CN114401101A - Data transmission method - Google Patents
Data transmission method Download PDFInfo
- Publication number
- CN114401101A CN114401101A CN202111301107.6A CN202111301107A CN114401101A CN 114401101 A CN114401101 A CN 114401101A CN 202111301107 A CN202111301107 A CN 202111301107A CN 114401101 A CN114401101 A CN 114401101A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- sub
- transmission
- subdata
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 97
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000012545 processing Methods 0.000 claims abstract description 25
- 239000000284 extract Substances 0.000 claims abstract description 5
- 230000002441 reversible effect Effects 0.000 claims abstract description 5
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 230000015654 memory Effects 0.000 description 15
- 238000004590 computer program Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 10
- 238000007906 compression Methods 0.000 description 5
- 230000006835 compression Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000013144 data compression Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Abstract
The invention relates to the technical field of data transmission and discloses a data transmission method.A database receives a transmission request, wherein the transmission request comprises request port information and a data name to be accessed, and the request port refers to a data terminal for sending the transmission request; the database extracts the data information and divides the data information into a plurality of sub-data, and the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process; the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed. Compared with the traditional data transmission mode, even if the sub data files are interrupted or partially lost in the transmission process, the part of the sub data files which are transmitted to the request port can be decrypted, decompressed and self-combined, and spliced into a temporary data file for a requester to check.
Description
Technical Field
The invention relates to the technical field of network security, in particular to a data transmission method.
Background
The internet (also called international network) refers to a huge network formed by connecting networks in series, and these networks are connected by a set of general protocols to form a logically single huge international network, beginning in 1969. It differs from the World Wide Web (WWW) in that it can provide a wide range of information resources, peer-to-peer networks, file sharing, and IP telephony services, among others. With the development of a new generation of wireless broadband communication technology and the development of an industrialization process, handheld multimedia terminals centering on PDAs, multimedia mobile phones, tablet computers and the like are widely applied, will become a unified platform for popularization and application of information technology, can support various rich and varied information applications, and are rapidly developed in various industries such as industry, agriculture, medical treatment, education, family and personal communication.
Data transfer is one of the key technologies, and data is stored in various storage engines. The data transfer function should access and manage these business data under the security architecture of the platform. The method helps users of the big data platform to manage data in the big data platform more normatively, more uniformly and more safely, and realizes uniform data transmission management. In a conventional data transmission process, many kinds of data are often required to be transmitted, the data include large files, such as movies, television shows, electronic books, and the like, the large files generally take a long time to complete the data transmission process, and if the transmission is interrupted in the middle due to a network or other reasons, the file is in an unfinished transmission state, and the content of the file cannot be viewed or even downloaded again, so that daily office work or entertainment is affected.
Disclosure of Invention
The present invention is directed to a data transmission method to solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for data transmission, said method comprising:
the database receives a transmission request, the transmission request comprises request port information and a data name needing to be accessed, the request port refers to a data terminal used for sending the transmission request, the data name in the transmission request refers to position information or retrieval information of data needing to be transmitted, the data information can be easily retrieved from the database through the data name, and the data names of any two data information are different;
the database extracts the data information and divides the data information into a plurality of sub-data, the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process, and any sub-data after being divided can be used as independent data information;
the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed.
As a further scheme of the invention, after the data information is extracted from the database and is split into a plurality of sub-data, the sub-data needs to be encrypted and compressed for reducing the time required by the subsequent data transmission and improving the security of the subsequent data transmission,
the specific steps of the data information processing are as follows:
extracting the data information;
splitting data information into a plurality of sub data;
marking the subdata according to the content sequence of the subdata, wherein the marks are based on the content in the subdata, namely the content of the subdata with two adjacent marks can be continued, and any two subdata with adjacent marks can be combined into one subdata;
and encrypting and pressurizing the subdata, establishing a temporary database, and storing the encrypted and pressurized subdata in the temporary database.
As a further aspect of the present invention, the request port receives the processing data from the database, because the processing data is split sub-data, and the sub-data is encrypted and pressurized, the data is collated before reading, and the specific data collating steps are as follows:
extracting the subdata and the key corresponding to the subdata;
decrypting the subdata through a corresponding key, and converting the subdata from a compressed state to a normal state after the decryption is finished;
and merging the decrypted and decompressed sub-data into a complete data message according to the marking sequence.
As a further scheme of the present invention, the sub-data needs to be encrypted before being transmitted, and in the encryption process, because any sub-data is separate data information and is independently encrypted, each sub-data has its own key, and the key inherits the mark of the sub-data, and is used as a part of the processing data of the database in the data transmission process, and is transmitted to the request port along with the compressed and encrypted sub-data.
As a further scheme of the invention, in the process of transmitting the processing data of the database to the request port, the key is taken as the most prior transmission item to be prior to the transmission of the subdata.
As a further scheme of the invention, when the data transmission process is interrupted and the subsequent content can not be transmitted, the interruption emergency treatment can be started, and the specific treatment steps are as follows:
decrypting and decompressing the received subdata, and sequencing and combining the subdata according to the marks to generate temporary data information;
extracting the mark information of the received subdata;
the request port sends an interrupt continuation request to a temporary database;
the temporary database continues to send the remaining child data to the requesting port.
As a further scheme of the present invention, the interruption connection request includes tag information of the sub-data that has been received by the request port, and the temporary database reads the tag information, thereby determining that the sub-data is not transmitted to the request port, and connecting the previous data transmission flow.
As a further scheme of the invention, when partial data are lost due to problems of network environment and the like in the data transmission process, corresponding missing emergency treatment can be started, and the specific steps of the missing emergency treatment are as follows:
extracting the received mark information of the subdata or the key;
the request port sends a missing continuing request to the temporary database;
the temporary database continues to send the remaining child data to the requesting port.
As a further scheme of the invention, when the data transmission is interrupted and the request port only receives the key information or part of the key information, the data transmission process is interrupted and the transmission request is retransmitted.
Compared with the prior art, the invention has the beneficial effects that: the traditional integral transmission mode is abandoned when large data or large files are transmitted, the data are split into a plurality of sub-data files, the sub-data files with smaller data volume are sequentially transmitted to the request port, and even if the sub-data files are interrupted or partially lost in the transmission process, the sub-data files transmitted to the request port can be decrypted, decompressed and self-combined to be spliced into a temporary data file for the request person to view, so that the problem that the transmission interruption caused by network or other reasons in the traditional data transmission process is eliminated, the file is in an unfinished transmission state, the content of the file cannot be viewed or even needs to be downloaded again, and the daily office or entertainment is affected is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a schematic flow chart of a data transmission method according to an embodiment of the present invention.
Fig. 2 is a flow chart illustrating a processing procedure of data before transmission according to a preferred embodiment of the present invention.
Fig. 3 is a schematic flow chart of a sorting process of data before reading according to a preferred embodiment of the present invention.
Fig. 4 is a schematic flow chart of an interrupt emergency processing according to a preferred embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, if there is a directional indication (such as up, down, left, right, front, and back) in the embodiment of the present invention, it is only used to explain the relative position relationship between the components, the motion situation, and the like in a certain posture, and if the certain posture is changed, the directional indication is changed accordingly.
In addition, if the description of "first", "second", etc. is referred to in the present invention, it is used for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
The following detailed description of specific implementations of the present invention is provided in conjunction with specific embodiments:
data transfer is one of the key technologies, and data is stored in various storage engines. The data transfer function should access and manage these business data under the security architecture of the platform. The method helps users of the big data platform to manage data in the big data platform more normatively, more uniformly and more safely, and realizes uniform data transmission management. In a conventional data transmission process, many kinds of data are often required to be transmitted, the data include large files, such as movies, television shows, electronic books, and the like, the large files generally take a long time to complete the data transmission process, and if the transmission is interrupted in the middle due to a network or other reasons, the file is in an unfinished transmission state, and the content of the file cannot be viewed or even downloaded again, so that daily office work or entertainment is affected.
In this embodiment, a database receives a transmission request, where the transmission request includes request port information and a data name to be accessed, the request port refers to a data terminal for sending the transmission request, and the data name in the transmission request refers to location information or retrieval information of data to be transmitted, and the data information can be easily retrieved from the database by the data name, and the data names of any two data information are different; the database extracts the data information and divides the data information into a plurality of sub-data, the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process, and any sub-data after being divided can be used as independent data information; the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed. The conventional integral transmission mode is abandoned when large data or large files are transmitted, the data are split into a plurality of sub-data files, the sub-data files with smaller data volume are sequentially transmitted to the request port, and even if the sub-data files are interrupted or partially lost in the transmission process, the sub-data files transmitted to the request port can be decrypted and decompressed to be self-combined and spliced into a temporary data file for the request person to view, so that the problem that the transmission interruption caused by a specification due to a network or other reasons in the traditional data transmission process is eliminated, the file is in an unfinished transmission state, the content of the file cannot be viewed or even needs to be downloaded again, and the daily office or entertainment is influenced is solved.
Example 1
FIG. 1 shows a flow of implementing a data transmission method in the present invention, wherein the data transmission method is described
The data transmission method is applied to a device capable of connecting with the internet in real time, the device can be a device capable of communicating with a mobile phone, a tablet computer, a computer and the like, and is not particularly limited herein, and the data transmission method is detailed as follows:
step S100, a database receives a transmission request, wherein the transmission request comprises request port information and a data name needing to be accessed, the request port refers to a data terminal used for sending the transmission request, the data name in the transmission request refers to position information or retrieval information of data needing to be transmitted, the data information can be easily retrieved from the database through the data name, and the data names of any two data information are different;
step S200, the database extracts the data information and splits the data information into a plurality of sub data, the integrity of the data is not damaged in the data splitting process, namely the data splitting process is a reversible process, and any sub data after being split can be used as independent data information;
step S300, the request port receives processing data from the database, where the processing data refers to compressed packet data obtained by compressing the sub-data.
The data compression proposed in the above description is a technical method for reducing the amount of data to reduce the storage space and improve the transmission, storage and processing efficiency thereof, or for reorganizing the data according to a certain algorithm and reducing the redundancy and storage space of the data, without losing useful information. Data compression includes lossy compression and lossless compression.
In computer science and information theory, data compression or source coding is the process of representing information in fewer data bits (or other information-related units) than uncoded according to a particular coding scheme. For example, if we encode "compression" as "comp" then this article can be represented with fewer data bits. One popular example of compression is the ZIP file format used by many computers, which not only provides the compression functionality, but also serves as an archive tool (Archiver) that can store many files in the same file.
In addition, as shown in fig. 2, after data information is extracted from the database and split into a plurality of sub-data, it needs to be encrypted and compressed, so as to reduce the time required for subsequent data transmission and improve the security thereof, and the specific steps of processing the data information are as follows:
step S101, extracting the data information;
step S102, splitting data information into a plurality of sub data;
step S103, marking the subdata according to the content sequence of the subdata, wherein the mark is based on the content in the subdata, namely the content of the subdata with two adjacent marks can be continued, and any two subdata with adjacent marks can be combined into one subdata;
and step S104, encrypting and pressurizing the subdata, establishing a temporary database, and storing the encrypted and pressurized subdata in the temporary database.
Fig. 3 shows another preferred embodiment of the present invention, which shows the processing procedure of data before reading, and the request port accepts the processed data from the database, because the processed data is split sub-data, and the sub-data is encrypted and pressurized, the data is collated before reading, and the specific data collating steps are as follows:
step S201, extracting the subdata and the key corresponding to the subdata;
step S202, the subdata is decrypted through a corresponding key, and the subdata is converted into a normal state from a compressed state after the decryption is finished;
step S203, merging the decrypted and decompressed subdata into a complete data message according to the marking sequence. A key (secret) refers to secret information used to perform cryptographic applications such as encryption, decryption, integrity verification, and the like. In symmetric cryptography (or key cryptography), the same key is used for encryption and decryption, and therefore the key needs to be kept secret. In public key cryptography (or asymmetric cryptography), the keys used for encryption and decryption are different: typically one is public, called the public key; the other is secret, called private key. The cryptosystem may be divided into a symmetric cryptosystem (also called a single-key cryptosystem, a secret key cryptosystem, a symmetric key cryptosystem) and an asymmetric cryptosystem (also called a double-key cryptosystem, a public key cryptosystem, an asymmetric key cryptosystem) according to whether an encryption key and a decryption key used in the cryptographic algorithm are the same or not and whether the decryption process can be derived from the key encryption process (or the encryption process can be derived from the decryption process). Symmetric key encryption, also known as private key encryption or session key encryption algorithm, is the use of the same key by both the sender and receiver of information to encrypt and decrypt data. Its most advantageous specification is that it is fast in encryption/decryption speed and suitable for encrypting large data volumes, so in practical applications, people usually combine both together, for example, a symmetric key encryption system is used to store large data information, and a public key encryption system is used to encrypt keys.
It should be noted that, in the embodiment of the present invention, the sub-data needs to be encrypted before being transmitted, and in the encryption process, because any sub-data is separate data information and is independently encrypted, each sub-data has its own key, and the key inherits the mark of the sub-data and is used as a part of the processing data of the database in the data transmission process to be transmitted to the request port along with the compressed and encrypted sub-data. In addition, in this embodiment, it can be understood that the sub-data file becomes an invalid file on the premise of no key, so that in the process of transmitting the processing data of the database to the request port, the key is used as the most superior transmission item to be superior to the transmission of the sub-data.
As shown in fig. 4, another preferred embodiment of the present invention is provided, when the data transmission process is interrupted and the subsequent content cannot be transmitted, an interruption emergency process is started, and the specific process steps are as follows:
step S301, decrypting and decompressing the received subdata, sequencing and combining the subdata according to the marks, and generating temporary data information;
step S302, extracting the mark information of the received subdata;
step S303, requesting the port to send an interrupt continuation request to the temporary database;
step S304, the temporary database continues to send the remaining subdata to the request port.
It can be understood that, in this embodiment, the interruption connection request includes the flag information of the sub-data that has been received by the request port, and the temporary database reads the flag information, so as to determine that the sub-data is not transmitted to the request port, thereby connecting the previous data transmission flow. It should be noted that, in this embodiment, when the data transmission is interrupted and the request port only receives the key information or part of the key information, the data transmission process is interrupted and the transmission request is retransmitted.
In another preferred embodiment of the present invention, when a part of data is missing due to a problem of network environment during data transmission, a corresponding missing emergency treatment is started, wherein the missing emergency treatment is specifically executed
The method comprises the following steps:
extracting the received mark information of the subdata or the key;
the request port sends a missing continuing request to the temporary database;
the temporary database continues to send the remaining child data to the requesting port.
The functions that can be realized by the data transmission method are all completed by computer equipment, the computer equipment comprises one or more processors and one or more memories, and at least one program code is stored in the one or more memories and is loaded and executed by the one or more processors to realize the functions of the power grid engineering design unit management method.
The processor fetches instructions and analyzes the instructions one by one from the memory, then completes corresponding operations according to the instruction requirements, generates a series of control commands, enables all parts of the computer to automatically, continuously and coordinately act to form an organic whole, realizes the input of programs, the input of data, the operation and the output of results, and the arithmetic operation or the logic operation generated in the process is completed by the arithmetic unit; the memory comprises a Read-only memory (ROM) for storing a computer program, and a protection device is arranged outside the memory.
Illustratively, a computer program can be partitioned into one or more modules, which are stored in memory and executed by a processor to implement the present invention. One or more of the modules may be a series of computer program instruction segments capable of performing certain functions, which are used to describe the execution of the computer program in the terminal device.
Those skilled in the art will appreciate that the above description of the service device is merely exemplary and not limiting of the terminal device, and may include more or less components than those described, or combine certain components, or different components, such as may include input output devices, network access devices, buses, etc.
The processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is the control center of the terminal equipment and connects the various parts of the entire user terminal using various interfaces and lines.
The memory may be used to store computer programs and/or modules, and the processor may implement various functions of the terminal device by operating or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory mainly comprises a storage program area and a storage data area, wherein the storage program area can store an operating system, application programs (such as an information acquisition template display function, a product information publishing function and the like) required by at least one function and the like; the storage data area may store data created according to the use of the berth-state display system (e.g., product information acquisition templates corresponding to different product types, product information that needs to be issued by different product providers, etc.), and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash memory card (FlashCard), at least one disk storage device, a flash memory device, or other volatile solid state storage device.
The terminal device integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the modules/units in the system according to the above embodiment may be implemented by a computer program, which may be stored in a computer-readable storage medium and used by a processor to implement the functions of the embodiments of the system. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer memory, Read-only memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the statement that "comprises an … …" limits an element of the specification to no more than one other element, and does not preclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (9)
1. A method for data transmission, said method comprising:
the database receives a transmission request, the transmission request comprises request port information and a data name needing to be accessed, the request port refers to a data terminal used for sending the transmission request, the data name in the transmission request refers to position information or retrieval information of data needing to be transmitted, the data information can be easily retrieved from the database through the data name, and the data names of any two data information are different;
the database extracts the data information and divides the data information into a plurality of sub-data, the integrity of the data is not damaged in the data dividing process, namely the data dividing process is a reversible process, and any sub-data after being divided can be used as independent data information;
the request port receives processing data from a database, wherein the processing data refers to compressed packet data after the sub data is compressed.
2. The data transmission method according to claim 1, wherein after the data information is extracted from the database and split into a plurality of sub-data, the data information needs to be encrypted and compressed for reducing the time required for subsequent data transmission and improving the security thereof, and the specific steps of processing the data information are as follows:
extracting the data information;
splitting data information into a plurality of sub data;
marking the subdata according to the content sequence of the subdata, wherein the marks are based on the content in the subdata, namely the content of the subdata with two adjacent marks can be continued, and any two subdata with adjacent marks can be combined into one subdata;
and encrypting and pressurizing the subdata, establishing a temporary database, and storing the encrypted and pressurized subdata in the temporary database.
3. A data transmission method according to claim 2, wherein the request port receives the processed data from the database, and since the processed data is split sub-data, and the sub-data is encrypted and compressed, the data is collated before being read, and the specific data collating steps are as follows:
extracting the subdata and the key corresponding to the subdata;
decrypting the subdata through a corresponding key, and converting the subdata from a compressed state to a normal state after the decryption is finished;
and merging the decrypted and decompressed sub-data into a complete data message according to the marking sequence.
4. A data transmission method according to claim 3, wherein the sub-data is encrypted before transmission, and during the encryption process, since any sub-data is a single data message and is independently encrypted, each sub-data has its own private key, and the private key inherits the mark of the sub-data and is transmitted to the request port as a part of the processing data of the database along with the compressed and encrypted sub-data.
5. The data transmission method of claim 4, wherein the key is used as the most preferred transmission item to be prioritized over the transmission of the sub-data during the transmission of the processing data of the database to the request port.
6. The data transmission method according to claim 1, wherein when the data transmission process is interrupted and the subsequent content cannot be transmitted, an interruption emergency process is started, and the specific process steps are as follows:
decrypting and decompressing the received subdata, and sequencing and combining the subdata according to the marks to generate temporary data information;
extracting the mark information of the received subdata;
the request port sends an interrupt continuation request to a temporary database;
the temporary database continues to send the remaining child data to the requesting port.
7. The data transmission method according to claim 6, wherein the connection interruption request includes flag information of the sub-data that the request port has received, and the temporary database reads the flag information to determine that the sub-data is not transmitted to the request port, so as to connect the previous data transmission process.
8. A data transmission method according to claim 1, wherein when part of data is missing due to a problem of network environment during data transmission, a corresponding missing emergency treatment is started, and the missing emergency treatment comprises the following specific steps:
extracting the received mark information of the subdata or the key;
the request port sends a missing continuing request to the temporary database;
the temporary database continues to send the remaining child data to the requesting port.
9. A data transmission method according to claim 7, wherein when the data transmission is interrupted and the requesting port receives only the key information or part of the key information, the data transmission process is interrupted and the transmission request is retransmitted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111301107.6A CN114401101A (en) | 2021-11-04 | 2021-11-04 | Data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111301107.6A CN114401101A (en) | 2021-11-04 | 2021-11-04 | Data transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114401101A true CN114401101A (en) | 2022-04-26 |
Family
ID=81225852
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111301107.6A Pending CN114401101A (en) | 2021-11-04 | 2021-11-04 | Data transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114401101A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110944012A (en) * | 2019-12-16 | 2020-03-31 | 西安电子科技大学 | Anti-protocol analysis data secure transmission method, system and information data processing terminal |
CN111107245A (en) * | 2019-12-26 | 2020-05-05 | 合肥道正企智大数据有限公司 | Efficient interrupt recoverable image hiding encryption transmission method, device and system |
CN111552899A (en) * | 2020-03-20 | 2020-08-18 | 广联达科技股份有限公司 | Method and system for improving display performance of front-end report |
CN111698253A (en) * | 2020-06-13 | 2020-09-22 | 郑州智利信信息技术有限公司 | Computer network safety system |
WO2020237868A1 (en) * | 2019-05-24 | 2020-12-03 | 平安科技(深圳)有限公司 | Data transmission method, electronic device, server and storage medium |
-
2021
- 2021-11-04 CN CN202111301107.6A patent/CN114401101A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020237868A1 (en) * | 2019-05-24 | 2020-12-03 | 平安科技(深圳)有限公司 | Data transmission method, electronic device, server and storage medium |
CN110944012A (en) * | 2019-12-16 | 2020-03-31 | 西安电子科技大学 | Anti-protocol analysis data secure transmission method, system and information data processing terminal |
CN111107245A (en) * | 2019-12-26 | 2020-05-05 | 合肥道正企智大数据有限公司 | Efficient interrupt recoverable image hiding encryption transmission method, device and system |
CN111552899A (en) * | 2020-03-20 | 2020-08-18 | 广联达科技股份有限公司 | Method and system for improving display performance of front-end report |
CN111698253A (en) * | 2020-06-13 | 2020-09-22 | 郑州智利信信息技术有限公司 | Computer network safety system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11290252B2 (en) | Compression and homomorphic encryption in secure query and analytics | |
CN109150499B (en) | Method and device for dynamically encrypting data, computer equipment and storage medium | |
CN108989287B (en) | Encryption method, device, terminal equipment and storage medium | |
US7751556B2 (en) | Apparatus and method of generating falsification detecting data of encrypted data in the course of process | |
CN112491832B (en) | File transmission method and device | |
CN105721156A (en) | General Encoding Functions For Modular Exponentiation Encryption Schemes | |
CN108737353B (en) | Data encryption method and device based on data analysis system | |
CN113014580A (en) | File transmission method and device, electronic equipment and storage medium | |
CN110662089A (en) | Bullet screen receiving and processing method, storage medium, electronic equipment and system | |
CN102231181B (en) | Computer system used for file encryption and file encryption method | |
CN116541320B (en) | Intelligent IO module bus communication method, IO module, terminal and medium | |
CN111431873A (en) | Method, system, device and medium for reporting information | |
US20070263876A1 (en) | In-memory compression and encryption | |
CN114401101A (en) | Data transmission method | |
CN113704206B (en) | Metadata processing method and device, electronic equipment and storage medium | |
EP4020265A1 (en) | Method and device for storing encrypted data | |
CN114117488A (en) | File management method, file uploading method, file decryption method and related equipment | |
KR20130020231A (en) | Copyright protection system for web applications | |
JP2003304237A (en) | Method for creating common key, encryption method using the common key, method for managing common key, method for authentifying solid by solid number of terminal, program for executing these methods, and application software including the program | |
KR100452766B1 (en) | Method for cryptographing a information | |
CN113434845B (en) | Business handling method and device, electronic equipment and computer readable storage medium | |
CN114679324B (en) | Data exchange method, tool, system, equipment and medium | |
CN108984315B (en) | Application data processing method and device, terminal and readable medium | |
US11811920B1 (en) | Secure computation and communication | |
CN117714078A (en) | Block chain group hidden transmission communication method, system and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |