CN113067826A - Report sending system based on big data analysis - Google Patents

Report sending system based on big data analysis Download PDF

Info

Publication number
CN113067826A
CN113067826A CN202110316018.2A CN202110316018A CN113067826A CN 113067826 A CN113067826 A CN 113067826A CN 202110316018 A CN202110316018 A CN 202110316018A CN 113067826 A CN113067826 A CN 113067826A
Authority
CN
China
Prior art keywords
report
receiving end
transmission channel
information
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110316018.2A
Other languages
Chinese (zh)
Inventor
陈杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110316018.2A priority Critical patent/CN113067826A/en
Publication of CN113067826A publication Critical patent/CN113067826A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a report sending system and a method based on big data analysis, wherein the report sending system comprises an acquisition request information acquisition module and a transmission mode determination module, the acquisition request information acquisition module acquires acquisition request information when a first receiving end initiates a report to be acquired to the first sending end, the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel, the transmission mode determination module determines the transmission mode of the report to be acquired according to the content of the acquisition request information, and the transmission mode determination module comprises a transmission channel judgment module of the request information, an external characteristic identifier judgment module, a privacy level acquisition module, a privacy level comparison module, a second receiving end selection module, a verification transmission module and a request failure transmission module.

Description

Report sending system based on big data analysis
Technical Field
The invention relates to the field of report transmission, in particular to a report sending system based on big data analysis.
Background
With the progress of network technology, online office becomes popular. The distance obstacle is overcome in the online office work, so that the remote office work becomes possible, the online office work can even move the office place to home, the staff is less to rush to work and get out of office, the office efficiency is improved, and the office place can be saved for the company. However, since the authenticity of the other party cannot be confirmed in the online office, the risk is high when the online office sends the transmission report.
Disclosure of Invention
The invention aims to provide a report sending system and method based on big data analysis, and aims to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a report sending system based on big data analysis comprises an acquisition request information acquisition module and a transmission mode determination module, wherein the acquisition request information acquisition module is used for acquiring acquisition request information when a first receiving end initiates a report to be acquired to a first sending end, the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel, and the transmission mode determination module determines the transmission mode of the report to be acquired according to the content of the acquisition request information.
Preferably, the transmission mode determining module comprises a transmission channel judging module for requesting information, an external characteristic identifier judging module, a privacy level obtaining module, a privacy level comparing module, a second receiving end selecting module, a verification transmission module and a request failure transmission module, wherein the transmission channel judging module for requesting information is used for judging whether the transmission channel for requesting information is an authentication transmission channel of a first sending end, and judging whether the history of transmitting reports to the first receiving end exists or not according to the external characteristic identifier in the information identifier when the transmission channel for requesting information is the authentication transmission channel of the first sending end and making the second receiving end selecting module work when the transmission channel for requesting information does not exist, if the report request transmission channel exists, a privacy level acquisition module is enabled to work, the privacy level acquisition module is used for acquiring the privacy level of a report request transmission channel used by a first sending end for transmitting a report to a first receiving end at the latest time, the privacy level of the report to be acquired and the privacy level of the report request transmission channel, the privacy level comparison module comprises a first level comparison module and a second level comparison module, the first level comparison module compares the relation between the privacy level of the report request transmission channel at the latest time and the privacy level of the report to be acquired, when the privacy level of the report request transmission channel at the latest time is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the report request transmission channel at the latest time, and when the privacy level of the report request transmission channel at the latest time is lower than the privacy level of the report to be acquired, comparing the relation between the privacy level of the report request transmission channel and the privacy level of the report to be acquired, and when the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired and the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, using the receiving end which has transmitted the report through the report request transmission channel by the first sending end most recently as the second receiving end, and when the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired or the history of transmitting the report to other receiving ends through the report request transmission channel by the first sending end does not exist, making the second receiving end selection module work, wherein the second receiving end selection module selects a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end to transmit to the first receiving end, the first receiving end selects an auxiliary receiving end as a second receiving end, the verification transmission module verifies the reliability of the first receiving end, the first sending end transmits the report to be transmitted to the first receiving end through the second receiving end under the condition of verifying the reliability, and the request failure transmission module transmits the information of request failure to the first receiving end through the transmission channel of the request information.
Preferably, the verification transmission module comprises an information transmission channel establishing module, an internal characteristic identification verification module, a temporary channel establishing module and a report division transmission module, wherein the information transmission channel establishing module is used for selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end, the internal characteristic identification verification module is used for verifying the information identification in the acquired request information by the second receiving end, verifying whether the internal characteristic identification in the information identification is true or not, and transmitting the information to enable the request failure transmission module to work when the internal characteristic identification verification module is verified to be false, the temporary channel establishing module establishes a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end when the internal characteristic identification verification module is verified to be true, and transmits the information to enable the report division transmission module to work, the report dividing and transmitting module divides the report to be acquired into n sub-reports, calculates the hash value of each sub-report, and transmits the sub-reports according to the sequence of the sub-reports in the report.
Preferably, the report dividing and transmitting module includes a sub-report transmitting module, a hash value calculating module and a sub-report transmitting judging module, the sub-report transmitting module is used for controlling the first sending end to transmit the ith sub-report to the second receiving end through the information transmission channel, and controlling the second receiving end to transmit the ith sub-report to the first receiving end through the first temporary channel, the hash value calculating module is used for calculating the hash value of the ith sub-report at the first sending end and the hash value of the ith sub-report received by the first receiving end respectively, the sub-report transmitting judging module compares whether the hash values of the ith sub-report at the first sending end and the ith receiving end are the same, and compares the relation between the time interval between the time node of the sub-report transmitted by the first sending end and the time node of the hash value received by the first sending end at the first receiving end and the time interval threshold value, and judging whether to continue transmitting the following sub-reports according to the comparison result.
A report transmission method based on big data analysis, the report transmission method comprising the steps of:
step S1: a first receiving end initiates acquisition request information of a report to be acquired to a first sending end, wherein the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel;
step S2: and determining the transmission mode of the report to be acquired according to the content of the acquisition request information.
Preferably, the step S1 further includes: the information identification is a characteristic identification distributed to the receiving end, when the receiving end initiates acquisition request information, the information identification is contained in the acquisition request information and is sent out, the information identification comprises an external characteristic identification and an internal characteristic identification, the external characteristic identification is used for identification and authentication between the sending end and the receiving end, and the internal characteristic identification is used for identification and authentication between different receiving ends.
Preferably, the step S2 further includes:
step S21: judging whether the transmission channel of the request information is an authentication transmission channel of the first sending end,
if the transmission channel of the request message is not the authentication transmission channel of the first transmitting end, the message of the request failure is transmitted to the first receiving end through the transmission channel of the request message,
if the transmission channel of the request message is the authentication transmission channel of the first sending end, go to step S22;
step S22: judging whether the first sending end has history of transmitting the report to the first receiving end according to the external characteristic mark in the information mark,
if not, go to step S24;
if the report exists, the privacy level of the report request transmission channel used by the first receiving end for transmitting the report to the first receiving end last time and the privacy level of the report to be acquired are acquired,
if the privacy level of the last report request transmission channel is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the last report request transmission channel;
if the privacy level of the last report request transmission channel is lower than the privacy level of the report to be acquired, go to step S23;
step S23: judging whether the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired,
if the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired, judging whether the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, if so, taking the receiving end which has requested the transmission channel to transmit the report through the report request transmission channel last time as the second receiving end, and turning to the step S25, otherwise, turning to the step S24;
if the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired, go to step S24;
step S24: selecting a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end, transmitting the three auxiliary receiving ends to the first receiving end through a transmission channel of the request information, and selecting one auxiliary receiving end from the first receiving end as the second receiving end by the first receiving end, and turning to the step S25;
step S25: and verifying the reliability of the first receiving terminal, and transmitting the report to be transmitted to the first receiving terminal by the first sending terminal through the second receiving terminal under the condition of verifying the reliability.
Preferably, the step S25 further includes:
step S251: selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end;
step S252: the first sending end forwards the acquisition request information to the second receiving end through the information transmission channel, the second receiving end verifies the information identifier in the acquisition request information and verifies whether the internal characteristic identifier in the information identifier is true or not,
if the verification is true, establishing a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end, dividing the report to be acquired into n sub-reports by the first sending end, calculating the hash value of each sub-report, and transmitting the sub-reports according to the sequence of the sub-reports in the report;
if the verification is false, the second receiving end returns to the first sending end through the information transmission channel, and the first sending end is enabled to send the information of the failure request to the first receiving end through the transmission channel of the request information.
Preferably, the step S251 further includes: and randomly selecting a report request transmission channel with the privacy level higher than or equal to the privacy level of the report to be acquired from the report request transmission channels for transmitting the report from the first sending end to the second receiving end as an information transmission channel between the first sending end and the second receiving end.
Preferably, the step S252 of transmitting the sub-reports in the report according to the sequence of the sub-reports further includes:
when the first sending end transmits the ith sub-report to the second receiving end through the information transmission channel, the second receiving end transmits the ith sub-report to the first receiving end through the first temporary channel, the ith sub-report returns to the first time node of the second receiving end through the information transmission channel and is transmitted to the first time node of the first receiving end, the first receiving end calculates the hash value of the sub-report when receiving the ith sub-report, and transmits the hash value to the first sending end through the second temporary channel, and sets the time when the first sending end receives the hash value from the second temporary channel as a second time node, if the hash value of the sub-report received by the first sender is identical to that calculated by the first sender, and the time interval between the second time node and the first time node is smaller than the time interval threshold, the first sending end continues to transmit the (i + 1) th sub-report, otherwise, the first sending end stops transmitting the report.
Compared with the prior art, the invention has the beneficial effects that: the invention determines the transmission mode of the report to be acquired according to the external characteristic mark and the internal characteristic mark in the information mark, whether the transmission channel of the request information is the authentication transmission channel of the first sending end, the privacy level of the report request transmission channel and the privacy level of the report to be acquired, thereby increasing the safety of the first sending end in the process of transmitting the report to the first receiving end.
Drawings
FIG. 1 is a block diagram of a big data analysis based report sending system according to the present invention;
fig. 2 is a flowchart illustrating a report sending method based on big data analysis according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, in an embodiment of the present invention, a report sending system and a method based on big data analysis include an acquisition request information obtaining module and a transmission mode determining module, where the acquisition request information obtaining module is configured to obtain acquisition request information when a first receiving end initiates a report to be acquired to a first sending end, the acquisition request information includes an information identifier, a transmission channel of the request information, and a report request transmission channel, and the transmission mode determining module determines a transmission mode of the report to be acquired according to content of the acquisition request information.
The transmission mode determining module comprises a transmission channel judging module of the request information, an external characteristic identification judging module, a privacy grade obtaining module, a privacy grade comparing module, a second receiving end selecting module, a verification transmission module and a request failure transmission module, wherein the transmission channel judging module of the request information is used for judging whether the transmission channel of the request information is an authentication transmission channel of a first sending end, and judging whether the history of transmitting reports to the first receiving end exists at the first sending end according to the external characteristic identification in the information identification under the condition that the transmission channel of the request information is the authentication transmission channel of the first sending end and making the second receiving end selecting module work under the condition that the transmission channel of the request information does not exist, if the report request transmission channel exists, a privacy level acquisition module is enabled to work, the privacy level acquisition module is used for acquiring the privacy level of a report request transmission channel used by a first sending end for transmitting a report to a first receiving end at the latest time, the privacy level of the report to be acquired and the privacy level of the report request transmission channel, the privacy level comparison module comprises a first level comparison module and a second level comparison module, the first level comparison module compares the relation between the privacy level of the report request transmission channel at the latest time and the privacy level of the report to be acquired, when the privacy level of the report request transmission channel at the latest time is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the report request transmission channel at the latest time, and when the privacy level of the report request transmission channel at the latest time is lower than the privacy level of the report to be acquired, comparing the relation between the privacy level of the report request transmission channel and the privacy level of the report to be acquired, and when the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired and the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, using the receiving end which has transmitted the report through the report request transmission channel by the first sending end most recently as the second receiving end, and when the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired or the history of transmitting the report to other receiving ends through the report request transmission channel by the first sending end does not exist, making the second receiving end selection module work, wherein the second receiving end selection module selects a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end to transmit to the first receiving end, the first receiving end selects an auxiliary receiving end as a second receiving end, the verification transmission module verifies the reliability of the first receiving end, the first sending end transmits the report to be transmitted to the first receiving end through the second receiving end under the condition of verifying the reliability, and the request failure transmission module transmits the information of request failure to the first receiving end through the transmission channel of the request information.
The verification transmission module comprises an information transmission channel establishing module, an internal characteristic identification verification module, a temporary channel establishing module and a report division transmission module, wherein the information transmission channel establishing module is used for selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end, the internal characteristic identification verification module is used for verifying and acquiring an information identification in request information by the second receiving end, verifying whether the internal characteristic identification in the information identification is true or not, transmitting the information when the verification is false and enabling the request failure transmission module to work, the temporary channel establishing module establishes a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end when the internal characteristic identification verification module is true and transmits the information to enable the report division transmission module to work, the report dividing and transmitting module divides the report to be acquired into n sub-reports, calculates the hash value of each sub-report, and transmits the sub-reports according to the sequence of the sub-reports in the report.
The report dividing and transmitting module comprises a sub-report transmitting module, a hash value calculating module and a sub-report transmitting judging module, wherein the sub-report transmitting module is used for controlling the first transmitting terminal to transmit the ith sub-report to the second receiving terminal through an information transmission channel and controlling the second receiving terminal to transmit the ith sub-report to the first receiving terminal through a first temporary channel and through the information transmission channel, the hash value calculating module is used for respectively calculating the hash value of the ith sub-report at the first transmitting terminal and the hash value of the ith sub-report received by the first receiving terminal, the sub-report transmitting judging module compares whether the hash values of the ith sub-report at the first transmitting terminal and the ith sub-report at the first receiving terminal are the same or not and compares the relation between the time interval between the time node of the sub-report transmitted by the first transmitting terminal and the time node of the hash value received by the first transmitting terminal and the time interval threshold value, and judging whether to continue transmitting the following sub-reports according to the comparison result.
A report transmission method based on big data analysis, the report transmission method comprising the steps of:
step S1: a first receiving end initiates acquisition request information of a report to be acquired to a first sending end, wherein the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel;
the information identification is a characteristic identification distributed to the receiving end, when the receiving end initiates acquisition request information, the information identification is contained in the acquisition request information and is sent out, the information identification comprises an external characteristic identification and an internal characteristic identification, the external characteristic identification is used for identification and authentication between the sending end and the receiving end, and the internal characteristic identification is used for identification and authentication between different receiving ends.
Step S2: determining the transmission mode of the report to be acquired according to the content of the acquisition request information:
step S21: judging whether the transmission channel of the request information is an authentication transmission channel of the first sending end,
if the transmission channel of the request message is not the authentication transmission channel of the first transmitting end, the message of the request failure is transmitted to the first receiving end through the transmission channel of the request message,
if the transmission channel of the request message is the authentication transmission channel of the first sending end, go to step S22; the authentication transmission channel is a transmission channel of authenticated request information preset by the first sending end;
step S22: judging whether the first sending end has history of transmitting the report to the first receiving end according to the external characteristic mark in the information mark,
if not, go to step S24;
if the report exists, the privacy level of the report request transmission channel used by the first receiving end for transmitting the report to the first receiving end last time and the privacy level of the report to be acquired are acquired,
if the privacy level of the last report request transmission channel is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the last report request transmission channel;
if the privacy level of the last report request transmission channel is lower than the privacy level of the report to be acquired, go to step S23;
step S23: judging whether the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired,
if the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired, judging whether the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, if so, taking the receiving end which has requested the transmission channel to transmit the report through the report request transmission channel last time as the second receiving end, and turning to the step S25, otherwise, turning to the step S24;
if the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired, go to step S24;
step S24: selecting a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end, transmitting the three auxiliary receiving ends to the first receiving end through a transmission channel of the request information, and selecting one auxiliary receiving end from the first receiving end as the second receiving end by the first receiving end, and turning to the step S25;
step S25: verifying the reliability of the first receiving terminal, and under the condition of verifying the reliability, the first sending terminal transmits the report to be transmitted to the first receiving terminal through the second receiving terminal:
the step S25 further includes:
step S251: randomly selecting a report request transmission channel with the privacy level higher than or equal to the privacy level of the report to be acquired from the report request transmission channels for transmitting the report from the first sending end to the second receiving end as an information transmission channel between the first sending end and the second receiving end;
step S252: the first sending end forwards the acquisition request information to the second receiving end through the information transmission channel, the second receiving end verifies the information identifier in the acquisition request information and verifies whether the internal characteristic identifier in the information identifier is true or not,
if the verification is true, establishing a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end, dividing the report to be acquired into n sub-reports by the first sending end, calculating the hash value of each sub-report, and transmitting the sub-reports according to the sequence of the sub-reports in the report;
if the verification is false, the second receiving end returns to the first sending end through the information transmission channel, and the first sending end is enabled to send the information of the failure request to the first receiving end through the transmission channel of the request information.
The step S252 of transmitting the sub-reports in the report according to the sequence of the sub-reports further includes:
when the first sending end transmits the ith sub report to the second receiving end through the information transmission channel, the second receiving end transmits the ith sub report to the first receiving end through the first temporary channel, the first receiving end returns the second receiving end through the information transmission channel to send the sub report to the first time node of the first receiving end, the first receiving end calculates the hash value of the sub report when receiving the ith sub report and transmits the hash value to the first sending end through the second temporary channel, the time when the first sending end receives the hash value from the second temporary channel is set as the second time node, if the hash value of the sub report received by the first sending end is consistent with that calculated by the first sending end and the time interval between the second time node and the first time node is smaller than the time interval threshold value, the first sending end continues to transmit the (i + 1) th sub report, otherwise, the first sending end stops to transmit the report, the value of i ranges from 1 to i-1.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (5)

1. A report sending system based on big data analysis is characterized in that: the report sending system comprises an acquisition request information acquisition module and a transmission mode determination module, wherein the acquisition request information acquisition module is used for acquiring acquisition request information when a first receiving end initiates a report to be acquired to a first sending end, the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel, and the transmission mode determination module determines the transmission mode of the report to be acquired according to the content of the acquisition request information;
the report sending method based on big data analysis comprises the following steps:
step S1: a first receiving end initiates acquisition request information of a report to be acquired to a first sending end, wherein the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel;
step S2: determining a transmission mode of a report to be acquired according to the content of the acquisition request information;
the step S1 further includes: the information identification is a characteristic identification distributed to the receiving end, when the receiving end initiates acquisition request information, the information identification is contained in the acquisition request information and is sent out, the information identification comprises an external characteristic identification and an internal characteristic identification, the external characteristic identification is used for identification and authentication between the sending end and the receiving end, and the internal characteristic identification is used for identification and authentication between different receiving ends.
2. The big data analysis-based report sending method according to claim 1, wherein: the step S2 further includes:
step S21: judging whether the transmission channel of the request information is an authentication transmission channel of the first sending end,
if the transmission channel of the request message is not the authentication transmission channel of the first transmitting end, the message of the request failure is transmitted to the first receiving end through the transmission channel of the request message,
if the transmission channel of the request message is the authentication transmission channel of the first sending end, go to step S22;
step S22: judging whether the first sending end has history of transmitting the report to the first receiving end according to the external characteristic mark in the information mark,
if not, go to step S24;
if the report exists, the privacy level of the report request transmission channel used by the first receiving end for transmitting the report to the first receiving end last time and the privacy level of the report to be acquired are acquired,
if the privacy level of the last report request transmission channel is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the last report request transmission channel;
if the privacy level of the last report request transmission channel is lower than the privacy level of the report to be acquired, go to step S23;
step S23: judging whether the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired,
if the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired, judging whether the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, if so, taking the receiving end which has requested the transmission channel to transmit the report through the report request transmission channel last time as the second receiving end, and turning to the step S25, otherwise, turning to the step S24;
if the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired, go to step S24;
step S24: selecting a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end, transmitting the three auxiliary receiving ends to the first receiving end through a transmission channel of the request information, and selecting one auxiliary receiving end from the first receiving end as the second receiving end by the first receiving end, and turning to the step S25;
step S25: and verifying the reliability of the first receiving terminal, and transmitting the report to be transmitted to the first receiving terminal by the first sending terminal through the second receiving terminal under the condition of verifying the reliability.
3. The big data analysis-based report sending method according to claim 2, wherein: the step S25 further includes:
step S251: selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end;
step S252: the first sending end forwards the acquisition request information to the second receiving end through the information transmission channel, the second receiving end verifies the information identifier in the acquisition request information and verifies whether the internal characteristic identifier in the information identifier is true or not,
if the verification is true, establishing a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end, dividing the report to be acquired into n sub-reports by the first sending end, calculating the hash value of each sub-report, and transmitting the sub-reports according to the sequence of the sub-reports in the report;
if the verification is false, the second receiving end returns to the first sending end through the information transmission channel, and the first sending end is enabled to send the information of the failure request to the first receiving end through the transmission channel of the request information.
4. The big data analysis-based report sending method according to claim 3, wherein: the step S251 further includes: and randomly selecting a report request transmission channel with the privacy level higher than or equal to the privacy level of the report to be acquired from the report request transmission channels for transmitting the report from the first sending end to the second receiving end as an information transmission channel between the first sending end and the second receiving end.
5. The big data analysis-based report sending method according to claim 4, wherein: the step S252 of transmitting the sub-reports in the report according to the sequence of the sub-reports further includes:
when the first sending end transmits the ith sub-report to the second receiving end through the information transmission channel, the second receiving end transmits the ith sub-report to the first receiving end through the first temporary channel, the ith sub-report returns to the first time node of the second receiving end through the information transmission channel and is transmitted to the first time node of the first receiving end, the first receiving end calculates the hash value of the sub-report when receiving the ith sub-report, and transmits the hash value to the first sending end through the second temporary channel, and sets the time when the first sending end receives the hash value from the second temporary channel as a second time node, if the hash value of the sub-report received by the first sender is identical to that calculated by the first sender, and the time interval between the second time node and the first time node is smaller than the time interval threshold, the first sending end continues to transmit the (i + 1) th sub-report, otherwise, the first sending end stops transmitting the report.
CN202110316018.2A 2020-07-16 2020-07-16 Report sending system based on big data analysis Pending CN113067826A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110316018.2A CN113067826A (en) 2020-07-16 2020-07-16 Report sending system based on big data analysis

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010686300.5A CN111885037B (en) 2020-07-16 2020-07-16 Report sending system and method based on big data analysis
CN202110316018.2A CN113067826A (en) 2020-07-16 2020-07-16 Report sending system based on big data analysis

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202010686300.5A Division CN111885037B (en) 2020-07-16 2020-07-16 Report sending system and method based on big data analysis

Publications (1)

Publication Number Publication Date
CN113067826A true CN113067826A (en) 2021-07-02

Family

ID=73156123

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110316018.2A Pending CN113067826A (en) 2020-07-16 2020-07-16 Report sending system based on big data analysis
CN202010686300.5A Active CN111885037B (en) 2020-07-16 2020-07-16 Report sending system and method based on big data analysis

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010686300.5A Active CN111885037B (en) 2020-07-16 2020-07-16 Report sending system and method based on big data analysis

Country Status (1)

Country Link
CN (2) CN113067826A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011069295A1 (en) * 2009-12-11 2011-06-16 Nokia Corporation Method, apparatus and computer program product for allocating resources in wireless communication network
WO2011088768A1 (en) * 2010-01-20 2011-07-28 腾讯科技(深圳)有限公司 Data transmission method and system, terminal thereof
CN106254507A (en) * 2016-08-29 2016-12-21 苏州蓝海彤翔系统科技有限公司 File transfer control method and system
CN107707927A (en) * 2017-09-25 2018-02-16 咪咕互动娱乐有限公司 A kind of live data method for pushing, device and storage medium
CN107995247A (en) * 2016-10-27 2018-05-04 腾讯科技(深圳)有限公司 A kind of document transmission method, server and system
WO2019128179A1 (en) * 2017-12-27 2019-07-04 北京安云世纪科技有限公司 Method and apparatus for data transmission between mobile terminals, and mobile terminal
CN109995701A (en) * 2017-12-29 2019-07-09 华为技术有限公司 A kind of method, terminal and the server of equipment guidance
CN110099414A (en) * 2019-04-18 2019-08-06 深圳壹账通智能科技有限公司 Network resource transmission method, apparatus, computer equipment and storage medium
CN110301143A (en) * 2016-12-30 2019-10-01 英特尔公司 Method and apparatus for radio communication
US20200076793A1 (en) * 2018-09-03 2020-03-05 Fuji Xerox Co., Ltd. Management device, management system, and non-transitory computer readable medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394396A (en) * 2007-09-19 2009-03-25 中兴通讯股份有限公司 Method for data reliable transmission and system thereof
CN101674298B (en) * 2008-09-11 2012-03-21 华为技术有限公司 Method, system and device for transmitting media contents in file mode
CN102404324A (en) * 2011-11-23 2012-04-04 郭正韦华 System for sensing safety of node data of Internet of things
US20140115029A1 (en) * 2012-10-18 2014-04-24 International Business Machines Corporation Selective data transfer between a server and client
CN105282153B (en) * 2015-09-30 2019-06-04 北京奇虎科技有限公司 A kind of method and terminal device for realizing data transmission
CN109617790B (en) * 2019-01-02 2021-11-30 北京北信源软件股份有限公司 Instant messaging method and instant messaging system supporting message transmission channel classification
CN111339580B (en) * 2020-03-03 2022-09-13 北京国保金泰信息安全技术有限公司 Method and system for unidirectional data import and unidirectional data export

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011069295A1 (en) * 2009-12-11 2011-06-16 Nokia Corporation Method, apparatus and computer program product for allocating resources in wireless communication network
WO2011088768A1 (en) * 2010-01-20 2011-07-28 腾讯科技(深圳)有限公司 Data transmission method and system, terminal thereof
CN106254507A (en) * 2016-08-29 2016-12-21 苏州蓝海彤翔系统科技有限公司 File transfer control method and system
CN107995247A (en) * 2016-10-27 2018-05-04 腾讯科技(深圳)有限公司 A kind of document transmission method, server and system
CN110301143A (en) * 2016-12-30 2019-10-01 英特尔公司 Method and apparatus for radio communication
CN107707927A (en) * 2017-09-25 2018-02-16 咪咕互动娱乐有限公司 A kind of live data method for pushing, device and storage medium
WO2019128179A1 (en) * 2017-12-27 2019-07-04 北京安云世纪科技有限公司 Method and apparatus for data transmission between mobile terminals, and mobile terminal
CN109995701A (en) * 2017-12-29 2019-07-09 华为技术有限公司 A kind of method, terminal and the server of equipment guidance
US20200076793A1 (en) * 2018-09-03 2020-03-05 Fuji Xerox Co., Ltd. Management device, management system, and non-transitory computer readable medium
CN110099414A (en) * 2019-04-18 2019-08-06 深圳壹账通智能科技有限公司 Network resource transmission method, apparatus, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YANGCHAN MOON ET AL: "An Enhanced File Transfer Mechanism Using an Additional Blocking Communication Channel and Thread for IoT Environments", 《MDPI》, 13 March 2019 (2019-03-13) *
李勋: "高速多通道数据传输系统的设计与实现", 《电信技术》, 31 December 2015 (2015-12-31) *

Also Published As

Publication number Publication date
CN111885037B (en) 2021-05-14
CN111885037A (en) 2020-11-03

Similar Documents

Publication Publication Date Title
US9924558B2 (en) Digital radio communication
CN107682859B (en) Message processing method and related equipment
CN1265609C (en) Confirmation method for safe mobile e-business platform digital certificate
KR102424142B1 (en) Method and apparatus for certificating information related payment in a mobile communication system
RU2008109827A (en) MOBILE STATION, RADIO ACCESS NETWORK DEVICE, MOBILE SWITCHING STATION, MOBILE COMMUNICATION SYSTEM AND METHOD OF GIVING ACCESS TO COMMUNICATION SERVICES
WO2020180529A1 (en) Systems, methods, and apparatuses for heterogeneous network data communication and synchronization
CN111683136B (en) Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system
CN111818483B (en) V2V vehicle networking communication system and method based on 5G
CN105491034A (en) Method for establishing connection with terminal and terminal authentication method and apparatus
CN110602055A (en) Long connection authentication method, device, server and storage medium
CN115038084A (en) Decentralized trusted access method for cellular base station
CN111885037B (en) Report sending system and method based on big data analysis
CN106912049B (en) Method for improving user authentication experience
CN104902474A (en) Method and device for establishing incidence relation between equipment without user interface and mobile terminal
CN112751929A (en) Method and system for communicating with remote PLC (programmable logic controller) equipment
CN109347885B (en) Authentication method of network authentication system
CN111147256A (en) Authentication method and device
CN113347740B (en) Sharing method, relay server and wireless access point
CN116614535B (en) Internet of things system of hybrid cloud architecture and implementation method
CN113207140B (en) Sharing method, terminal and wireless access point
CN116761167B (en) Data encryption transmission method, system, electronic equipment and storage medium
CN112714504B (en) End-to-end real-time data transmission method and system
JP4095974B2 (en) Authentication system, authentication method, and suitable node for use in the same
CN113225739A (en) Edge node communication detection method
CN115334511A (en) Method for establishing wireless communication security between edge node and terminal user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination