CN113067826A - Report sending system based on big data analysis - Google Patents
Report sending system based on big data analysis Download PDFInfo
- Publication number
- CN113067826A CN113067826A CN202110316018.2A CN202110316018A CN113067826A CN 113067826 A CN113067826 A CN 113067826A CN 202110316018 A CN202110316018 A CN 202110316018A CN 113067826 A CN113067826 A CN 113067826A
- Authority
- CN
- China
- Prior art keywords
- report
- receiving end
- transmission channel
- information
- sending
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007405 data analysis Methods 0.000 title claims abstract description 17
- 230000005540 biological transmission Effects 0.000 claims abstract description 203
- 238000012795 verification Methods 0.000 claims abstract description 21
- 238000000034 method Methods 0.000 claims abstract description 14
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Abstract
The invention discloses a report sending system and a method based on big data analysis, wherein the report sending system comprises an acquisition request information acquisition module and a transmission mode determination module, the acquisition request information acquisition module acquires acquisition request information when a first receiving end initiates a report to be acquired to the first sending end, the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel, the transmission mode determination module determines the transmission mode of the report to be acquired according to the content of the acquisition request information, and the transmission mode determination module comprises a transmission channel judgment module of the request information, an external characteristic identifier judgment module, a privacy level acquisition module, a privacy level comparison module, a second receiving end selection module, a verification transmission module and a request failure transmission module.
Description
Technical Field
The invention relates to the field of report transmission, in particular to a report sending system based on big data analysis.
Background
With the progress of network technology, online office becomes popular. The distance obstacle is overcome in the online office work, so that the remote office work becomes possible, the online office work can even move the office place to home, the staff is less to rush to work and get out of office, the office efficiency is improved, and the office place can be saved for the company. However, since the authenticity of the other party cannot be confirmed in the online office, the risk is high when the online office sends the transmission report.
Disclosure of Invention
The invention aims to provide a report sending system and method based on big data analysis, and aims to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a report sending system based on big data analysis comprises an acquisition request information acquisition module and a transmission mode determination module, wherein the acquisition request information acquisition module is used for acquiring acquisition request information when a first receiving end initiates a report to be acquired to a first sending end, the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel, and the transmission mode determination module determines the transmission mode of the report to be acquired according to the content of the acquisition request information.
Preferably, the transmission mode determining module comprises a transmission channel judging module for requesting information, an external characteristic identifier judging module, a privacy level obtaining module, a privacy level comparing module, a second receiving end selecting module, a verification transmission module and a request failure transmission module, wherein the transmission channel judging module for requesting information is used for judging whether the transmission channel for requesting information is an authentication transmission channel of a first sending end, and judging whether the history of transmitting reports to the first receiving end exists or not according to the external characteristic identifier in the information identifier when the transmission channel for requesting information is the authentication transmission channel of the first sending end and making the second receiving end selecting module work when the transmission channel for requesting information does not exist, if the report request transmission channel exists, a privacy level acquisition module is enabled to work, the privacy level acquisition module is used for acquiring the privacy level of a report request transmission channel used by a first sending end for transmitting a report to a first receiving end at the latest time, the privacy level of the report to be acquired and the privacy level of the report request transmission channel, the privacy level comparison module comprises a first level comparison module and a second level comparison module, the first level comparison module compares the relation between the privacy level of the report request transmission channel at the latest time and the privacy level of the report to be acquired, when the privacy level of the report request transmission channel at the latest time is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the report request transmission channel at the latest time, and when the privacy level of the report request transmission channel at the latest time is lower than the privacy level of the report to be acquired, comparing the relation between the privacy level of the report request transmission channel and the privacy level of the report to be acquired, and when the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired and the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, using the receiving end which has transmitted the report through the report request transmission channel by the first sending end most recently as the second receiving end, and when the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired or the history of transmitting the report to other receiving ends through the report request transmission channel by the first sending end does not exist, making the second receiving end selection module work, wherein the second receiving end selection module selects a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end to transmit to the first receiving end, the first receiving end selects an auxiliary receiving end as a second receiving end, the verification transmission module verifies the reliability of the first receiving end, the first sending end transmits the report to be transmitted to the first receiving end through the second receiving end under the condition of verifying the reliability, and the request failure transmission module transmits the information of request failure to the first receiving end through the transmission channel of the request information.
Preferably, the verification transmission module comprises an information transmission channel establishing module, an internal characteristic identification verification module, a temporary channel establishing module and a report division transmission module, wherein the information transmission channel establishing module is used for selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end, the internal characteristic identification verification module is used for verifying the information identification in the acquired request information by the second receiving end, verifying whether the internal characteristic identification in the information identification is true or not, and transmitting the information to enable the request failure transmission module to work when the internal characteristic identification verification module is verified to be false, the temporary channel establishing module establishes a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end when the internal characteristic identification verification module is verified to be true, and transmits the information to enable the report division transmission module to work, the report dividing and transmitting module divides the report to be acquired into n sub-reports, calculates the hash value of each sub-report, and transmits the sub-reports according to the sequence of the sub-reports in the report.
Preferably, the report dividing and transmitting module includes a sub-report transmitting module, a hash value calculating module and a sub-report transmitting judging module, the sub-report transmitting module is used for controlling the first sending end to transmit the ith sub-report to the second receiving end through the information transmission channel, and controlling the second receiving end to transmit the ith sub-report to the first receiving end through the first temporary channel, the hash value calculating module is used for calculating the hash value of the ith sub-report at the first sending end and the hash value of the ith sub-report received by the first receiving end respectively, the sub-report transmitting judging module compares whether the hash values of the ith sub-report at the first sending end and the ith receiving end are the same, and compares the relation between the time interval between the time node of the sub-report transmitted by the first sending end and the time node of the hash value received by the first sending end at the first receiving end and the time interval threshold value, and judging whether to continue transmitting the following sub-reports according to the comparison result.
A report transmission method based on big data analysis, the report transmission method comprising the steps of:
step S1: a first receiving end initiates acquisition request information of a report to be acquired to a first sending end, wherein the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel;
step S2: and determining the transmission mode of the report to be acquired according to the content of the acquisition request information.
Preferably, the step S1 further includes: the information identification is a characteristic identification distributed to the receiving end, when the receiving end initiates acquisition request information, the information identification is contained in the acquisition request information and is sent out, the information identification comprises an external characteristic identification and an internal characteristic identification, the external characteristic identification is used for identification and authentication between the sending end and the receiving end, and the internal characteristic identification is used for identification and authentication between different receiving ends.
Preferably, the step S2 further includes:
step S21: judging whether the transmission channel of the request information is an authentication transmission channel of the first sending end,
if the transmission channel of the request message is not the authentication transmission channel of the first transmitting end, the message of the request failure is transmitted to the first receiving end through the transmission channel of the request message,
if the transmission channel of the request message is the authentication transmission channel of the first sending end, go to step S22;
step S22: judging whether the first sending end has history of transmitting the report to the first receiving end according to the external characteristic mark in the information mark,
if not, go to step S24;
if the report exists, the privacy level of the report request transmission channel used by the first receiving end for transmitting the report to the first receiving end last time and the privacy level of the report to be acquired are acquired,
if the privacy level of the last report request transmission channel is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the last report request transmission channel;
if the privacy level of the last report request transmission channel is lower than the privacy level of the report to be acquired, go to step S23;
step S23: judging whether the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired,
if the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired, judging whether the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, if so, taking the receiving end which has requested the transmission channel to transmit the report through the report request transmission channel last time as the second receiving end, and turning to the step S25, otherwise, turning to the step S24;
if the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired, go to step S24;
step S24: selecting a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end, transmitting the three auxiliary receiving ends to the first receiving end through a transmission channel of the request information, and selecting one auxiliary receiving end from the first receiving end as the second receiving end by the first receiving end, and turning to the step S25;
step S25: and verifying the reliability of the first receiving terminal, and transmitting the report to be transmitted to the first receiving terminal by the first sending terminal through the second receiving terminal under the condition of verifying the reliability.
Preferably, the step S25 further includes:
step S251: selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end;
step S252: the first sending end forwards the acquisition request information to the second receiving end through the information transmission channel, the second receiving end verifies the information identifier in the acquisition request information and verifies whether the internal characteristic identifier in the information identifier is true or not,
if the verification is true, establishing a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end, dividing the report to be acquired into n sub-reports by the first sending end, calculating the hash value of each sub-report, and transmitting the sub-reports according to the sequence of the sub-reports in the report;
if the verification is false, the second receiving end returns to the first sending end through the information transmission channel, and the first sending end is enabled to send the information of the failure request to the first receiving end through the transmission channel of the request information.
Preferably, the step S251 further includes: and randomly selecting a report request transmission channel with the privacy level higher than or equal to the privacy level of the report to be acquired from the report request transmission channels for transmitting the report from the first sending end to the second receiving end as an information transmission channel between the first sending end and the second receiving end.
Preferably, the step S252 of transmitting the sub-reports in the report according to the sequence of the sub-reports further includes:
when the first sending end transmits the ith sub-report to the second receiving end through the information transmission channel, the second receiving end transmits the ith sub-report to the first receiving end through the first temporary channel, the ith sub-report returns to the first time node of the second receiving end through the information transmission channel and is transmitted to the first time node of the first receiving end, the first receiving end calculates the hash value of the sub-report when receiving the ith sub-report, and transmits the hash value to the first sending end through the second temporary channel, and sets the time when the first sending end receives the hash value from the second temporary channel as a second time node, if the hash value of the sub-report received by the first sender is identical to that calculated by the first sender, and the time interval between the second time node and the first time node is smaller than the time interval threshold, the first sending end continues to transmit the (i + 1) th sub-report, otherwise, the first sending end stops transmitting the report.
Compared with the prior art, the invention has the beneficial effects that: the invention determines the transmission mode of the report to be acquired according to the external characteristic mark and the internal characteristic mark in the information mark, whether the transmission channel of the request information is the authentication transmission channel of the first sending end, the privacy level of the report request transmission channel and the privacy level of the report to be acquired, thereby increasing the safety of the first sending end in the process of transmitting the report to the first receiving end.
Drawings
FIG. 1 is a block diagram of a big data analysis based report sending system according to the present invention;
fig. 2 is a flowchart illustrating a report sending method based on big data analysis according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, in an embodiment of the present invention, a report sending system and a method based on big data analysis include an acquisition request information obtaining module and a transmission mode determining module, where the acquisition request information obtaining module is configured to obtain acquisition request information when a first receiving end initiates a report to be acquired to a first sending end, the acquisition request information includes an information identifier, a transmission channel of the request information, and a report request transmission channel, and the transmission mode determining module determines a transmission mode of the report to be acquired according to content of the acquisition request information.
The transmission mode determining module comprises a transmission channel judging module of the request information, an external characteristic identification judging module, a privacy grade obtaining module, a privacy grade comparing module, a second receiving end selecting module, a verification transmission module and a request failure transmission module, wherein the transmission channel judging module of the request information is used for judging whether the transmission channel of the request information is an authentication transmission channel of a first sending end, and judging whether the history of transmitting reports to the first receiving end exists at the first sending end according to the external characteristic identification in the information identification under the condition that the transmission channel of the request information is the authentication transmission channel of the first sending end and making the second receiving end selecting module work under the condition that the transmission channel of the request information does not exist, if the report request transmission channel exists, a privacy level acquisition module is enabled to work, the privacy level acquisition module is used for acquiring the privacy level of a report request transmission channel used by a first sending end for transmitting a report to a first receiving end at the latest time, the privacy level of the report to be acquired and the privacy level of the report request transmission channel, the privacy level comparison module comprises a first level comparison module and a second level comparison module, the first level comparison module compares the relation between the privacy level of the report request transmission channel at the latest time and the privacy level of the report to be acquired, when the privacy level of the report request transmission channel at the latest time is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the report request transmission channel at the latest time, and when the privacy level of the report request transmission channel at the latest time is lower than the privacy level of the report to be acquired, comparing the relation between the privacy level of the report request transmission channel and the privacy level of the report to be acquired, and when the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired and the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, using the receiving end which has transmitted the report through the report request transmission channel by the first sending end most recently as the second receiving end, and when the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired or the history of transmitting the report to other receiving ends through the report request transmission channel by the first sending end does not exist, making the second receiving end selection module work, wherein the second receiving end selection module selects a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end to transmit to the first receiving end, the first receiving end selects an auxiliary receiving end as a second receiving end, the verification transmission module verifies the reliability of the first receiving end, the first sending end transmits the report to be transmitted to the first receiving end through the second receiving end under the condition of verifying the reliability, and the request failure transmission module transmits the information of request failure to the first receiving end through the transmission channel of the request information.
The verification transmission module comprises an information transmission channel establishing module, an internal characteristic identification verification module, a temporary channel establishing module and a report division transmission module, wherein the information transmission channel establishing module is used for selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end, the internal characteristic identification verification module is used for verifying and acquiring an information identification in request information by the second receiving end, verifying whether the internal characteristic identification in the information identification is true or not, transmitting the information when the verification is false and enabling the request failure transmission module to work, the temporary channel establishing module establishes a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end when the internal characteristic identification verification module is true and transmits the information to enable the report division transmission module to work, the report dividing and transmitting module divides the report to be acquired into n sub-reports, calculates the hash value of each sub-report, and transmits the sub-reports according to the sequence of the sub-reports in the report.
The report dividing and transmitting module comprises a sub-report transmitting module, a hash value calculating module and a sub-report transmitting judging module, wherein the sub-report transmitting module is used for controlling the first transmitting terminal to transmit the ith sub-report to the second receiving terminal through an information transmission channel and controlling the second receiving terminal to transmit the ith sub-report to the first receiving terminal through a first temporary channel and through the information transmission channel, the hash value calculating module is used for respectively calculating the hash value of the ith sub-report at the first transmitting terminal and the hash value of the ith sub-report received by the first receiving terminal, the sub-report transmitting judging module compares whether the hash values of the ith sub-report at the first transmitting terminal and the ith sub-report at the first receiving terminal are the same or not and compares the relation between the time interval between the time node of the sub-report transmitted by the first transmitting terminal and the time node of the hash value received by the first transmitting terminal and the time interval threshold value, and judging whether to continue transmitting the following sub-reports according to the comparison result.
A report transmission method based on big data analysis, the report transmission method comprising the steps of:
step S1: a first receiving end initiates acquisition request information of a report to be acquired to a first sending end, wherein the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel;
the information identification is a characteristic identification distributed to the receiving end, when the receiving end initiates acquisition request information, the information identification is contained in the acquisition request information and is sent out, the information identification comprises an external characteristic identification and an internal characteristic identification, the external characteristic identification is used for identification and authentication between the sending end and the receiving end, and the internal characteristic identification is used for identification and authentication between different receiving ends.
Step S2: determining the transmission mode of the report to be acquired according to the content of the acquisition request information:
step S21: judging whether the transmission channel of the request information is an authentication transmission channel of the first sending end,
if the transmission channel of the request message is not the authentication transmission channel of the first transmitting end, the message of the request failure is transmitted to the first receiving end through the transmission channel of the request message,
if the transmission channel of the request message is the authentication transmission channel of the first sending end, go to step S22; the authentication transmission channel is a transmission channel of authenticated request information preset by the first sending end;
step S22: judging whether the first sending end has history of transmitting the report to the first receiving end according to the external characteristic mark in the information mark,
if not, go to step S24;
if the report exists, the privacy level of the report request transmission channel used by the first receiving end for transmitting the report to the first receiving end last time and the privacy level of the report to be acquired are acquired,
if the privacy level of the last report request transmission channel is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the last report request transmission channel;
if the privacy level of the last report request transmission channel is lower than the privacy level of the report to be acquired, go to step S23;
step S23: judging whether the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired,
if the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired, judging whether the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, if so, taking the receiving end which has requested the transmission channel to transmit the report through the report request transmission channel last time as the second receiving end, and turning to the step S25, otherwise, turning to the step S24;
if the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired, go to step S24;
step S24: selecting a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end, transmitting the three auxiliary receiving ends to the first receiving end through a transmission channel of the request information, and selecting one auxiliary receiving end from the first receiving end as the second receiving end by the first receiving end, and turning to the step S25;
step S25: verifying the reliability of the first receiving terminal, and under the condition of verifying the reliability, the first sending terminal transmits the report to be transmitted to the first receiving terminal through the second receiving terminal:
the step S25 further includes:
step S251: randomly selecting a report request transmission channel with the privacy level higher than or equal to the privacy level of the report to be acquired from the report request transmission channels for transmitting the report from the first sending end to the second receiving end as an information transmission channel between the first sending end and the second receiving end;
step S252: the first sending end forwards the acquisition request information to the second receiving end through the information transmission channel, the second receiving end verifies the information identifier in the acquisition request information and verifies whether the internal characteristic identifier in the information identifier is true or not,
if the verification is true, establishing a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end, dividing the report to be acquired into n sub-reports by the first sending end, calculating the hash value of each sub-report, and transmitting the sub-reports according to the sequence of the sub-reports in the report;
if the verification is false, the second receiving end returns to the first sending end through the information transmission channel, and the first sending end is enabled to send the information of the failure request to the first receiving end through the transmission channel of the request information.
The step S252 of transmitting the sub-reports in the report according to the sequence of the sub-reports further includes:
when the first sending end transmits the ith sub report to the second receiving end through the information transmission channel, the second receiving end transmits the ith sub report to the first receiving end through the first temporary channel, the first receiving end returns the second receiving end through the information transmission channel to send the sub report to the first time node of the first receiving end, the first receiving end calculates the hash value of the sub report when receiving the ith sub report and transmits the hash value to the first sending end through the second temporary channel, the time when the first sending end receives the hash value from the second temporary channel is set as the second time node, if the hash value of the sub report received by the first sending end is consistent with that calculated by the first sending end and the time interval between the second time node and the first time node is smaller than the time interval threshold value, the first sending end continues to transmit the (i + 1) th sub report, otherwise, the first sending end stops to transmit the report, the value of i ranges from 1 to i-1.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (5)
1. A report sending system based on big data analysis is characterized in that: the report sending system comprises an acquisition request information acquisition module and a transmission mode determination module, wherein the acquisition request information acquisition module is used for acquiring acquisition request information when a first receiving end initiates a report to be acquired to a first sending end, the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel, and the transmission mode determination module determines the transmission mode of the report to be acquired according to the content of the acquisition request information;
the report sending method based on big data analysis comprises the following steps:
step S1: a first receiving end initiates acquisition request information of a report to be acquired to a first sending end, wherein the acquisition request information comprises an information identifier, a transmission channel of the request information and a report request transmission channel;
step S2: determining a transmission mode of a report to be acquired according to the content of the acquisition request information;
the step S1 further includes: the information identification is a characteristic identification distributed to the receiving end, when the receiving end initiates acquisition request information, the information identification is contained in the acquisition request information and is sent out, the information identification comprises an external characteristic identification and an internal characteristic identification, the external characteristic identification is used for identification and authentication between the sending end and the receiving end, and the internal characteristic identification is used for identification and authentication between different receiving ends.
2. The big data analysis-based report sending method according to claim 1, wherein: the step S2 further includes:
step S21: judging whether the transmission channel of the request information is an authentication transmission channel of the first sending end,
if the transmission channel of the request message is not the authentication transmission channel of the first transmitting end, the message of the request failure is transmitted to the first receiving end through the transmission channel of the request message,
if the transmission channel of the request message is the authentication transmission channel of the first sending end, go to step S22;
step S22: judging whether the first sending end has history of transmitting the report to the first receiving end according to the external characteristic mark in the information mark,
if not, go to step S24;
if the report exists, the privacy level of the report request transmission channel used by the first receiving end for transmitting the report to the first receiving end last time and the privacy level of the report to be acquired are acquired,
if the privacy level of the last report request transmission channel is higher than or equal to the privacy level of the report to be acquired, the first sending end directly transmits the report to be acquired to the first receiving end through the last report request transmission channel;
if the privacy level of the last report request transmission channel is lower than the privacy level of the report to be acquired, go to step S23;
step S23: judging whether the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired,
if the privacy level of the report request transmission channel is higher than or equal to the privacy level of the report to be acquired, judging whether the first sending end has the history of transmitting the report to other receiving ends through the report request transmission channel, if so, taking the receiving end which has requested the transmission channel to transmit the report through the report request transmission channel last time as the second receiving end, and turning to the step S25, otherwise, turning to the step S24;
if the privacy level of the report request transmission channel is lower than the privacy level of the report to be acquired, go to step S24;
step S24: selecting a first auxiliary receiving end, a second auxiliary receiving end and a third auxiliary receiving end from the receiving ends of the history transmission report of the first sending end, transmitting the three auxiliary receiving ends to the first receiving end through a transmission channel of the request information, and selecting one auxiliary receiving end from the first receiving end as the second receiving end by the first receiving end, and turning to the step S25;
step S25: and verifying the reliability of the first receiving terminal, and transmitting the report to be transmitted to the first receiving terminal by the first sending terminal through the second receiving terminal under the condition of verifying the reliability.
3. The big data analysis-based report sending method according to claim 2, wherein: the step S25 further includes:
step S251: selecting a report request transmission channel as an information transmission channel between a first sending end and a second receiving end;
step S252: the first sending end forwards the acquisition request information to the second receiving end through the information transmission channel, the second receiving end verifies the information identifier in the acquisition request information and verifies whether the internal characteristic identifier in the information identifier is true or not,
if the verification is true, establishing a first temporary channel between the first receiving end and the second receiving end and a second temporary channel between the first receiving end and the first sending end, dividing the report to be acquired into n sub-reports by the first sending end, calculating the hash value of each sub-report, and transmitting the sub-reports according to the sequence of the sub-reports in the report;
if the verification is false, the second receiving end returns to the first sending end through the information transmission channel, and the first sending end is enabled to send the information of the failure request to the first receiving end through the transmission channel of the request information.
4. The big data analysis-based report sending method according to claim 3, wherein: the step S251 further includes: and randomly selecting a report request transmission channel with the privacy level higher than or equal to the privacy level of the report to be acquired from the report request transmission channels for transmitting the report from the first sending end to the second receiving end as an information transmission channel between the first sending end and the second receiving end.
5. The big data analysis-based report sending method according to claim 4, wherein: the step S252 of transmitting the sub-reports in the report according to the sequence of the sub-reports further includes:
when the first sending end transmits the ith sub-report to the second receiving end through the information transmission channel, the second receiving end transmits the ith sub-report to the first receiving end through the first temporary channel, the ith sub-report returns to the first time node of the second receiving end through the information transmission channel and is transmitted to the first time node of the first receiving end, the first receiving end calculates the hash value of the sub-report when receiving the ith sub-report, and transmits the hash value to the first sending end through the second temporary channel, and sets the time when the first sending end receives the hash value from the second temporary channel as a second time node, if the hash value of the sub-report received by the first sender is identical to that calculated by the first sender, and the time interval between the second time node and the first time node is smaller than the time interval threshold, the first sending end continues to transmit the (i + 1) th sub-report, otherwise, the first sending end stops transmitting the report.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110316018.2A CN113067826A (en) | 2020-07-16 | 2020-07-16 | Report sending system based on big data analysis |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010686300.5A CN111885037B (en) | 2020-07-16 | 2020-07-16 | Report sending system and method based on big data analysis |
CN202110316018.2A CN113067826A (en) | 2020-07-16 | 2020-07-16 | Report sending system based on big data analysis |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010686300.5A Division CN111885037B (en) | 2020-07-16 | 2020-07-16 | Report sending system and method based on big data analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113067826A true CN113067826A (en) | 2021-07-02 |
Family
ID=73156123
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110316018.2A Pending CN113067826A (en) | 2020-07-16 | 2020-07-16 | Report sending system based on big data analysis |
CN202010686300.5A Active CN111885037B (en) | 2020-07-16 | 2020-07-16 | Report sending system and method based on big data analysis |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010686300.5A Active CN111885037B (en) | 2020-07-16 | 2020-07-16 | Report sending system and method based on big data analysis |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN113067826A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011069295A1 (en) * | 2009-12-11 | 2011-06-16 | Nokia Corporation | Method, apparatus and computer program product for allocating resources in wireless communication network |
WO2011088768A1 (en) * | 2010-01-20 | 2011-07-28 | 腾讯科技(深圳)有限公司 | Data transmission method and system, terminal thereof |
CN106254507A (en) * | 2016-08-29 | 2016-12-21 | 苏州蓝海彤翔系统科技有限公司 | File transfer control method and system |
CN107707927A (en) * | 2017-09-25 | 2018-02-16 | 咪咕互动娱乐有限公司 | A kind of live data method for pushing, device and storage medium |
CN107995247A (en) * | 2016-10-27 | 2018-05-04 | 腾讯科技(深圳)有限公司 | A kind of document transmission method, server and system |
WO2019128179A1 (en) * | 2017-12-27 | 2019-07-04 | 北京安云世纪科技有限公司 | Method and apparatus for data transmission between mobile terminals, and mobile terminal |
CN109995701A (en) * | 2017-12-29 | 2019-07-09 | 华为技术有限公司 | A kind of method, terminal and the server of equipment guidance |
CN110099414A (en) * | 2019-04-18 | 2019-08-06 | 深圳壹账通智能科技有限公司 | Network resource transmission method, apparatus, computer equipment and storage medium |
CN110301143A (en) * | 2016-12-30 | 2019-10-01 | 英特尔公司 | Method and apparatus for radio communication |
US20200076793A1 (en) * | 2018-09-03 | 2020-03-05 | Fuji Xerox Co., Ltd. | Management device, management system, and non-transitory computer readable medium |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101394396A (en) * | 2007-09-19 | 2009-03-25 | 中兴通讯股份有限公司 | Method for data reliable transmission and system thereof |
CN101674298B (en) * | 2008-09-11 | 2012-03-21 | 华为技术有限公司 | Method, system and device for transmitting media contents in file mode |
CN102404324A (en) * | 2011-11-23 | 2012-04-04 | 郭正韦华 | System for sensing safety of node data of Internet of things |
US20140115029A1 (en) * | 2012-10-18 | 2014-04-24 | International Business Machines Corporation | Selective data transfer between a server and client |
CN105282153B (en) * | 2015-09-30 | 2019-06-04 | 北京奇虎科技有限公司 | A kind of method and terminal device for realizing data transmission |
CN109617790B (en) * | 2019-01-02 | 2021-11-30 | 北京北信源软件股份有限公司 | Instant messaging method and instant messaging system supporting message transmission channel classification |
CN111339580B (en) * | 2020-03-03 | 2022-09-13 | 北京国保金泰信息安全技术有限公司 | Method and system for unidirectional data import and unidirectional data export |
-
2020
- 2020-07-16 CN CN202110316018.2A patent/CN113067826A/en active Pending
- 2020-07-16 CN CN202010686300.5A patent/CN111885037B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011069295A1 (en) * | 2009-12-11 | 2011-06-16 | Nokia Corporation | Method, apparatus and computer program product for allocating resources in wireless communication network |
WO2011088768A1 (en) * | 2010-01-20 | 2011-07-28 | 腾讯科技(深圳)有限公司 | Data transmission method and system, terminal thereof |
CN106254507A (en) * | 2016-08-29 | 2016-12-21 | 苏州蓝海彤翔系统科技有限公司 | File transfer control method and system |
CN107995247A (en) * | 2016-10-27 | 2018-05-04 | 腾讯科技(深圳)有限公司 | A kind of document transmission method, server and system |
CN110301143A (en) * | 2016-12-30 | 2019-10-01 | 英特尔公司 | Method and apparatus for radio communication |
CN107707927A (en) * | 2017-09-25 | 2018-02-16 | 咪咕互动娱乐有限公司 | A kind of live data method for pushing, device and storage medium |
WO2019128179A1 (en) * | 2017-12-27 | 2019-07-04 | 北京安云世纪科技有限公司 | Method and apparatus for data transmission between mobile terminals, and mobile terminal |
CN109995701A (en) * | 2017-12-29 | 2019-07-09 | 华为技术有限公司 | A kind of method, terminal and the server of equipment guidance |
US20200076793A1 (en) * | 2018-09-03 | 2020-03-05 | Fuji Xerox Co., Ltd. | Management device, management system, and non-transitory computer readable medium |
CN110099414A (en) * | 2019-04-18 | 2019-08-06 | 深圳壹账通智能科技有限公司 | Network resource transmission method, apparatus, computer equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
YANGCHAN MOON ET AL: "An Enhanced File Transfer Mechanism Using an Additional Blocking Communication Channel and Thread for IoT Environments", 《MDPI》, 13 March 2019 (2019-03-13) * |
李勋: "高速多通道数据传输系统的设计与实现", 《电信技术》, 31 December 2015 (2015-12-31) * |
Also Published As
Publication number | Publication date |
---|---|
CN111885037B (en) | 2021-05-14 |
CN111885037A (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9924558B2 (en) | Digital radio communication | |
CN107682859B (en) | Message processing method and related equipment | |
CN1265609C (en) | Confirmation method for safe mobile e-business platform digital certificate | |
KR102424142B1 (en) | Method and apparatus for certificating information related payment in a mobile communication system | |
RU2008109827A (en) | MOBILE STATION, RADIO ACCESS NETWORK DEVICE, MOBILE SWITCHING STATION, MOBILE COMMUNICATION SYSTEM AND METHOD OF GIVING ACCESS TO COMMUNICATION SERVICES | |
WO2020180529A1 (en) | Systems, methods, and apparatuses for heterogeneous network data communication and synchronization | |
CN111683136B (en) | Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system | |
CN111818483B (en) | V2V vehicle networking communication system and method based on 5G | |
CN105491034A (en) | Method for establishing connection with terminal and terminal authentication method and apparatus | |
CN110602055A (en) | Long connection authentication method, device, server and storage medium | |
CN115038084A (en) | Decentralized trusted access method for cellular base station | |
CN111885037B (en) | Report sending system and method based on big data analysis | |
CN106912049B (en) | Method for improving user authentication experience | |
CN104902474A (en) | Method and device for establishing incidence relation between equipment without user interface and mobile terminal | |
CN112751929A (en) | Method and system for communicating with remote PLC (programmable logic controller) equipment | |
CN109347885B (en) | Authentication method of network authentication system | |
CN111147256A (en) | Authentication method and device | |
CN113347740B (en) | Sharing method, relay server and wireless access point | |
CN116614535B (en) | Internet of things system of hybrid cloud architecture and implementation method | |
CN113207140B (en) | Sharing method, terminal and wireless access point | |
CN116761167B (en) | Data encryption transmission method, system, electronic equipment and storage medium | |
CN112714504B (en) | End-to-end real-time data transmission method and system | |
JP4095974B2 (en) | Authentication system, authentication method, and suitable node for use in the same | |
CN113225739A (en) | Edge node communication detection method | |
CN115334511A (en) | Method for establishing wireless communication security between edge node and terminal user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |