CN112291350A - File transmission method, system, device and medium - Google Patents

File transmission method, system, device and medium Download PDF

Info

Publication number
CN112291350A
CN112291350A CN202011186820.6A CN202011186820A CN112291350A CN 112291350 A CN112291350 A CN 112291350A CN 202011186820 A CN202011186820 A CN 202011186820A CN 112291350 A CN112291350 A CN 112291350A
Authority
CN
China
Prior art keywords
file
small
encrypted
files
queue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011186820.6A
Other languages
Chinese (zh)
Inventor
何金彪
秦正
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202011186820.6A priority Critical patent/CN112291350A/en
Publication of CN112291350A publication Critical patent/CN112291350A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses a file transmission method, which comprises the following steps: splitting a large file to be transmitted into a plurality of small files; numbering each small file, and adding the small files into a sending queue; reading the small files in the queue to form a file stream; determining a corresponding key of the file stream and a part to be encrypted according to the read number of the small file so as to encrypt the part to be encrypted by using the key; and transmitting the encrypted file stream to a destination terminal. The invention also discloses a system, a computer device and a readable storage medium. According to the scheme provided by the invention, the large file is divided into the plurality of small files, each small file is numbered, and the key is determined according to the number, so that each small file has a unique number and key, the absolute safety of file transmission is ensured, and meanwhile, the performance loss is reduced because only part of the file stream is encrypted.

Description

File transmission method, system, device and medium
Technical Field
The present invention relates to the field of file transmission, and in particular, to a file transmission method, system, device, and storage medium.
Background
With the rapid development of the internet, a large-scale and ultra-large-scale data center becomes a demand for the development of the modern society more and more. In some financial industry scenes, business data are accumulated continuously, a plurality of large files or super large files are generated to be used for storing historical business data, and due to continuous upgrading and expansion of the business, the data need to be migrated to another large data cluster to share the storage pressure of the original cluster, and in the period, a large number of business historical data files are migrated to another cluster in a cross-cluster migration scene related to the data files with huge capacity. The large file cross-cluster transmission is a common problem, the transmission is not stable enough, the efficiency is not high, and the integrity of the data file after transmission cannot be guaranteed.
In order to improve transmission efficiency, a method of splitting a large file into small files and compressing and splitting the large file into a plurality of small files for transmission is generally adopted, but in the transmission process, due to network reasons, part of files fail to be transmitted, the files which fail to be transmitted need to be added into a source memory queue for retransmission, after the files are transmitted to a destination end, the sequence cannot be guaranteed, and the problem of disordered sequence occurs in the file recovery process. In addition, in the process of file transmission, confidential files or service privacy data are involved, the confidentiality of the data needs to be realized by encrypting the files, and the data of a user is prevented from being stolen or leaked. The conventional encryption scheme is to completely encrypt the file, is suitable for encryption transmission of small files, and for large files, the performance of the large files is greatly reduced when all split files are encrypted; the symmetric encryption and decryption algorithm is public, the key is generally fixed, and once the key is leaked, all files risk to be intercepted and leaked.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides a file transmission method, including:
splitting a large file to be transmitted into a plurality of small files;
numbering each small file, and adding the small files into a sending queue;
reading the small files in the queue to form a file stream;
determining a corresponding key of the file stream and a part to be encrypted according to the read number of the small file so as to encrypt the part to be encrypted by using the key;
and transmitting the encrypted file stream to a destination terminal.
In some embodiments, determining a key of the corresponding file stream and a portion to be encrypted according to the number of the read small file to encrypt the portion to be encrypted with the key, further includes:
and taking the number N of the read small file as a key, and taking the first N bits in the file stream as a part to be encrypted.
In some embodiments, further comprising:
monitoring the sending queue;
in response to the number of small files in the queue reaching a threshold, ceasing to add the small files to the queue.
In some embodiments, further comprising:
and responding to the receiving of the file stream by the destination, determining a number corresponding to the file stream and decrypting the encrypted part in the file stream by using the corresponding number.
In some embodiments, further comprising:
and adding the decrypted file stream into a receiving queue of the destination end to form a small file.
In some embodiments, further comprising:
in response to the fact that the number of the small files in the receiving queue reaches a threshold value, combining all the small files in the receiving queue according to a numbering sequence to obtain an intermediate file;
and combining the plurality of intermediate files to obtain the large file to be transmitted.
In some embodiments, further comprising:
comparing the verification parameters of the large file to be transmitted of the destination end with the verification parameters of the large file to be transmitted before transmission;
and determining that the transmission of the large file to be transmitted is successful in response to the fact that the verification parameters are the same.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a file transfer system, including:
a splitting module configured to split a large file to be transmitted into a plurality of small files;
the numbering module is configured to number each small file and add the small files into a sending queue;
a read module configured to read the small files in the queue to form a file stream;
the encryption module is configured to determine a corresponding key of the file stream and a part to be encrypted according to the read number of the small file so as to encrypt the part to be encrypted by using the key;
and the transmission module is configured to transmit the encrypted file stream to a destination.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of any of the file transfer methods described above.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any of the file transfer methods described above.
The invention has one of the following beneficial technical effects: according to the scheme provided by the invention, the large file is divided into the plurality of small files, each small file is numbered, and the key is determined according to the number, so that each small file has a unique number and key, the absolute safety of file transmission is ensured, and meanwhile, the performance loss is reduced because only part of the file stream is encrypted.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a file transmission method according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a file transfer system according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In embodiments of the present invention, Spark refers to a fast, general-purpose computing engine designed specifically for large-scale data processing.
According to an aspect of the present invention, an embodiment of the present invention provides a file transmission method, as shown in fig. 1, which may include the steps of:
s1, splitting the large file to be transmitted into a plurality of small files;
s2, numbering each small file, and adding the small files into a sending queue;
s3, reading the small files in the queue to form a file stream;
s4, determining a corresponding key of the file stream and a part to be encrypted according to the number of the read small file so as to encrypt the part to be encrypted by using the key;
and S5, transmitting the encrypted file stream to the destination terminal.
According to the scheme provided by the invention, the large file is divided into the plurality of small files, each small file is numbered, and the key is determined according to the number, so that each small file has a unique number and key, the absolute safety of file transmission is ensured, and meanwhile, the performance loss is reduced because only part of the file stream is encrypted.
In some embodiments, in step S1, the large file to be transmitted is split into multiple small files, and specifically, before file transmission, basic information of the large file (or extra large file) file txt to be transmitted, including a file path, a size, a last modification time, a file MD5 value, and the like, may be first obtained. And then storing the basic information of the file file.txt in file info.xml, and waiting for transmission to a destination terminal. Large files can then be split and compressed into numerous small files using big data technology. For example, Spark technology can be used to split a large file into multiple small files, such as: file _1.txt, file _2.txt, …, file _ n.txt; then, compressing the split file, and automatically specifying a compression format, wherein the compression is as follows: file _1.txt.gz, file _2.txt.gz, …, file _ n.txt.gz.
In some embodiments, in step S2, each of the small files is numbered and added to the sending queue, specifically, after the large file is split and compressed, the compressed small files are numbered according to an automatic increment rule, each small file corresponds to a unique number, and then the small file carrying the unique number is added to the internal memory alignment.
In some embodiments, step S4, determining a key of the corresponding file stream and a portion to be encrypted according to the number of the read small file, so as to encrypt the portion to be encrypted with the key, further includes:
and taking the number N of the read small file as a key, and taking the first N bits in the file stream as a part to be encrypted.
Specifically, after the compressed small file carries a unique number and is added to the memory, the small file is partially encrypted, taking file _ n.txt.gz as an example, the specific process may be as follows: acquiring the number n of the compressed small file, and taking the n as a key of the small file; reading the compressed file to form a file stream, and encrypting the first n bits of the file stream by using a symmetric encryption algorithm to obtain a partially encrypted compressed file _ n _ encrypted.
In some embodiments, further comprising:
monitoring the sending queue;
in response to the number of small files in the queue reaching a threshold, ceasing to add the small files to the queue.
Specifically, the sending queue may set the number of the small files to be accommodated according to the size, and if the threshold is set to 100, the file initially stored is file _1. txt.gz-file _100. txt.gz. And a stream switch can be set, so that by keeping the monitoring state of the sending queue, when the sending queue does not reach the threshold limit, the small files can be continuously added into the sending queue, and the added small files are transmitted in a stream mode through the network. If the transmission speed is slow in a certain period of time due to network reasons, and the source end sending queue continuously receives the split and compressed small files at the moment, and the number of the files in the queue to be sent reaches a threshold value, closing the streaming switch to stop adding the small files into the sending queue of the source end. And keeping the monitoring state of the memory queue device, and opening the stream switch to continue adding the small files into the memory queue device when the number of the files is monitored to be less than the threshold value.
In some embodiments, further comprising:
and responding to the receiving of the file stream by the destination, determining a number corresponding to the file stream and decrypting the encrypted part in the file stream by using the corresponding number.
In some embodiments, further comprising:
and adding the decrypted file stream into a receiving queue of the destination end to form a small file.
Specifically, the connection of transmission channels of the data source end and the destination end can be established through the network, and uninterrupted streaming transmission is performed. If the transmission of a certain small file is unsuccessful, the small file is continuously added into a sending queue of the source end to wait for the next transmission. After the file stream of the small file is transmitted to the destination end, the number corresponding to the file stream is determined, then the encrypted part in the file stream is decrypted, and the decrypted file stream is added into a receiving queue of the destination end to form the small file.
In some embodiments, further comprising:
in response to the fact that the number of the small files in the receiving queue reaches a threshold value, combining all the small files in the receiving queue according to a numbering sequence to obtain an intermediate file;
and combining the plurality of intermediate files to obtain the large file to be transmitted.
Specifically, the receiving queue may set the number of files to be accommodated according to the size, for example, setting the threshold value to 100; and when the number of the small files stored in the receiving queue of the destination end reaches the threshold value 100, executing the next flow. That is, the file in the batch is decompressed and merged, that is, a large data technology is used to decompress and merge a plurality of small files into an intermediate file. And during merging, batch recovery reduction can be performed according to the numbers, so that the sequence of the files is ensured. And repeating the process to obtain a plurality of intermediate files, and finally combining the plurality of intermediate files in sequence to obtain the large file to be transmitted.
For example, 100 files (file _1. txt.gz-file _100.txt.gz) in the first batch are respectively decompressed; then merging the files of the batch by using Spark technology to generate a temporary merged file merge _1. txt; before the transmission of a plurality of small files split from file.txt is finished, the steps are executed, and merge _2.txt, merge _3.txt, … and merge _ n.txt are sequentially generated; and merging the generated temporary merged files merge _1.txt, merge _2.txt, … and merge _ n.txt into a final target file merge.
In some embodiments, further comprising:
comparing the verification parameters of the large file to be transmitted of the destination end with the verification parameters of the large file to be transmitted before transmission;
and determining that the transmission of the large file to be transmitted is successful in response to the fact that the verification parameters are the same.
Specifically, the information file fileinfo.xml can be read to obtain the verification parameters, including the file size, the last modification time, the MD5 verification value information, and the like; txt size and MD5 value of the file received by the destination terminal are obtained; finally, the integrity check is carried out on the comparison between the size and the MD5 value so as to judge whether the transmission of the large file is successful.
The proposal provided by the invention uses the big data technology to compress and split the big file into a plurality of small files at the data source end and decompress and combine the small files into a big file at the data destination end, thereby fully utilizing the computing resources and improving the utilization rate of the resources. At the data source end, the small file after compression and splitting is directly written into the memory queue device, so that the data does not fall to the ground, and the utilization rate of the disk is greatly saved. The small files can continuously transmit tasks in the network transmission process, and are transmitted as streaming tasks, so that the transmission speed can be increased, the maintenance cost of operation and maintenance personnel is saved, and the time cost is saved. When the large file is split into a plurality of small files, each small file is numbered, and the key is determined according to the number, so that each small file has a unique number and a unique key, the absolute safety of file transmission is ensured, and meanwhile, only part of the file stream is encrypted, and the performance loss is reduced.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a file transfer system 400, as shown in fig. 2, including:
a splitting module 401, wherein the splitting module 401 is configured to split a large file to be transmitted into a plurality of small files;
a numbering module 402, where the numbering module 402 is configured to number each of the small files and add the small files to a sending queue;
a reading module 403, where the reading module 403 is configured to read the small files in the queue to form a file stream;
an encryption module 404, where the encryption module 404 is configured to determine a key of the corresponding file stream and a portion to be encrypted according to the read number of the small file, so as to encrypt the portion to be encrypted by using the key;
a transmission module 405, wherein the transmission module 405 is configured to transmit the encrypted file stream to the destination.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
the memory 510, the memory 510 storing a computer program 511 executable on the processor, the processor 520 executing the program performing the steps of any of the file transfer methods as described above.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 4, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of any of the above file transfer methods.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware to implement the methods.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A file transmission method is characterized by comprising the following steps:
splitting a large file to be transmitted into a plurality of small files;
numbering each small file, and adding the small files into a sending queue;
reading the small files in the queue to form a file stream;
determining a corresponding key of the file stream and a part to be encrypted according to the read number of the small file so as to encrypt the part to be encrypted by using the key;
and transmitting the encrypted file stream to a destination terminal.
2. The method of claim 1, wherein a key of the corresponding file stream and a portion to be encrypted are determined according to the number of the read small file to encrypt the portion to be encrypted with the key, further comprising:
and taking the number N of the read small file as a key, and taking the first N bits in the file stream as a part to be encrypted.
3. The method of claim 2, further comprising:
monitoring the sending queue;
in response to the number of small files in the queue reaching a threshold, ceasing to add the small files to the queue.
4. The method of claim 1, further comprising:
and responding to the receiving of the file stream by the destination, determining a number corresponding to the file stream and decrypting the encrypted part in the file stream by using the corresponding number.
5. The method of claim 4, further comprising:
and adding the decrypted file stream into a receiving queue of the destination end to form a small file.
6. The method of claim 5, further comprising:
in response to the fact that the number of the small files in the receiving queue reaches a threshold value, combining all the small files in the receiving queue according to a numbering sequence to obtain an intermediate file;
and combining the plurality of intermediate files to obtain the large file to be transmitted.
7. The method of claim 6, further comprising:
comparing the verification parameters of the large file to be transmitted of the destination end with the verification parameters of the large file to be transmitted before transmission;
and determining that the transmission of the large file to be transmitted is successful in response to the fact that the verification parameters are the same.
8. A file transfer system, comprising:
a splitting module configured to split a large file to be transmitted into a plurality of small files;
the numbering module is configured to number each small file and add the small files into a sending queue;
a read module configured to read the small files in the queue to form a file stream;
the encryption module is configured to determine a corresponding key of the file stream and a part to be encrypted according to the read number of the small file so as to encrypt the part to be encrypted by using the key;
and the transmission module is configured to transmit the encrypted file stream to a destination.
9. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of the method according to any of claims 1-7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 1 to 7.
CN202011186820.6A 2020-10-29 2020-10-29 File transmission method, system, device and medium Withdrawn CN112291350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011186820.6A CN112291350A (en) 2020-10-29 2020-10-29 File transmission method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011186820.6A CN112291350A (en) 2020-10-29 2020-10-29 File transmission method, system, device and medium

Publications (1)

Publication Number Publication Date
CN112291350A true CN112291350A (en) 2021-01-29

Family

ID=74353561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011186820.6A Withdrawn CN112291350A (en) 2020-10-29 2020-10-29 File transmission method, system, device and medium

Country Status (1)

Country Link
CN (1) CN112291350A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783939A (en) * 2021-08-20 2021-12-10 奇安信科技集团股份有限公司 File transmission method and device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783939A (en) * 2021-08-20 2021-12-10 奇安信科技集团股份有限公司 File transmission method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111683069B (en) Customized communication protocol and service method based on netty framework
EP3937051B1 (en) Methods and apparatuses for processing transactions based on blockchain integrated station
US20120011101A1 (en) Integrating client and server deduplication systems
KR102412024B1 (en) Indexing and recovery of encoded blockchain data
US11783339B2 (en) Methods and apparatuses for transferring transaction based on blockchain integrated station
US20200213331A1 (en) Data service system
CN112615899A (en) Large file transmission method, device and system
CN111339192A (en) Distributed edge computing data storage system
CN104661042A (en) Method, device and system for transmitting transport stream
CN113507483B (en) Instant messaging method, device, server and storage medium
US9332405B2 (en) Short message backup method, mobile terminal, and server
KR20220074971A (en) Blockchain-based data processing method, apparatus and device, and readable storage medium
CN111416992A (en) File transcoding method and device
CN112291350A (en) File transmission method, system, device and medium
CN110719526A (en) Video playing method and device
CN116955355A (en) Block data processing method and device and electronic equipment
US20070263876A1 (en) In-memory compression and encryption
CN115499244A (en) Streaming data safe transmission and storage method based on data lake
CN113704206B (en) Metadata processing method and device, electronic equipment and storage medium
CN112667586B (en) Method, system, equipment and medium for synchronizing data based on stream processing
CN114650188A (en) Data secure transmission method and device based on proxy node
WO2020113434A1 (en) Method and apparatus for processing time records
CN111262837A (en) Data encryption method, data decryption method, system, equipment and medium
CN110648140A (en) Multi-chain matching method and device based on block chain
CN116232944B (en) Method, equipment and medium for transport layer security protocol message service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210129