CN114285839B - File transmission method and device, computer storage medium and electronic equipment - Google Patents
File transmission method and device, computer storage medium and electronic equipment Download PDFInfo
- Publication number
- CN114285839B CN114285839B CN202111591846.3A CN202111591846A CN114285839B CN 114285839 B CN114285839 B CN 114285839B CN 202111591846 A CN202111591846 A CN 202111591846A CN 114285839 B CN114285839 B CN 114285839B
- Authority
- CN
- China
- Prior art keywords
- file
- data
- target
- transmission server
- target file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 104
- 238000000034 method Methods 0.000 title claims abstract description 80
- 238000012546 transfer Methods 0.000 claims abstract description 146
- 230000001360 synchronised effect Effects 0.000 claims description 62
- 238000001914 filtration Methods 0.000 claims description 11
- 238000004891 communication Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 230000002829 reductive effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the application provides a file transmission method, a file transmission device, a computer storage medium and electronic equipment, wherein the file transmission method comprises the following steps: acquiring access data for accessing a target file transfer server; acquiring a target file operator corresponding to the type of the target file transmission server according to the access data; converting the format of the access data into format data corresponding to the target file transmission server through the target file operator; and sending the format data to the target file transmission server. By means of the technical scheme, the method and the device can solve the problem that operation is complex in the prior art.
Description
Technical Field
The present application relates to the field of network security technologies, and in particular, to a file transmission method, a file transmission device, a computer storage medium, and an electronic device.
Background
Along with the continuous development of technology, the functions of the computer are also continuously perfected, and the computer becomes one of the common tools in daily life and work of people. Among them, file transfer is also an indispensable application.
Currently, commonly used file transfer software (e.g., winSCP or MobaXterm) can only support access to a certain server.
In the process of implementing the present application, the inventor finds that the following problems exist in the prior art: the existing file transmission method has the problem of complex operation. For example, when a user wants to access a first file transfer server, the user needs to log in the first file transfer software to realize the first file transfer server, and when the user subsequently wants to access a second file transfer server, the user needs to switch to the second file transfer software to realize the second file transfer server, so when the user needs to access a different file transfer server, the user needs to frequently and differently file transfer software, and therefore, the operation is complex.
Disclosure of Invention
The embodiment of the application aims to provide a file transmission method, a file transmission device, a computer storage medium and electronic equipment, so as to realize detection of redundancy strategies and conflict strategies.
In a first aspect, an embodiment of the present application provides a file transmission method, where the file transmission method includes: acquiring access data for accessing a target file transfer server; acquiring a target file operator corresponding to the type of the target file transmission server according to the access data; converting the format of the access data into format data corresponding to the target file transmission server through the target file operator; and sending the format data to the target file transmission server.
Therefore, when different file transmission servers need to be logged in, the data format can be converted through the target file operator corresponding to the type of the corresponding file transmission server, so that compared with the existing file transmission method, the file transmission method does not need to frequently switch file transmission software, and further the problem that operation is complex in the prior art is solved.
In one possible embodiment, after sending the format data to the target file transfer server, the file transfer method further includes: receiving file directory information sent by a target file transmission server; determining a target display area for displaying file directory information; and displaying the file directory information in the target display area.
In one possible embodiment, the file transfer method further includes: responding to the synchronous operation of the user on the file directory information, and acquiring a synchronous instruction; and sending a synchronization instruction to the target file transmission server so that the target file transmission server can search file data to be synchronized according to the synchronization instruction.
In one possible embodiment, the file transfer method further includes: receiving file data to be synchronized returned by a target file transmission server; the file data to be synchronized is data synchronized from the target file transmission server to the designated file transmission server; matching file data to be synchronized with a preset security filtering rule; and if the matching result is determined to be the matching failure, sending the file data to be synchronized to the designated file transmission server.
In one possible embodiment, the file transfer method further includes: if the matching result is determined to be successful, determining that the file data to be synchronized contains sensitive data.
In one possible embodiment, the file transfer method further includes: receiving file data to be synchronized sent by a designated file transmission server; the file data to be synchronized is data synchronized from a designated file transmission server to a target file transmission server; matching file data to be synchronized with a preset security filtering rule; and if the matching result is determined to be the matching failure, sending the file data to be synchronized to the target file transmission server.
In one possible embodiment, the file transfer method further includes: if the matching result is determined to be successful, determining that the file data to be synchronized contains sensitive data.
In a second aspect, an embodiment of the present application provides a file transfer device, including: the first acquisition module is used for acquiring access data for accessing the target file transmission server; the second acquisition module is used for acquiring a target file operator corresponding to the type of the target file transmission server according to the access data; the conversion module is used for converting the format of the access data into format data corresponding to the target file transmission server through the target file operator; and the first sending module is used for sending the format data to the target file transmission server.
In a third aspect, embodiments of the present application provide a computer storage medium having stored thereon a computer program which, when executed by a processor, performs the method of the first aspect or any of the alternative implementations of the first aspect.
In a fourth aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the method of the first aspect or any alternative implementation of the first aspect.
In a fifth aspect, the application provides a computer program product which, when run on a computer, causes the computer to perform the method of the first aspect or any of the possible implementations of the first aspect.
In order to make the above objects, features and advantages of the embodiments of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a schematic diagram of an application scenario provided by an embodiment of the present application;
fig. 2 is a schematic diagram of a file transfer method according to an embodiment of the present application;
FIG. 3 is a schematic diagram showing file directory information according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a file synchronization method according to an embodiment of the present application;
FIG. 5 shows a flow chart of file synchronization provided by an embodiment of the present application;
fig. 6 is a block diagram illustrating a file transfer device according to an embodiment of the present application;
fig. 7 shows a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
At present, the conventional file transmission method has the problem of difficult management in addition to the problem of complicated operation. For example, the existing file transfer method has a problem that it is difficult to manage because the uploading and downloading only support the local server and the partial operation of the file transfer requires the user to know a certain knowledge or even command to manage.
Based on this, the embodiment of the application skillfully proposes a file transmission scheme, by acquiring access data for accessing a target file transmission server, then acquiring a target file operator corresponding to the type of the target file transmission server according to the access data, finally converting the format of the access data into format data corresponding to the target file transmission server through the target file operator, and finally sending the format data to the target file transmission server.
Therefore, when different file transmission servers need to be logged in, the data format can be converted through the target file operator corresponding to the type of the corresponding file transmission server, so that compared with the existing file transmission method, the file transmission method does not need to frequently switch file transmission software, and further the problem that operation is complex in the prior art is solved.
Referring to fig. 1, fig. 1 shows a schematic diagram of an application scenario provided by an embodiment of the present application. The application scene comprises a client, a target file transmission server and a designated file transmission server. The client communicates with the target file transmission server and the designated file transmission server respectively.
It should be understood that the specific device of the client, the specific device of the target file transfer server, the specific device of the designated file transfer server, and the like may all be set according to actual requirements, and the embodiment of the present application is not limited thereto.
For example, the client may be a mobile phone, a computer, or the like.
For another example, the target file transfer server may be a single server, a cluster of servers, or the like.
Specifically, the client may acquire access data for accessing the target file transfer server, then the client may acquire a target file operator corresponding to the type of the target file transfer server according to the access data, then the client may convert the format of the access data into format data corresponding to the target file transfer server through the target file operator, and finally the client may transmit the format data to the target file transfer server, thereby enabling access to the target file transfer server.
It should be understood that, although the above description is given by taking the access of the client to the target file transfer server as an example, it should be understood by those skilled in the art that the above method may also be used to implement access to other file transfer servers, and embodiments of the present application are not limited thereto.
For example, the client may access the designated file transfer server through the above process, and specific reference may be made to the related description of the above process, which is not repeated herein.
It should also be understood that, as those skilled in the art will understand, the application scenario may be set according to actual requirements, and the embodiments of the present application are not limited thereto.
For example, while only two file transfer servers are shown in FIG. 1, those skilled in the art will appreciate that the application scenario may also include more or fewer file transfer servers.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating a file transfer method according to an embodiment of the present application. The file transfer method as shown in fig. 2 includes:
in step S210, the client acquires access data for accessing the target file transfer server. The target file transfer server may be any one of a plurality of file transfer servers (or all file transfer servers). And, the access data may refer to an access request or the like.
It should be understood that the specific type of each file transfer server in the plurality of file transfer servers may be set according to actual requirements, and embodiments of the present application are not limited thereto.
For example, the various file transfer servers may include file transfer protocol (File Transfer Protocol, FTP) servers, network file system (Network File System, NFS) servers, and server information block (Server Message Block, SMB) servers.
It should also be understood that accessing data carried by data may also be configured according to actual needs, and embodiments of the present application are not limited thereto.
For example, the access data may carry identity authentication information, and may also carry information of the target file transfer server. The identity authentication information may include account passwords, authority information and the like for verification, and the information of the target file transfer server may include an address, a type and the like of the target file transfer server.
In step S220, the client obtains the target file operator corresponding to the type of the target file transfer server according to the access data. Wherein the target file operator is operable to convert the format of data sent by the client to the target file transfer server into format data corresponding to the type of the target file transfer server.
Specifically, the client may determine whether the connection between the client and the target file transfer server is available (or detect the availability of the connection between the client and the target file transfer server) according to the information of the target file transfer server in the access data. If it is determined that a connection is available, the client may acquire a target file operator corresponding to the type of target file transfer server.
It should be understood that, the specific process of determining whether the connection between the client and the target file transfer server is available according to the information of the target file transfer server in the access data may be set according to actual requirements, and the embodiment of the present application is not limited thereto.
For example, the client may perform identity authentication by accessing the identity authentication information in the data, and if the identity authentication is passed, the page of the client may prompt that the connection with the file transfer server is successful, and may add the file transfer server that is successfully connected to the connectable file transfer server list. Thus, the client can determine whether its corresponding connection is available by accessing the authentication information in the data.
In addition, since the file transfer servers are access controlled through separate connection, in order to ensure the smoothness and high efficiency of operation, the client can internally maintain the connection pool of each file transfer server, so that the client can keep connection with the file transfer servers during use, the connection utilization rate is greatly improved, and the memory throughput overhead is reduced.
It should also be understood that the specific process of the client obtaining the target file manipulator corresponding to the type of the target file transfer server may be set according to actual requirements, and the embodiment of the present application is not limited thereto.
For example, in the case where the access data is the first access data to the target file transfer server, at this time, there may be no target file operator corresponding to the type of the target file transfer server in the client, so the client may generate the target file operator. For example, in the case where the access data is the first access data to the FTP server, the client may generate a target file operator, and the target file operator may convert the format of the access data to FTP protocol format data; in the case where the access data is non-first access data to the target file transfer server, then the target file manipulator may be present in the client, so the client may find the target file manipulator from its locally stored at least one file manipulator.
In step S230, the client converts the format of the access data into format data corresponding to the target file transfer server through the target file operator.
That is, the client can realize the conversion of the format of the access data through the corresponding file manipulator, so that the client can realize the access to different file manipulators through the corresponding file manipulator after logging in the current file transfer software, and the user plane is unaware, thereby improving the convenience of operation.
In step S240, the client transmits the format data to the target file transfer server. Correspondingly, the target file transmission server receives the format data sent by the client.
In step S250, the target file transfer server may obtain file directory information of the target file transfer server according to the format data. Wherein the format data is format data for accessing the target file transfer server.
It should be understood that the file directory information may be information of a root directory of the target file transfer server, or may be other file directory information, which is not limited in this embodiment of the present application.
In step S260, the target file transfer server transmits file directory information to the client. Correspondingly, the client may receive the file directory information sent by the target file transfer server.
In step S270, the client determines a target display area for displaying the file directory information, and displays the file directory information in the target display area.
Specifically, after the client receives the file directory information transmitted from the target file transfer server, the client may determine a target display area among areas where all the file directory information is displayed. The target display area may be all or part of the display area of the client. And, after displaying the file directory information, the user may implement a related operation (e.g., user operation, etc.) on the file directory information through an operation such as clicking.
It should be noted that, since the client may log in a plurality of file transfer servers at the same time, the display interface of the client may simultaneously display file directory information of each of the plurality of file transfer servers currently logged in.
For example, referring to fig. 3, fig. 3 is a schematic diagram illustrating displaying file directory information according to an embodiment of the present application. As shown in fig. 3, the display interface of the client may simultaneously display file directory information of two file transfer servers, and an upper portion of each display area displaying the file directory information may display a current path position (e.g., a C-disc) of the corresponding file transfer server, and a lower portion thereof may display the file directory information under the current path. And, the user can enter a certain folder or return to an upper folder through button or double click, and can preview, delete, newly establish a file and the like through operations such as right key and the like.
It should be noted that, the conventional manager can only perform operations such as viewing after downloading to the local area, and the embodiments of the present application can present file previews through technologies such as a multisystem access platform (Point Of Interface, POI). Moreover, all the above mentioned operations, the commands involved are encapsulated as a unified file operator interface, and the third party dependencies provided by each file transfer server vendor are laid down as a bottom layer design under the operation interface.
It should also be appreciated that although fig. 3 is described using two file transfer servers as an example, it may be modified to include directory information local to the client and file directory information of one of the file transfer servers on the other side, and embodiments of the present application are not limited thereto.
Therefore, through the technical scheme, the embodiment of the application can realize that a plurality of file transmission servers are logged in for operation at the same time, and file transmission software does not need to be frequently switched, so that the operation of a user can be greatly reduced.
It should be noted that, in addition to logging in a plurality of file transmission servers at the same time, the embodiment of the present application may realize data synchronization between at least two file transmission servers without perception of a user.
In order to facilitate understanding of the embodiments of the present application, the following description will be given by taking, as an example, synchronizing data from a target file transfer server to a specified file transfer server.
It should be understood that, although the following description is given taking the example that the target file transfer server synchronizes data with the designated file transfer server, those skilled in the art should understand that it is also possible to synchronize data from the designated file transfer server to the target file transfer server, and the specific process is similar to that of fig. 4, and detailed description thereof will not be repeated, specifically referring to the related description of fig. 4.
It should be noted that, for any two file transfer servers, the file transfer may be performed by operating two display areas (for example, display pages on the left and right sides as shown in fig. 3). However, in some special scenarios, only the client may have access to two different file transfer servers, and one of the two file transfer servers may not have access to the other file transfer server, and the other file transfer server may not have access to one of the file transfer servers, i.e. the client may not only perform unified file management, but also file transfer. And the client can record relevant information of each synchronization, such as time, source and destination site information, a transmission file path, a landing file path and the like, so that subsequent arrangement and review are facilitated.
Specifically, referring to fig. 4, fig. 4 is a schematic diagram illustrating a file synchronization method according to an embodiment of the present application. The file synchronization method as shown in fig. 4 includes:
in step S410, the client obtains a synchronization instruction in response to the user' S synchronization operation on the file directory information.
In step S420, the client sends a synchronization instruction to the target file transfer server. Correspondingly, the target file transmission server receives the synchronous instruction sent by the client.
It should be appreciated that the client may send synchronization instructions to the designated file transfer server in addition to the synchronization instructions to the target file transfer server.
Optionally, after the user performs the synchronization operation on the file directory information of the target file transfer server, the background of the client may acquire a first path of the source file data to be synchronized in the target file transfer server, and may further acquire a second path of the target file in the designated file transfer server, where the source file data is stored, and then may splice the first path and the second path to obtain a synchronization specific path in the designated file transfer server.
For example, in the case where the first path is a source file in a first file in the first disk and the second path is a third file in the third disk, after the first path and the second path are spliced, it may be determined that the specific path is in a target file established in a third folder in the third disk. Wherein the name of the target file and the name of the source file may be the same.
The client then sends a synchronization instruction to the designated file transfer server to inform the designated file server of the synchronization specific path.
In step S430, the target file transfer server searches for the file data to be synchronized according to the synchronization instruction.
Specifically, the synchronization instruction may carry the first path, so the target file transmission server may search the file data to be synchronized according to the first path.
In step S440, the target file transfer server sends the file data to be synchronized to the client. Correspondingly, the client receives file data to be synchronized of the target file transfer server.
It should be appreciated that the specific process of the destination file transfer server sending the file data to be synchronized to the client may be described in the description of step 450.
Step S450, the client monitors the security of the file data to be synchronized.
Specifically, referring to fig. 5, fig. 5 shows a flowchart of file synchronization according to an embodiment of the present application. As shown in fig. 5, the client may acquire the first path and the second path respectively, and the client may attempt to acquire an input stream (which may be regarded as part of the data of the file to be synchronized) using the target file operator corresponding to the target file transfer server, and if the input stream is successfully acquired, may cyclically write the input stream into the buffer, and if the input stream is not acquired, the client may acquire and output a failure reason for not acquiring the input stream.
And the client can also attempt to acquire the output stream by designating a file operator corresponding to the file transmission server, if the output stream is successfully acquired, the data which is subjected to security monitoring in the buffer can be circularly written into the target file by using the output stream, and if the output stream is not acquired, the client can acquire and output a failure reason for not acquiring the output stream.
And the client can match the acquired input stream with a preset safety filtering rule, if the matching result is determined to be failed in matching, the input stream is determined to be the data after passing safety monitoring, and if the matching result is determined to be successful in matching, the input stream is determined to contain sensitive data.
It should also be understood that the specific rules of the preset security filtering rules may be set according to actual requirements, and embodiments of the present application are not limited thereto.
For example, the preset security filtering rule may be a hit rule of a sensitive file format (for example, exe file format, dll file format, sh file format, or the like), so that if it is determined that the input stream is an input stream related to the sensitive file format, it is determined that it contains sensitive data. The specific format of the sensitive file format may be set according to actual requirements, and the embodiment of the application is not limited thereto.
For another example, the preset security filtering rule may be a hit rule that includes a sensitive word, so that if it is determined that the input stream includes a preset sensitive word, it is determined that it includes sensitive data. The specific sensitive period of the preset sensitive word can be set according to actual requirements, and the embodiment of the application is not limited to this.
In step S460, the client sends the file data to be synchronized through the security monitoring to the designated file transfer server. Correspondingly, the designated file transmission server receives file data to be synchronized, which is sent by the client and passes the security monitoring.
Therefore, through the technical scheme, the embodiment of the application not only can realize the data synchronization between the two file transmission servers, but also can reduce the user operation and further improve the user experience because the user is unaware in the data synchronization process.
It should be understood that the above file transfer method is only exemplary, and those skilled in the art can make various modifications, modifications or modifications according to the above method, and the contents thereof are also within the scope of the present application.
Referring to fig. 6, fig. 6 is a block diagram illustrating a file transfer device 600 according to an embodiment of the present application. It should be understood that the file transfer device 600 corresponds to the above method embodiments, and is capable of executing the steps related to the above method embodiments, and specific functions of the file transfer device 600 may be referred to the above description, and detailed descriptions thereof are omitted herein as appropriate to avoid redundancy. The file transfer device 600 includes at least one software functional module that can be stored in a memory in the form of software or firmware (firmware) or cured in an Operating System (OS) of the file transfer device 600. Specifically, the file transfer device 600 includes:
a first obtaining module 610, configured to obtain access data for accessing the target file transfer server;
a second obtaining module 620, configured to obtain, according to the access data, a target file operator corresponding to the type of the target file transfer server;
a conversion module 630, configured to convert, by the target file operator, the format of the access data into format data corresponding to the target file transfer server;
a first sending module 640, configured to send the format data to the target file transfer server.
In one possible embodiment, the file transfer device 600 further includes: a first receiving module (not shown) for receiving file directory information transmitted from the target file transfer server after transmitting the format data to the target file transfer server; a first determining module (not shown) for determining a target display area for displaying file directory information; and a display module (not shown) for displaying the file directory information in the target display area.
In one possible embodiment, the file transfer device 600 further includes: a third obtaining module (not shown) for obtaining a synchronization instruction in response to a user's synchronization operation of the file directory information; and the second sending module (not shown) is used for sending a synchronization instruction to the target file transmission server so that the target file transmission server can search file data to be synchronized according to the synchronization instruction.
In one possible embodiment, the file transfer device 600 further includes: the second receiving module is used for receiving file data to be synchronized returned by the target file transmission server; the file data to be synchronized is data synchronized from the target file transmission server to the designated file transmission server; a first matching module (not shown) for matching the file data to be synchronized with a preset security filtering rule; and a third sending module (not shown) configured to send the file data to be synchronized to the designated file transfer server if it is determined that the matching result is a matching failure.
In one possible embodiment, the file transfer device 600 further includes: and the second determining module (not shown) is used for determining that the file data to be synchronized contains sensitive data if the matching result is determined to be successful.
In one possible embodiment, the file transfer device 600 further includes: a third receiving module (not shown) for receiving the file data to be synchronized sent by the designated file transfer server; the file data to be synchronized is data synchronized from a designated file transmission server to a target file transmission server; a second matching module (not shown) for matching the file data to be synchronized with a preset security filtering rule; and a fourth sending module (not shown) configured to send the file data to be synchronized to the target file transfer server if it is determined that the matching result is a matching failure.
In one possible embodiment, the file transfer device 600 further includes: and a third determining module (not shown) configured to determine that the file data to be synchronized contains sensitive data if it is determined that the matching result is successful.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding procedure in the foregoing method for the specific working procedure of the apparatus described above, and this will not be repeated here.
Referring to fig. 7, fig. 7 shows a block diagram of an electronic device 700 according to an embodiment of the application. The electronic device 700 may include a processor 710, a communication interface 720, a memory 730, and at least one communication bus 740. Wherein the communication bus 740 is used to enable direct connection communications for these components. The communication interface 720 in the embodiment of the present application is used for performing signaling or data communication with other devices. Processor 710 may be an integrated circuit chip with signal processing capabilities. The processor 710 may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but may also be a Digital Signal Processor (DSP), application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor 710 may be any conventional processor or the like.
The Memory 730 may be, but is not limited to, random access Memory (Random Access Memory, RAM), read Only Memory (ROM), programmable Read Only Memory (Programmable Read-Only Memory, PROM), erasable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), electrically erasable Read Only Memory (Electric Erasable Programmable Read-Only Memory, EEPROM), etc. The memory 730 stores computer readable instructions that, when executed by the processor 710, cause the electronic device 700 to perform the steps of the method embodiments described above.
The electronic device 700 may also include a memory controller, an input-output unit, an audio unit, a display unit.
The memory 730, the memory controller, the processor 710, the peripheral interface, the input/output unit, the audio unit, and the display unit are electrically connected directly or indirectly to each other, so as to realize data transmission or interaction. For example, the elements may be electrically coupled to each other via one or more communication buses 740. The processor 710 is configured to execute executable modules stored in the memory 730. And, the electronic device 700 is configured to perform the following method: acquiring access data for accessing a target file transfer server; acquiring a target file operator corresponding to the type of the target file transmission server according to the access data; converting the format of the access data into format data corresponding to the target file transmission server through the target file operator; and sending the format data to the target file transmission server.
The input-output unit is used for providing the user with input data to realize the interaction between the user and the server (or the local terminal). The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
The audio unit provides an audio interface to the user, which may include one or more microphones, one or more speakers, and audio circuitry.
The display unit provides an interactive interface (e.g. a user-operated interface) between the electronic device and the user or is used to display image data to a user reference. In this embodiment, the display unit may be a liquid crystal display or a touch display. In the case of a touch display, the touch display may be a capacitive touch screen or a resistive touch screen, etc. supporting single-point and multi-point touch operations. Supporting single-point and multi-point touch operations means that the touch display can sense touch operations simultaneously generated from one or more positions on the touch display, and the sensed touch operations are passed to the processor for calculation and processing.
It is to be understood that the configuration shown in fig. 7 is illustrative only, and that the electronic device 700 may also include more or fewer components than those shown in fig. 7, or have a different configuration than that shown in fig. 7. The components shown in fig. 7 may be implemented in hardware, software, or a combination thereof.
The application also provides a computer storage medium having stored thereon a computer program which, when executed by a processor, performs the method according to the method embodiment.
The application also provides a computer program product which, when run on a computer, causes the computer to perform the method according to the method embodiments.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding procedure in the foregoing method for the specific working procedure of the system described above, and this will not be repeated here.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described as different from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other. For the apparatus class embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference is made to the description of the method embodiments for relevant points.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored on a computer-readable computer storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a computer storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned computer storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes. It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application. It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (7)
1. A file transfer method, comprising:
acquiring access data for accessing a target file transfer server;
acquiring a target file operator corresponding to the type of the target file transmission server according to the access data, wherein the target file operator is generated based on the type of the target file transmission server or is searched from at least one file operator stored locally;
converting the format of the access data into format data corresponding to the target file transmission server through the target file operator;
transmitting the format data to the target file transmission server;
after sending the format data to the target file transfer server, the file transfer method further includes: receiving file directory information sent by the target file transmission server; determining a target display area for displaying the file directory information; displaying the file directory information in the target display area;
the file transmission method further comprises the following steps: responding to the synchronous operation of the user on the file directory information, and acquiring a synchronous instruction; sending the synchronization instruction to the target file transmission server so that the target file transmission server searches file data to be synchronized according to the synchronization instruction;
the file transmission method further comprises the following steps: receiving file data to be synchronized returned by the target file transmission server; the file data to be synchronized is data synchronized from the target file transmission server to a designated file transmission server; matching the file data to be synchronized with a preset security filtering rule; and if the matching result is determined to be the matching failure, sending the file data to be synchronized to the designated file transmission server.
2. The file transfer method according to claim 1, characterized in that the file transfer method further comprises:
and if the matching result is determined to be successful, determining that the file data to be synchronized contains sensitive data.
3. The file transfer method according to claim 1, characterized in that the file transfer method further comprises:
receiving file data to be synchronized sent by a designated file transmission server; the file data to be synchronized is data synchronized from the designated file transmission server to the target file transmission server;
matching the file data to be synchronized with a preset security filtering rule;
and if the matching result is determined to be the matching failure, the file data to be synchronized is sent to the target file transmission server.
4. A file transfer method according to claim 3, wherein the file transfer method further comprises:
and if the matching result is determined to be successful, determining that the file data to be synchronized contains sensitive data.
5. A document transfer apparatus, comprising:
the first acquisition module is used for acquiring access data for accessing the target file transmission server;
the second acquisition module is used for acquiring a target file operator corresponding to the type of the target file transmission server according to the access data, wherein the target file operator is generated based on the type of the target file transmission server or is searched from at least one file operator stored locally;
the conversion module is used for converting the format of the access data into format data corresponding to the target file transmission server through the target file operator;
the first sending module is used for sending the format data to the target file transmission server;
the first sending module is used for receiving file directory information sent by the target file transmission server; determining a target display area for displaying the file directory information; displaying the file directory information in the target display area;
the first sending module is further used for responding to the synchronous operation of the user on the file directory information and obtaining a synchronous instruction; sending the synchronization instruction to the target file transmission server so that the target file transmission server searches file data to be synchronized according to the synchronization instruction;
the first sending module is further configured to receive file data to be synchronized returned by the target file transmission server; the file data to be synchronized is data synchronized from the target file transmission server to a designated file transmission server; matching the file data to be synchronized with a preset security filtering rule; and if the matching result is determined to be the matching failure, sending the file data to be synchronized to the designated file transmission server.
6. A computer storage medium, characterized in that the computer storage medium has stored thereon a computer program which, when executed by a processor, performs the file transfer method according to any of claims 1-4.
7. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the file transfer method of any of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111591846.3A CN114285839B (en) | 2021-12-23 | 2021-12-23 | File transmission method and device, computer storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111591846.3A CN114285839B (en) | 2021-12-23 | 2021-12-23 | File transmission method and device, computer storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114285839A CN114285839A (en) | 2022-04-05 |
CN114285839B true CN114285839B (en) | 2023-11-10 |
Family
ID=80874746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111591846.3A Active CN114285839B (en) | 2021-12-23 | 2021-12-23 | File transmission method and device, computer storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114285839B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116541015B (en) * | 2023-05-15 | 2024-03-19 | 上海携宁计算机科技股份有限公司 | Back-end storage method, device, server and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102957751A (en) * | 2012-11-27 | 2013-03-06 | 北京金山云科技有限公司 | Document transmission method and device between terminal device and network server and terminal device |
CN109495556A (en) * | 2018-10-31 | 2019-03-19 | 海南高灯科技有限公司 | A kind of document handling method and device |
CN109740367A (en) * | 2019-01-08 | 2019-05-10 | 郑州云海信息技术有限公司 | A kind of mapping method of file system accesses control list |
CN112511613A (en) * | 2020-11-19 | 2021-03-16 | 深圳市风云实业有限公司 | Cross-domain transmission system and method based on content analysis |
CN113301162A (en) * | 2021-05-31 | 2021-08-24 | 深圳市云语科技有限公司 | Transmission method capable of rapidly downloading large number of small files in high-delay scene |
CN113660156A (en) * | 2021-08-09 | 2021-11-16 | 覃飞 | Processing method and device for transmission file, electronic equipment and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016220174A (en) * | 2015-05-26 | 2016-12-22 | 株式会社東芝 | Home appliance control method and home appliance controller |
WO2017114091A1 (en) * | 2015-12-30 | 2017-07-06 | 华为技术有限公司 | Nas data access method, system and relevant device |
CN106933872A (en) * | 2015-12-30 | 2017-07-07 | 阿里巴巴集团控股有限公司 | A kind of method and device that cloud storage service is accessed by traditional file systemses interface |
US10790056B1 (en) * | 2019-04-16 | 2020-09-29 | International Medical Solutions, Inc. | Methods and systems for syncing medical images across one or more networks and devices |
CN111600957A (en) * | 2020-05-20 | 2020-08-28 | 中国工商银行股份有限公司 | File transmission method, device and system and electronic equipment |
-
2021
- 2021-12-23 CN CN202111591846.3A patent/CN114285839B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102957751A (en) * | 2012-11-27 | 2013-03-06 | 北京金山云科技有限公司 | Document transmission method and device between terminal device and network server and terminal device |
CN109495556A (en) * | 2018-10-31 | 2019-03-19 | 海南高灯科技有限公司 | A kind of document handling method and device |
CN109740367A (en) * | 2019-01-08 | 2019-05-10 | 郑州云海信息技术有限公司 | A kind of mapping method of file system accesses control list |
CN112511613A (en) * | 2020-11-19 | 2021-03-16 | 深圳市风云实业有限公司 | Cross-domain transmission system and method based on content analysis |
CN113301162A (en) * | 2021-05-31 | 2021-08-24 | 深圳市云语科技有限公司 | Transmission method capable of rapidly downloading large number of small files in high-delay scene |
CN113660156A (en) * | 2021-08-09 | 2021-11-16 | 覃飞 | Processing method and device for transmission file, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114285839A (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11750607B2 (en) | Identifying accounts having shared credentials | |
US20230139473A1 (en) | Malware detection and content item recovery | |
US10277673B2 (en) | Local server for synced online content management system | |
US10282522B2 (en) | Cross-application authentication on a content management system | |
US20200412793A1 (en) | Link file sharing and synchronization | |
US11394715B2 (en) | Proxy authorization of a network device | |
CN106406986B (en) | A kind of resource share method and device | |
US20130232187A1 (en) | Systems and methods for managing data in a networked communication system | |
US20140304384A1 (en) | Uploading large content items | |
US9201596B2 (en) | Transmitting data by means of storage area network | |
US9930063B2 (en) | Random identifier generation for offline database | |
US20200311137A1 (en) | Unified metadata search | |
CN114285839B (en) | File transmission method and device, computer storage medium and electronic equipment | |
US20170060517A1 (en) | Information processing system | |
TW201629797A (en) | Method for performing file synchronization control, and associated apparatus | |
US9524384B2 (en) | Image output apparatus, image output system, and computer-readable recording medium | |
CN114466401A (en) | Image transmission method and electronic device | |
CN111723153A (en) | Data synchronous processing method, device, equipment and storage medium | |
CN114328272B (en) | Application testing method, device and system and electronic equipment | |
JP6187239B2 (en) | Cloud server, control program, control method, and cloud system | |
CN114363324A (en) | File sharing method and device, storage medium and electronic equipment | |
CN114564403A (en) | Information display method and computing equipment | |
CN114564401A (en) | Remote control method and computing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |