CN114401101A - Data transmission method - Google Patents

Data transmission method Download PDF

Info

Publication number
CN114401101A
CN114401101A CN202111301107.6A CN202111301107A CN114401101A CN 114401101 A CN114401101 A CN 114401101A CN 202111301107 A CN202111301107 A CN 202111301107A CN 114401101 A CN114401101 A CN 114401101A
Authority
CN
China
Prior art keywords
data
information
sub
transmission
subdata
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111301107.6A
Other languages
Chinese (zh)
Inventor
申大伟
黄涛
马勇
唐培全
李�杰
王晓磊
王志翔
范伟宁
李栋梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaneng Information Technology Co Ltd
Original Assignee
Huaneng Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Information Technology Co Ltd filed Critical Huaneng Information Technology Co Ltd
Priority to CN202111301107.6A priority Critical patent/CN114401101A/en
Publication of CN114401101A publication Critical patent/CN114401101A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The invention relates to the technical field of data transmission and discloses a data transmission method.A database receives a transmission request, wherein the transmission request comprises request port information and a data name to be accessed, and the request port refers to a data terminal for sending the transmission request; the database extracts the data information and divides the data information into a plurality of sub-data, and the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process; the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed. Compared with the traditional data transmission mode, even if the sub data files are interrupted or partially lost in the transmission process, the part of the sub data files which are transmitted to the request port can be decrypted, decompressed and self-combined, and spliced into a temporary data file for a requester to check.

Description

Data transmission method
Technical Field
The invention relates to the technical field of network security, in particular to a data transmission method.
Background
The internet (also called international network) refers to a huge network formed by connecting networks in series, and these networks are connected by a set of general protocols to form a logically single huge international network, beginning in 1969. It differs from the World Wide Web (WWW) in that it can provide a wide range of information resources, peer-to-peer networks, file sharing, and IP telephony services, among others. With the development of a new generation of wireless broadband communication technology and the development of an industrialization process, handheld multimedia terminals centering on PDAs, multimedia mobile phones, tablet computers and the like are widely applied, will become a unified platform for popularization and application of information technology, can support various rich and varied information applications, and are rapidly developed in various industries such as industry, agriculture, medical treatment, education, family and personal communication.
Data transfer is one of the key technologies, and data is stored in various storage engines. The data transfer function should access and manage these business data under the security architecture of the platform. The method helps users of the big data platform to manage data in the big data platform more normatively, more uniformly and more safely, and realizes uniform data transmission management. In a conventional data transmission process, many kinds of data are often required to be transmitted, the data include large files, such as movies, television shows, electronic books, and the like, the large files generally take a long time to complete the data transmission process, and if the transmission is interrupted in the middle due to a network or other reasons, the file is in an unfinished transmission state, and the content of the file cannot be viewed or even downloaded again, so that daily office work or entertainment is affected.
Disclosure of Invention
The present invention is directed to a data transmission method to solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for data transmission, said method comprising:
the database receives a transmission request, the transmission request comprises request port information and a data name needing to be accessed, the request port refers to a data terminal used for sending the transmission request, the data name in the transmission request refers to position information or retrieval information of data needing to be transmitted, the data information can be easily retrieved from the database through the data name, and the data names of any two data information are different;
the database extracts the data information and divides the data information into a plurality of sub-data, the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process, and any sub-data after being divided can be used as independent data information;
the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed.
As a further scheme of the invention, after the data information is extracted from the database and is split into a plurality of sub-data, the sub-data needs to be encrypted and compressed for reducing the time required by the subsequent data transmission and improving the security of the subsequent data transmission,
the specific steps of the data information processing are as follows:
extracting the data information;
splitting data information into a plurality of sub data;
marking the subdata according to the content sequence of the subdata, wherein the marks are based on the content in the subdata, namely the content of the subdata with two adjacent marks can be continued, and any two subdata with adjacent marks can be combined into one subdata;
and encrypting and pressurizing the subdata, establishing a temporary database, and storing the encrypted and pressurized subdata in the temporary database.
As a further aspect of the present invention, the request port receives the processing data from the database, because the processing data is split sub-data, and the sub-data is encrypted and pressurized, the data is collated before reading, and the specific data collating steps are as follows:
extracting the subdata and the key corresponding to the subdata;
decrypting the subdata through a corresponding key, and converting the subdata from a compressed state to a normal state after the decryption is finished;
and merging the decrypted and decompressed sub-data into a complete data message according to the marking sequence.
As a further scheme of the present invention, the sub-data needs to be encrypted before being transmitted, and in the encryption process, because any sub-data is separate data information and is independently encrypted, each sub-data has its own key, and the key inherits the mark of the sub-data, and is used as a part of the processing data of the database in the data transmission process, and is transmitted to the request port along with the compressed and encrypted sub-data.
As a further scheme of the invention, in the process of transmitting the processing data of the database to the request port, the key is taken as the most prior transmission item to be prior to the transmission of the subdata.
As a further scheme of the invention, when the data transmission process is interrupted and the subsequent content can not be transmitted, the interruption emergency treatment can be started, and the specific treatment steps are as follows:
decrypting and decompressing the received subdata, and sequencing and combining the subdata according to the marks to generate temporary data information;
extracting the mark information of the received subdata;
the request port sends an interrupt continuation request to a temporary database;
the temporary database continues to send the remaining child data to the requesting port.
As a further scheme of the present invention, the interruption connection request includes tag information of the sub-data that has been received by the request port, and the temporary database reads the tag information, thereby determining that the sub-data is not transmitted to the request port, and connecting the previous data transmission flow.
As a further scheme of the invention, when partial data are lost due to problems of network environment and the like in the data transmission process, corresponding missing emergency treatment can be started, and the specific steps of the missing emergency treatment are as follows:
extracting the received mark information of the subdata or the key;
the request port sends a missing continuing request to the temporary database;
the temporary database continues to send the remaining child data to the requesting port.
As a further scheme of the invention, when the data transmission is interrupted and the request port only receives the key information or part of the key information, the data transmission process is interrupted and the transmission request is retransmitted.
Compared with the prior art, the invention has the beneficial effects that: the traditional integral transmission mode is abandoned when large data or large files are transmitted, the data are split into a plurality of sub-data files, the sub-data files with smaller data volume are sequentially transmitted to the request port, and even if the sub-data files are interrupted or partially lost in the transmission process, the sub-data files transmitted to the request port can be decrypted, decompressed and self-combined to be spliced into a temporary data file for the request person to view, so that the problem that the transmission interruption caused by network or other reasons in the traditional data transmission process is eliminated, the file is in an unfinished transmission state, the content of the file cannot be viewed or even needs to be downloaded again, and the daily office or entertainment is affected is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a schematic flow chart of a data transmission method according to an embodiment of the present invention.
Fig. 2 is a flow chart illustrating a processing procedure of data before transmission according to a preferred embodiment of the present invention.
Fig. 3 is a schematic flow chart of a sorting process of data before reading according to a preferred embodiment of the present invention.
Fig. 4 is a schematic flow chart of an interrupt emergency processing according to a preferred embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, if there is a directional indication (such as up, down, left, right, front, and back) in the embodiment of the present invention, it is only used to explain the relative position relationship between the components, the motion situation, and the like in a certain posture, and if the certain posture is changed, the directional indication is changed accordingly.
In addition, if the description of "first", "second", etc. is referred to in the present invention, it is used for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
The following detailed description of specific implementations of the present invention is provided in conjunction with specific embodiments:
data transfer is one of the key technologies, and data is stored in various storage engines. The data transfer function should access and manage these business data under the security architecture of the platform. The method helps users of the big data platform to manage data in the big data platform more normatively, more uniformly and more safely, and realizes uniform data transmission management. In a conventional data transmission process, many kinds of data are often required to be transmitted, the data include large files, such as movies, television shows, electronic books, and the like, the large files generally take a long time to complete the data transmission process, and if the transmission is interrupted in the middle due to a network or other reasons, the file is in an unfinished transmission state, and the content of the file cannot be viewed or even downloaded again, so that daily office work or entertainment is affected.
In this embodiment, a database receives a transmission request, where the transmission request includes request port information and a data name to be accessed, the request port refers to a data terminal for sending the transmission request, and the data name in the transmission request refers to location information or retrieval information of data to be transmitted, and the data information can be easily retrieved from the database by the data name, and the data names of any two data information are different; the database extracts the data information and divides the data information into a plurality of sub-data, the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process, and any sub-data after being divided can be used as independent data information; the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed. The conventional integral transmission mode is abandoned when large data or large files are transmitted, the data are split into a plurality of sub-data files, the sub-data files with smaller data volume are sequentially transmitted to the request port, and even if the sub-data files are interrupted or partially lost in the transmission process, the sub-data files transmitted to the request port can be decrypted and decompressed to be self-combined and spliced into a temporary data file for the request person to view, so that the problem that the transmission interruption caused by a specification due to a network or other reasons in the traditional data transmission process is eliminated, the file is in an unfinished transmission state, the content of the file cannot be viewed or even needs to be downloaded again, and the daily office or entertainment is influenced is solved.
Example 1
FIG. 1 shows a flow of implementing a data transmission method in the present invention, wherein the data transmission method is described
The data transmission method is applied to a device capable of connecting with the internet in real time, the device can be a device capable of communicating with a mobile phone, a tablet computer, a computer and the like, and is not particularly limited herein, and the data transmission method is detailed as follows:
step S100, a database receives a transmission request, wherein the transmission request comprises request port information and a data name needing to be accessed, the request port refers to a data terminal used for sending the transmission request, the data name in the transmission request refers to position information or retrieval information of data needing to be transmitted, the data information can be easily retrieved from the database through the data name, and the data names of any two data information are different;
step S200, the database extracts the data information and splits the data information into a plurality of sub data, the integrity of the data is not damaged in the data splitting process, namely the data splitting process is a reversible process, and any sub data after being split can be used as independent data information;
step S300, the request port receives processing data from the database, where the processing data refers to compressed packet data obtained by compressing the sub-data.
The data compression proposed in the above description is a technical method for reducing the amount of data to reduce the storage space and improve the transmission, storage and processing efficiency thereof, or for reorganizing the data according to a certain algorithm and reducing the redundancy and storage space of the data, without losing useful information. Data compression includes lossy compression and lossless compression.
In computer science and information theory, data compression or source coding is the process of representing information in fewer data bits (or other information-related units) than uncoded according to a particular coding scheme. For example, if we encode "compression" as "comp" then this article can be represented with fewer data bits. One popular example of compression is the ZIP file format used by many computers, which not only provides the compression functionality, but also serves as an archive tool (Archiver) that can store many files in the same file.
In addition, as shown in fig. 2, after data information is extracted from the database and split into a plurality of sub-data, it needs to be encrypted and compressed, so as to reduce the time required for subsequent data transmission and improve the security thereof, and the specific steps of processing the data information are as follows:
step S101, extracting the data information;
step S102, splitting data information into a plurality of sub data;
step S103, marking the subdata according to the content sequence of the subdata, wherein the mark is based on the content in the subdata, namely the content of the subdata with two adjacent marks can be continued, and any two subdata with adjacent marks can be combined into one subdata;
and step S104, encrypting and pressurizing the subdata, establishing a temporary database, and storing the encrypted and pressurized subdata in the temporary database.
Fig. 3 shows another preferred embodiment of the present invention, which shows the processing procedure of data before reading, and the request port accepts the processed data from the database, because the processed data is split sub-data, and the sub-data is encrypted and pressurized, the data is collated before reading, and the specific data collating steps are as follows:
step S201, extracting the subdata and the key corresponding to the subdata;
step S202, the subdata is decrypted through a corresponding key, and the subdata is converted into a normal state from a compressed state after the decryption is finished;
step S203, merging the decrypted and decompressed subdata into a complete data message according to the marking sequence. A key (secret) refers to secret information used to perform cryptographic applications such as encryption, decryption, integrity verification, and the like. In symmetric cryptography (or key cryptography), the same key is used for encryption and decryption, and therefore the key needs to be kept secret. In public key cryptography (or asymmetric cryptography), the keys used for encryption and decryption are different: typically one is public, called the public key; the other is secret, called private key. The cryptosystem may be divided into a symmetric cryptosystem (also called a single-key cryptosystem, a secret key cryptosystem, a symmetric key cryptosystem) and an asymmetric cryptosystem (also called a double-key cryptosystem, a public key cryptosystem, an asymmetric key cryptosystem) according to whether an encryption key and a decryption key used in the cryptographic algorithm are the same or not and whether the decryption process can be derived from the key encryption process (or the encryption process can be derived from the decryption process). Symmetric key encryption, also known as private key encryption or session key encryption algorithm, is the use of the same key by both the sender and receiver of information to encrypt and decrypt data. Its most advantageous specification is that it is fast in encryption/decryption speed and suitable for encrypting large data volumes, so in practical applications, people usually combine both together, for example, a symmetric key encryption system is used to store large data information, and a public key encryption system is used to encrypt keys.
It should be noted that, in the embodiment of the present invention, the sub-data needs to be encrypted before being transmitted, and in the encryption process, because any sub-data is separate data information and is independently encrypted, each sub-data has its own key, and the key inherits the mark of the sub-data and is used as a part of the processing data of the database in the data transmission process to be transmitted to the request port along with the compressed and encrypted sub-data. In addition, in this embodiment, it can be understood that the sub-data file becomes an invalid file on the premise of no key, so that in the process of transmitting the processing data of the database to the request port, the key is used as the most superior transmission item to be superior to the transmission of the sub-data.
As shown in fig. 4, another preferred embodiment of the present invention is provided, when the data transmission process is interrupted and the subsequent content cannot be transmitted, an interruption emergency process is started, and the specific process steps are as follows:
step S301, decrypting and decompressing the received subdata, sequencing and combining the subdata according to the marks, and generating temporary data information;
step S302, extracting the mark information of the received subdata;
step S303, requesting the port to send an interrupt continuation request to the temporary database;
step S304, the temporary database continues to send the remaining subdata to the request port.
It can be understood that, in this embodiment, the interruption connection request includes the flag information of the sub-data that has been received by the request port, and the temporary database reads the flag information, so as to determine that the sub-data is not transmitted to the request port, thereby connecting the previous data transmission flow. It should be noted that, in this embodiment, when the data transmission is interrupted and the request port only receives the key information or part of the key information, the data transmission process is interrupted and the transmission request is retransmitted.
In another preferred embodiment of the present invention, when a part of data is missing due to a problem of network environment during data transmission, a corresponding missing emergency treatment is started, wherein the missing emergency treatment is specifically executed
The method comprises the following steps:
extracting the received mark information of the subdata or the key;
the request port sends a missing continuing request to the temporary database;
the temporary database continues to send the remaining child data to the requesting port.
The functions that can be realized by the data transmission method are all completed by computer equipment, the computer equipment comprises one or more processors and one or more memories, and at least one program code is stored in the one or more memories and is loaded and executed by the one or more processors to realize the functions of the power grid engineering design unit management method.
The processor fetches instructions and analyzes the instructions one by one from the memory, then completes corresponding operations according to the instruction requirements, generates a series of control commands, enables all parts of the computer to automatically, continuously and coordinately act to form an organic whole, realizes the input of programs, the input of data, the operation and the output of results, and the arithmetic operation or the logic operation generated in the process is completed by the arithmetic unit; the memory comprises a Read-only memory (ROM) for storing a computer program, and a protection device is arranged outside the memory.
Illustratively, a computer program can be partitioned into one or more modules, which are stored in memory and executed by a processor to implement the present invention. One or more of the modules may be a series of computer program instruction segments capable of performing certain functions, which are used to describe the execution of the computer program in the terminal device.
Those skilled in the art will appreciate that the above description of the service device is merely exemplary and not limiting of the terminal device, and may include more or less components than those described, or combine certain components, or different components, such as may include input output devices, network access devices, buses, etc.
The processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is the control center of the terminal equipment and connects the various parts of the entire user terminal using various interfaces and lines.
The memory may be used to store computer programs and/or modules, and the processor may implement various functions of the terminal device by operating or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory mainly comprises a storage program area and a storage data area, wherein the storage program area can store an operating system, application programs (such as an information acquisition template display function, a product information publishing function and the like) required by at least one function and the like; the storage data area may store data created according to the use of the berth-state display system (e.g., product information acquisition templates corresponding to different product types, product information that needs to be issued by different product providers, etc.), and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash memory card (FlashCard), at least one disk storage device, a flash memory device, or other volatile solid state storage device.
The terminal device integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the modules/units in the system according to the above embodiment may be implemented by a computer program, which may be stored in a computer-readable storage medium and used by a processor to implement the functions of the embodiments of the system. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer memory, Read-only memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the statement that "comprises an … …" limits an element of the specification to no more than one other element, and does not preclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. A method for data transmission, said method comprising:
the database receives a transmission request, the transmission request comprises request port information and a data name needing to be accessed, the request port refers to a data terminal used for sending the transmission request, the data name in the transmission request refers to position information or retrieval information of data needing to be transmitted, the data information can be easily retrieved from the database through the data name, and the data names of any two data information are different;
the database extracts the data information and divides the data information into a plurality of sub-data, the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process, and any sub-data after being divided can be used as independent data information;
the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed.
2. The data transmission method according to claim 1, wherein after the data information is extracted from the database and split into a plurality of sub-data, the data information needs to be encrypted and compressed for reducing the time required for subsequent data transmission and improving the security thereof, and the specific steps of processing the data information are as follows:
extracting the data information;
splitting data information into a plurality of sub data;
marking the subdata according to the content sequence of the subdata, wherein the marks are based on the content in the subdata, namely the content of the subdata with two adjacent marks can be continued, and any two subdata with adjacent marks can be combined into one subdata;
and encrypting and pressurizing the subdata, establishing a temporary database, and storing the encrypted and pressurized subdata in the temporary database.
3. A data transmission method according to claim 2, wherein the request port receives the processed data from the database, and since the processed data is split sub-data, and the sub-data is encrypted and compressed, the data is collated before being read, and the specific data collating steps are as follows:
extracting the subdata and the key corresponding to the subdata;
decrypting the subdata through a corresponding key, and converting the subdata from a compressed state to a normal state after the decryption is finished;
and merging the decrypted and decompressed sub-data into a complete data message according to the marking sequence.
4. A data transmission method according to claim 3, wherein the sub-data is encrypted before transmission, and during the encryption process, since any sub-data is a single data message and is independently encrypted, each sub-data has its own private key, and the private key inherits the mark of the sub-data and is transmitted to the request port as a part of the processing data of the database along with the compressed and encrypted sub-data.
5. The data transmission method of claim 4, wherein the key is used as the most preferred transmission item to be prioritized over the transmission of the sub-data during the transmission of the processing data of the database to the request port.
6. The data transmission method according to claim 1, wherein when the data transmission process is interrupted and the subsequent content cannot be transmitted, an interruption emergency process is started, and the specific process steps are as follows:
decrypting and decompressing the received subdata, and sequencing and combining the subdata according to the marks to generate temporary data information;
extracting the mark information of the received subdata;
the request port sends an interrupt continuation request to a temporary database;
the temporary database continues to send the remaining child data to the requesting port.
7. The data transmission method according to claim 6, wherein the connection interruption request includes flag information of the sub-data that the request port has received, and the temporary database reads the flag information to determine that the sub-data is not transmitted to the request port, so as to connect the previous data transmission process.
8. A data transmission method according to claim 1, wherein when part of data is missing due to a problem of network environment during data transmission, a corresponding missing emergency treatment is started, and the missing emergency treatment comprises the following specific steps:
extracting the received mark information of the subdata or the key;
the request port sends a missing continuing request to the temporary database;
the temporary database continues to send the remaining child data to the requesting port.
9. A data transmission method according to claim 7, wherein when the data transmission is interrupted and the requesting port receives only the key information or part of the key information, the data transmission process is interrupted and the transmission request is retransmitted.
CN202111301107.6A 2021-11-04 2021-11-04 Data transmission method Pending CN114401101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111301107.6A CN114401101A (en) 2021-11-04 2021-11-04 Data transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111301107.6A CN114401101A (en) 2021-11-04 2021-11-04 Data transmission method

Publications (1)

Publication Number Publication Date
CN114401101A true CN114401101A (en) 2022-04-26

Family

ID=81225852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111301107.6A Pending CN114401101A (en) 2021-11-04 2021-11-04 Data transmission method

Country Status (1)

Country Link
CN (1) CN114401101A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110944012A (en) * 2019-12-16 2020-03-31 西安电子科技大学 Anti-protocol analysis data secure transmission method, system and information data processing terminal
CN111107245A (en) * 2019-12-26 2020-05-05 合肥道正企智大数据有限公司 Efficient interrupt recoverable image hiding encryption transmission method, device and system
CN111552899A (en) * 2020-03-20 2020-08-18 广联达科技股份有限公司 Method and system for improving display performance of front-end report
CN111698253A (en) * 2020-06-13 2020-09-22 郑州智利信信息技术有限公司 Computer network safety system
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium
CN110944012A (en) * 2019-12-16 2020-03-31 西安电子科技大学 Anti-protocol analysis data secure transmission method, system and information data processing terminal
CN111107245A (en) * 2019-12-26 2020-05-05 合肥道正企智大数据有限公司 Efficient interrupt recoverable image hiding encryption transmission method, device and system
CN111552899A (en) * 2020-03-20 2020-08-18 广联达科技股份有限公司 Method and system for improving display performance of front-end report
CN111698253A (en) * 2020-06-13 2020-09-22 郑州智利信信息技术有限公司 Computer network safety system

Similar Documents

Publication Publication Date Title
US11290252B2 (en) Compression and homomorphic encryption in secure query and analytics
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN108989287B (en) Encryption method, device, terminal equipment and storage medium
US7751556B2 (en) Apparatus and method of generating falsification detecting data of encrypted data in the course of process
CN112491832B (en) File transmission method and device
CN105721156A (en) General Encoding Functions For Modular Exponentiation Encryption Schemes
CN108737353B (en) Data encryption method and device based on data analysis system
CN113014580A (en) File transmission method and device, electronic equipment and storage medium
CN110662089A (en) Bullet screen receiving and processing method, storage medium, electronic equipment and system
CN102231181B (en) Computer system used for file encryption and file encryption method
CN116541320B (en) Intelligent IO module bus communication method, IO module, terminal and medium
CN111431873A (en) Method, system, device and medium for reporting information
US20070263876A1 (en) In-memory compression and encryption
CN114401101A (en) Data transmission method
CN113704206B (en) Metadata processing method and device, electronic equipment and storage medium
EP4020265A1 (en) Method and device for storing encrypted data
CN114117488A (en) File management method, file uploading method, file decryption method and related equipment
KR20130020231A (en) Copyright protection system for web applications
JP2003304237A (en) Method for creating common key, encryption method using the common key, method for managing common key, method for authentifying solid by solid number of terminal, program for executing these methods, and application software including the program
KR100452766B1 (en) Method for cryptographing a information
CN113434845B (en) Business handling method and device, electronic equipment and computer readable storage medium
CN114679324B (en) Data exchange method, tool, system, equipment and medium
CN108984315B (en) Application data processing method and device, terminal and readable medium
US11811920B1 (en) Secure computation and communication
CN117714078A (en) Block chain group hidden transmission communication method, system and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination