司 Distributed resource obtaining method and device
CN104601720A (en) * 2015-01-30 2015-05-06 乐视网信息技术(北京)股份有限公司 Cache access control method and device
CN106899681A (en) * 2017-03-10 2017-06-27 腾讯科技(深圳)有限公司 The method and server of a kind of information pushing
CN107273540A (en) * 2017-07-05 2017-10-20 北京三快在线科技有限公司 Distributed search and index updating method, system, server and computer equipment
CN107920101A (en) * 2016-10-10 2018-04-17 阿里巴巴集团控股有限公司 A kind of file access method, device, system and electronic equipment
CN108063714A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 A kind of processing method and processing device of network request
CN108540503A (en) * 2018-07-20 2018-09-14 深圳市网心科技有限公司 A kind of data interactive method and relevant apparatus
CN109802936A (en) * 2018-11-22 2019-05-24 北京奇艺世纪科技有限公司 A kind of network data access method, device and electronic equipment
CN109922053A (en) * 2019-02-22 2019-06-21 北京三快在线科技有限公司 Data transmission method, device, electronic equipment and readable storage medium storing program for executing
CN110381016A (en) * 2019-06-11 2019-10-25 辽宁途隆科技有限公司 The means of defence and device, storage medium, computer equipment of CC attack
CN110851753A (en) * 2019-11-07 2020-02-28 亿企赢网络科技有限公司 Website access method, device, equipment and storage medium
CN110855784A (en) * 2019-11-15 2020-02-28 深圳市网心科技有限公司 Proxy server node selection method, electronic device, system and medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031134A (en) * 2006-02-28 2007-09-05 华为技术有限公司 Agent server and method and safety telecommunication system therewith
CN103209175A (en) * 2013-03-13 2013-07-17 深圳市同洲电子股份有限公司 Method and device for building data transmission connection
CN103944994A (en) * 2014-04-25 2014-07-23 中国联合网络通信集团有限公司 Distributed resource obtaining method and device
CN104601720A (en) * 2015-01-30 2015-05-06 乐视网信息技术(北京)股份有限公司 Cache access control method and device
CN107920101A (en) * 2016-10-10 2018-04-17 阿里巴巴集团控股有限公司 A kind of file access method, device, system and electronic equipment
CN108063714A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 A kind of processing method and processing device of network request
CN106899681A (en) * 2017-03-10 2017-06-27 腾讯科技(深圳)有限公司 The method and server of a kind of information pushing
CN107273540A (en) * 2017-07-05 2017-10-20 北京三快在线科技有限公司 Distributed search and index updating method, system, server and computer equipment
CN108540503A (en) * 2018-07-20 2018-09-14 深圳市网心科技有限公司 A kind of data interactive method and relevant apparatus
CN109802936A (en) * 2018-11-22 2019-05-24 北京奇艺世纪科技有限公司 A kind of network data access method, device and electronic equipment
CN109922053A (en) * 2019-02-22 2019-06-21 北京三快在线科技有限公司 Data transmission method, device, electronic equipment and readable storage medium storing program for executing
CN110381016A (en) * 2019-06-11 2019-10-25 辽宁途隆科技有限公司 The means of defence and device, storage medium, computer equipment of CC attack
CN110851753A (en) * 2019-11-07 2020-02-28 亿企赢网络科技有限公司 Website access method, device, equipment and storage medium
CN110855784A (en) * 2019-11-15 2020-02-28 深圳市网心科技有限公司 Proxy server node selection method, electronic device, system and medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104523A (en) * 2020-09-11 2020-12-18 中国联合网络通信集团有限公司 Detection method, device and equipment for flow transparent transmission and storage medium
CN112104523B (en) * 2020-09-11 2022-04-12 中国联合网络通信集团有限公司 Detection method, device and equipment for flow transparent transmission and storage medium
CN114363294A (en) * 2020-09-27 2022-04-15 华为云计算技术有限公司 Tenant server management method, device and system
CN114363294B (en) * 2020-09-27 2024-03-15 华为云计算技术有限公司 Management method, device and system of tenant server
CN112835655A (en) * 2021-02-26 2021-05-25 深圳市晨北科技有限公司 Transparent data transmission method, system, transmission terminal and storage medium
CN112835655B (en) * 2021-02-26 2024-05-10 深圳市晨北科技有限公司 Transparent data transmission method, system, transmission terminal and storage medium
CN113992448A (en) * 2021-12-28 2022-01-28 北京瑞莱智慧科技有限公司 Data transparent transmission method, system, medium and computing device
CN113992448B (en) * 2021-12-28 2022-04-12 北京瑞莱智慧科技有限公司 Data transparent transmission method, system, medium and computing device
CN114866466A (en) * 2022-03-29 2022-08-05 深圳会当科技有限公司 Device communication method and device, electronic device and readable storage medium

Similar Documents

Publication Publication Date Title
CN111405039A (en) Data transparent transmission method, device and system, client and server
CN106331098B (en) Server cluster system
CN107204901B (en) Computer system for providing and receiving state notice
CN110545566B (en) Link switching method, device, equipment and storage medium
US9049241B2 (en) Peer discovery and secure communication in failover schemes
EP3940575B1 (en) Methods and apparatuses for identifying to-be-filtered transaction based on blockchain integrated station
CN103812823A (en) Method, device and system for configuration information migration in thermal migration of virtual machine
JP2007219608A (en) Load balancing processing program and load balancing device
US9935853B2 (en) Application centric network experience monitoring
CN112217833B (en) Secure socket protocol unloading method and device, storage medium and electronic equipment
CN114024972A (en) Long connection communication method, system, device, equipment and storage medium
CN103078791A (en) Method, device and system for processing operation, administration and maintenance (OAM) message
CN112187911A (en) Message transmission method, device, storage medium and system based on network isolation
CN103597466A (en) Real-time data monitoring based on data push
CN112702229B (en) Data transmission method, device, electronic equipment and storage medium
CN116723195B (en) Data transmission method, device, electronic equipment and storage medium
CN105281940B (en) Method, equipment and system for HELLO message interaction based on NETCONF protocol
CN111741006B (en) Discrete acquisition gateway and implementation method thereof
CN111262830B (en) Security authentication method, device, system, electronic equipment and storage medium
CN111010362B (en) Monitoring method and device for abnormal host
JP2005018300A (en) Contents distributing system
CN105554134A (en) Information synchronization and device
CN113204449B (en) Session backup method, computer-readable storage medium and terminal device
US20170222904A1 (en) Distributed Business Transaction Specific Network Data Capture
CN112769776B (en) Distributed service response method, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200710