CN117527793A - Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth - Google Patents

Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth Download PDF

Info

Publication number
CN117527793A
CN117527793A CN202410010783.5A CN202410010783A CN117527793A CN 117527793 A CN117527793 A CN 117527793A CN 202410010783 A CN202410010783 A CN 202410010783A CN 117527793 A CN117527793 A CN 117527793A
Authority
CN
China
Prior art keywords
data
transmission
state
encryption protocol
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410010783.5A
Other languages
Chinese (zh)
Other versions
CN117527793B (en
Inventor
胡玉晟
郭厥论
吴燕松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baiyu Information Technology Shanghai Co ltd
Baike Data Technology Shenzhen Co ltd
Original Assignee
Baiyu Information Technology Shanghai Co ltd
Baike Data Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baiyu Information Technology Shanghai Co ltd, Baike Data Technology Shenzhen Co ltd filed Critical Baiyu Information Technology Shanghai Co ltd
Priority to CN202410010783.5A priority Critical patent/CN117527793B/en
Publication of CN117527793A publication Critical patent/CN117527793A/en
Application granted granted Critical
Publication of CN117527793B publication Critical patent/CN117527793B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/164Adaptation or special uses of UDP protocol

Abstract

The invention discloses a breakpoint continuous transmission method, a breakpoint continuous transmission device, a terminal and a storage medium based on an encryption protocol bandwidth, wherein the method comprises the following steps: acquiring a transmission state of a data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state; determining first data transmitted by a data transmission process before abnormal time information based on the abnormal time information, and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted completely; and when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data. The invention can realize breakpoint continuous transmission when the data transmission process is interrupted, ensure that the data receiving end can receive complete data, and adopt the encryption protocol bandwidth to detect the abnormality of data transmission in real time, realize encryption transmission of the data and ensure the data safety.

Description

Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a breakpoint continuous transmission method, device, terminal, and medium based on an encryption protocol bandwidth.
Background
At present, the internet is rapid in internet interconnection development, information interaction in the internet is more and more frequent, files are used as important carriers of information resources and are frequently transmitted between a client side and a server side of the internet; for example, in the internet of things, system upgrade data, configuration data and the like of various terminal sensing devices are transmitted through various connection modes, such as a wired network, a 4G network, WIFI, bluetooth and other communication modes. However, the increase of communication modes and the increase of communication pressure lead to unstable or interrupted network during the data transmission process, which requires retransmission of data. Aiming at the situation that the data needs to be retransmitted, the support of breakpoint continuous transmission in data transmission is particularly necessary to avoid network resource waste caused by frequent data transmission.
However, in the prior art, the encryption cannot be realized by the protocol bandwidth (such as http and ftp protocols), the data transmission performance is also poor, and especially when the data breakpoint continuous transmission is performed, the requirement of data transmission cannot be met.
Accordingly, there is a need for improvement and advancement in the art.
Disclosure of Invention
The invention aims to solve the technical problems that the encryption protocol bandwidth cannot be realized, the data transmission performance is poor, and especially the data transmission requirement cannot be met when the data breakpoint continuous transmission is carried out.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
in a first aspect, the present invention provides a breakpoint resume method based on an encryption protocol bandwidth, where the method includes:
acquiring a transmission state of a data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state;
determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information, and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted;
and when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth, wherein the encryption protocol bandwidth comprises a UDP protocol and an encryption type.
In one implementation, the acquiring the transmission state of the data transmission process includes:
controlling the data transmission process to continuously transmit the first data based on the encryption protocol bandwidth, and encrypting the first data while transmitting the first data;
continuously monitoring whether the data receiving end receives the first data or not;
if the data receiving end receives the first data, determining that the transmission state is a normal state;
and if the data receiving end does not receive the first data, determining that the transmission state is an abnormal state.
In one implementation, the determining, based on the abnormal time information, the first data that has been transmitted by the data transmission process before the abnormal time information includes:
determining the transmission progress of the data transmission process based on the abnormal time information;
and determining the first data transmitted before the abnormal time information according to the transmission progress.
In one implementation, the determining missing data based on the transmitted first data includes:
acquiring a target transmission amount corresponding to the data transmission process, wherein the target transmission amount is the transmission amount to be completed by the data transmission process;
and determining missing data based on the target transmission quantity and the transmitted first data.
In one implementation manner, when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth includes:
monitoring the transmission state in real time, and sending a continuous transmission request to a data receiving end when the transmission state is monitored to be switched from an abnormal state to a normal state;
and receiving confirmation information which is made by the data receiving end based on the continuous transmission request, acquiring the missing data according to the confirmation information, and continuing to transmit the missing data based on the encryption protocol bandwidth.
In one implementation, the continuing the transmission of the missing data based on the encryption protocol bandwidth includes:
obtaining broken bit data in the missing data, wherein the broken bit data is data of a breakpoint position corresponding to the abnormal moment information;
transmitting the broken bit data to a data receiving end based on the encryption protocol bandwidth;
after the data receiving end is controlled to receive the broken bit data, the broken bit data is compared with the transmitted first data, and whether repeated data exist or not is determined;
if the repeated data exist, discarding the broken bit data, and acquiring the data after the breakpoint position from the missing data for transmission.
In one implementation, the method further comprises:
and acquiring a network state in real time, controlling the data transmission process to suspend data transmission when the network state is judged to be a congestion state, and controlling the data transmission process to resume data transmission when the network state is judged to be a allowance state.
In a second aspect, an embodiment of the present invention further provides a breakpoint resume device based on an encryption protocol bandwidth, where the device includes:
the abnormal time determining module is used for acquiring the transmission state of the data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state;
the missing data determining module is used for determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted completely;
and the breakpoint continuous transmission module is used for controlling the data transmission process to continue transmitting the missing data based on the encryption protocol bandwidth when the transmission state is a normal state.
In a third aspect, an embodiment of the present invention further provides a terminal, where the terminal includes a memory, a processor, and a breakpoint resume program based on an encryption protocol bandwidth stored in the memory and capable of running on the processor, and when the processor executes the breakpoint resume program based on the encryption protocol bandwidth, the processor implements the steps of the breakpoint resume method based on the encryption protocol bandwidth in any one of the above schemes.
In a fourth aspect, an embodiment of the present invention further provides a computer readable storage medium, where the computer readable storage medium stores a breakpoint resume program based on an encryption protocol bandwidth, and when the breakpoint resume program based on the encryption protocol bandwidth is executed by a processor, the steps of the breakpoint resume method based on the encryption protocol bandwidth according to any one of the above schemes are implemented.
The beneficial effects are that: compared with the prior art, the invention provides a breakpoint continuous transmission method based on an encryption protocol bandwidth, which comprises the steps of firstly acquiring a transmission state of a data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state; determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information, and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted; and when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth. The invention can realize breakpoint continuous transmission when the data transmission process is interrupted, ensure that the data receiving end can receive complete data, and adopt the encryption protocol bandwidth to detect the abnormality of data transmission in real time, realize encryption transmission of the data and ensure the data safety.
Drawings
Fig. 1 is a flowchart of a specific implementation of a breakpoint resume method based on an encryption protocol bandwidth according to an embodiment of the present invention.
Fig. 2 is a functional schematic diagram of a breakpoint resume device based on an encryption protocol bandwidth according to an embodiment of the present invention.
Fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and effects of the present invention clearer and more specific, the present invention will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment provides a breakpoint continuous transmission method based on an encryption protocol bandwidth, which can realize breakpoint continuous transmission when a data transmission process is interrupted, and ensure that a data receiving end can receive complete data. Specifically, the embodiment may first acquire a transmission state of a data transmission process, and record, when the transmission state is an abnormal state, abnormal time information, where the abnormal time information is used to reflect a time when the abnormal state occurs. Then, based on the abnormal time information, first data which is transmitted before the abnormal time information by the data transmission process is determined, and based on the transmitted first data, missing data is determined, wherein the missing data is data which is not transmitted yet. And finally, when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth. The embodiment adopts the encryption protocol bandwidth, so that the abnormality of data transmission can be detected in real time, the encryption transmission of the data can be realized, and the data security is ensured.
The breakpoint continuous transmission method based on the encryption protocol bandwidth can be applied to a terminal, and the terminal can be an intelligent product terminal such as a computer and a mobile phone. As shown in fig. 1, the breakpoint continuous transmission method based on the encryption protocol bandwidth includes the following steps:
step S100, acquiring a transmission state of a data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state.
In this embodiment, there is at least one data transmitting end and one data receiving end, and the data transmitting end transmits data to the data receiving end. When data transmission is performed, the embodiment may implement obtaining a transmission state of a data transmission process, where the transmission state reflects whether the data transmission process is normal at the time, and if the transmission state is an abnormal state, the transmission state is interrupted at the time, and the terminal may record abnormal time information, where the abnormal time information is used to reflect a time when the abnormal state occurs, so as to implement breakpoint continuous transmission in a subsequent step.
In one implementation manner, when acquiring a transmission state of a data transmission process, the embodiment includes the following steps:
step S101, controlling the data transmission process to continuously transmit the first data based on the encryption protocol bandwidth, and encrypting the first data while transmitting the first data;
step S102, continuously monitoring whether a data receiving end receives the first data;
step S103, if the data receiving end receives the first data, determining that the transmission state is a normal state;
step S104, if the data receiving end does not receive the first data, determining that the transmission state is an abnormal state.
Specifically, the encryption protocol bandwidth of the embodiment includes user datagram protocol (UDP, user Datagram Protocol), and the UDP protocol provides a method for sending an encapsulated data packet without establishing a connection, so that the transmission speed is fast by fully utilizing the fast data packet sending performance of the UDP protocol, the next message can be transferred without the response of the receiver, and the network bandwidth can be used for file data transmission to the greatest extent. In addition, the encryption protocol bandwidth of the present embodiment further includes an encryption type reflecting an algorithm type for encrypting data at the time of data transmission, such as an MD5 encryption algorithm or a DES encryption algorithm. When data transmission is performed, the embodiment controls the data transmission process to continuously transmit first data based on the encryption protocol bandwidth, and performs encryption processing on the first data while transmitting the first data so as to ensure the safety of data transmission. If the data receiving end receives the first data, the transmission state of the data transmission process is a normal state, and if the data receiving end receives the first data, the data transmission is interrupted, so that the transmission state of the data transmission process can be determined to be an abnormal state. When it is determined that the transmission state is an abnormal state, the present embodiment may record abnormal time information reflecting the time at which the abnormal state occurs, that is, the time at which the interruption of the recording data occurs, so that the breakpoint resume is performed based on the abnormal time information in the subsequent step.
Step 200, determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information, and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted completely.
When the abnormal time information is obtained, the terminal of the present embodiment may determine, based on the abnormal time information, first data that has been transmitted by the data transmission process before the abnormal time information, that is, determine the amount of data that has been transmitted before the interruption of data transmission occurs. The terminal may then determine, based on the transmitted first data, that data not transmitted is found, i.e. missing data. The missing data in this embodiment is the data that needs to be transmitted in a breakpoint in the subsequent step, so as to ensure the integrity of the data.
In one implementation manner, the method specifically includes the following steps when acquiring missing data:
step S201, determining the transmission progress of the data transmission process based on the abnormal time information;
step S22, determining first data transmitted before the abnormal time information according to the transmission progress;
step 203, obtaining a target transmission amount corresponding to the data transmission process, where the target transmission amount is a transmission amount to be completed by the data transmission process;
step S204, determining missing data based on the target transmission quantity and the transmitted first data.
Specifically, the terminal is firstly based on a target transmission amount corresponding to a data transmission process, wherein the target transmission amount is the transmission amount to be completed by the data transmission process. The data transmission duration can be estimated based on the target transmission amount, and of course, the data transmission duration is affected by the broadband state. The data transmission duration of the embodiment is estimated based on the fact that the broadband state is normal (i.e. the network is not congested), so that the data transmission duration is ideal, along with the progress of data transmission, when abnormal time information is recorded, the actual duration of data transmission can be determined, then the transmission progress of a data transmission process is determined based on the proportion of the actual duration to the estimated data transmission duration, and further, the first data transmitted before the abnormal time information is determined according to the transmission progress. In another implementation manner, after obtaining the abnormal time information, the embodiment can obtain the actual time of data transmission, and then obtain the transmission progress of the data transmission process based on the data transmission speed and the actual time of data transmission, so that it can be determined which data are already transmitted and which data are not already transmitted in the data transmission process. Therefore, the present embodiment determines missing data based on the target transmission amount of the data transmission process and the transmitted first data, the missing data being the target transmission amount minus the transmitted first data. The embodiment determines that missing data is beneficial to realizing breakpoint continuous transmission in a subsequent step.
And step S300, when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth.
When determining that the missing data is in the normal state, the embodiment controls the data transmission process to continue transmitting the missing data based on the encryption protocol bandwidth, thereby ensuring that the data which is not transmitted due to interruption can be transmitted to the data receiving end in time and ensuring the integrity of data transmission.
In one implementation manner, when the missing data is breakpoint continuous, the method includes the following steps:
step S301, monitoring the transmission state in real time, and sending a continuous transmission request to a data receiving end when the transmission state is monitored to be switched from an abnormal state to a normal state;
step S302, receiving confirmation information made by the data receiving end based on the continuous transmission request, acquiring the missing data according to the confirmation information, and continuing to transmit the missing data based on the encryption protocol bandwidth.
Specifically, the terminal of this embodiment monitors the transmission state in real time, and when it is monitored that the transmission state is switched from an abnormal state to a normal state, sends a continuous transmission request to the data receiving end. The retransmission request is used to reflect the intention that the data transmission needs to be continued at this time. After receiving the continuous transmission request, the data receiving end can firstly verify the continuous transmission request, and the purpose of verification is to determine whether the continuous transmission request is a request sent by the data sending end for continuing data transmission so as to be confused with the requests sent by other terminals. In addition, after the continuous transmission request is verified, the embodiment confirms the continuous transmission request and feeds back confirmation information to the data sending end so as to inform the data sending end of continuous transmission of data. In addition, in another implementation manner, when the data receiving end sends a continuous transmission request, the continuous transmission request may carry a data identifier, where the data identifier is an identifier of missing data, that is, an identifier of data that needs to be transmitted by the data transmission process. After the data receiving end receives the continuous transmission request, the continuous transmission request is analyzed to obtain the data identification, and based on the data identification, the data receiving end can determine that the data needing continuous transmission at the moment is data which is not transmitted because of interruption, and based on the data identification, the data receiving end feeds back confirmation information to the data sending end so as to inform the data sending end of continuous transmission of the data. Then, the embodiment may acquire the missing data according to the acknowledgement information, and continue to transmit the missing data based on the encryption protocol bandwidth.
In one implementation manner, when the missing data is transmitted, the embodiment first obtains broken bit data in the missing data, where the broken bit data is data of a breakpoint position corresponding to the abnormal moment information, that is, a position where the data transmission process is interrupted. Then, the embodiment transmits the broken bit data to a data receiving end based on the encryption protocol bandwidth, and controls the data receiving end to compare the broken bit data with the transmitted first data after receiving the broken bit data, so as to determine whether repeated data exists. The purpose of determining whether repeated data exists is to achieve seamless continuous transmission of the data, and avoid waste of bandwidth resources due to repeated data transmission. If there is duplicate data, the broken bit data is the data which has been transmitted to the data receiving end before, then the broken bit data is abandoned, and the data after the break point position is obtained from the missing data for transmission, thereby realizing seamless continuous transmission.
In one implementation, this embodiment also supports data out-of-order delivery. The present embodiment can record the position information of each data reflecting the position of each data in the entire data packet. In the data transmission stage, the data can be transmitted in a multithreading way without considering the sequence among the transmitted data, and the data receiving end can reconstruct according to the position information carried by each data, thereby obtaining complete data. Based on this, in this embodiment, when breakpoint continuous transmission is performed, the missing data may be subjected to segmentation processing to obtain a plurality of data fragments, where each data fragment corresponds to one piece of location information, and in this embodiment, the data fragments may be transmitted in a multithreading manner, and then the data receiving end may perform recombination according to the location information carried by each data fragment, so as to obtain complete missing data, and improve the efficiency of data transmission.
In another implementation manner, the embodiment may further acquire a network state in real time, and control the data transmission process to suspend data transmission when the network state is determined to be a congestion state, and control the data transmission process to resume data transmission when the network state is determined to be a allowance state, so as to perform data transmission based on different network states, and ensure the efficiency and the integrity of data transmission.
It can be seen that, in this embodiment, a transmission state of a data transmission process is first obtained, and when the transmission state is an abnormal state, abnormal time information is recorded, where the abnormal time information is used to reflect a time when the abnormal state occurs; determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information, and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted; and when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth. The embodiment can realize breakpoint continuous transmission when the data transmission process is interrupted, so that the data receiving end can receive complete data, and the encryption protocol bandwidth is adopted, so that the abnormality of data transmission can be detected in real time, encryption transmission of the data can be realized, and the data safety is ensured.
Based on the above embodiment, the present invention further provides a breakpoint resume device based on an encryption protocol bandwidth, as shown in fig. 2, where the device includes: abnormal time determination module 10, missing data determination module 20, and missing data determination module 30. Specifically, the abnormal time determining module 10 is configured to obtain a transmission state of a data transmission process, and record abnormal time information when the transmission state is an abnormal state, where the abnormal time information is used to reflect a time when the abnormal state occurs. The missing data determining module 20 is configured to determine, based on the abnormal time information, first data that has been transmitted by the data transmission process before the abnormal time information, and determine missing data based on the first data that has been transmitted, where the missing data is data that has not been transmitted. The breakpoint resume module 30 is configured to control the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth when the transmission state is a normal state, where the encryption protocol bandwidth includes a UDP protocol and an encryption type.
In one implementation, the constant time determination module 10 includes:
a data encryption transmission unit, configured to control the data transmission process to continuously transmit the first data based on the encryption protocol bandwidth, and perform encryption processing on the first data while transmitting the first data;
the data receiving determining unit is used for continuously monitoring whether the data receiving end receives the first data or not;
a normal state determining unit, configured to determine that the transmission state is a normal state if the data receiving end receives the first data;
and the abnormal state determining unit is used for determining that the transmission state is an abnormal state if the data receiving end does not receive the first data.
In one implementation, the missing data determination module 20 includes:
a transmission progress determining unit configured to determine a transmission progress of the data transmission process based on the abnormal time information;
and the first data determining unit is used for determining the first data transmitted before the abnormal time information according to the transmission progress.
In one implementation, the missing data determination module 20 includes:
a target transmission amount determining unit, configured to obtain a target transmission amount corresponding to the data transmission process, where the target transmission amount is a transmission amount to be completed by the data transmission process;
and the missing data determining unit is used for determining missing data based on the target transmission quantity and the transmitted first data.
In one implementation, the breakpoint resume module 30 includes:
the request sending unit is used for monitoring the transmission state in real time, and sending a continuous transmission request to the data receiving end when the transmission state is monitored to be switched from the abnormal state to the normal state;
and the data continuous transmission unit is used for receiving the confirmation information which is made by the data receiving end based on the continuous transmission request, acquiring the missing data according to the confirmation information, and continuously transmitting the missing data based on the encryption protocol bandwidth.
In one implementation, the data relay unit includes:
the broken bit data determining subunit is used for acquiring broken bit data in the missing data, wherein the broken bit data is data of a breakpoint position corresponding to the abnormal moment information;
a broken bit data transmission subunit, configured to transmit the broken bit data to a data receiving end based on the encryption protocol bandwidth;
the repeated data judging subunit is used for controlling the data receiving end to compare the broken bit data with the transmitted first data after receiving the broken bit data and determining whether repeated data exist or not;
and the data breakpoint continuous transmission subunit is used for discarding the broken bit data if the repeated data exists, and acquiring the data after the breakpoint position from the missing data for transmission.
In one implementation, the apparatus further comprises:
the data transmission control module is used for acquiring a network state in real time, controlling the data transmission process to pause data transmission when the network state is judged to be a congestion state, and controlling the data transmission process to resume data transmission when the network state is judged to be a allowance state.
The working principle of each module in the breakpoint continuous transmission device based on the encryption protocol bandwidth in this embodiment is the same as the principle of each step in the above method embodiment, and will not be described here again.
Based on the above embodiment, the present invention also provides a terminal, and a schematic block diagram of the terminal may be shown in fig. 3. The terminal may include one or more processors 100 (only one shown in fig. 3), a memory 101, and a computer program 102 stored in the memory 101 and executable on the one or more processors 100, such as a breakpoint resume program based on an encryption protocol bandwidth. The one or more processors 100, when executing the computer program 102, may implement the various steps in embodiments of a breakpoint resume method based on the encryption protocol bandwidth. Alternatively, the functions of the modules/units in the embodiment of the breakpoint resume device based on the encryption protocol bandwidth may be implemented by the one or more processors 100 when executing the computer program 102, which is not limited herein.
In one embodiment, the processor 100 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In one embodiment, the memory 101 may be an internal storage unit of the electronic device, such as a hard disk or a memory of the electronic device. The memory 101 may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash card (flash card) or the like, which are provided on the electronic device. Further, the memory 101 may also include both an internal storage unit and an external storage device of the electronic device. The memory 101 is used to store computer programs and other programs and data required by the terminal. The memory 101 may also be used to temporarily store data that has been output or is to be output.
It will be appreciated by those skilled in the art that the functional block diagram shown in fig. 3 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the terminal to which the present inventive arrangements may be applied, as a specific terminal may include more or less components than those shown, or may be combined with some components, or may have a different arrangement of components.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of a computer program, which may be stored on a non-transitory computer readable storage medium, that when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, operational database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual operation data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A breakpoint resume method based on an encryption protocol bandwidth, the method comprising:
acquiring a transmission state of a data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state, and the encryption protocol bandwidth comprises a UDP protocol and an encryption type;
determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information, and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted;
and when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on an encryption protocol bandwidth.
2. The method for breakpoint resume based on encryption protocol bandwidth according to claim 1, wherein the step of obtaining the transmission state of the data transmission process comprises:
controlling the data transmission process to continuously transmit the first data based on the encryption protocol bandwidth, and encrypting the first data while transmitting the first data;
continuously monitoring whether the data receiving end receives the first data or not;
if the data receiving end receives the first data, determining that the transmission state is a normal state;
and if the data receiving end does not receive the first data, determining that the transmission state is an abnormal state.
3. The method according to claim 1, wherein determining, based on the abnormal time information, first data that the data transmission process has transmitted before the abnormal time information, comprises:
determining the transmission progress of the data transmission process based on the abnormal time information;
and determining the first data transmitted before the abnormal time information according to the transmission progress.
4. The method of claim 3, wherein determining missing data based on the transmitted first data comprises:
acquiring a target transmission amount corresponding to the data transmission process, wherein the target transmission amount is the transmission amount to be completed by the data transmission process;
and determining missing data based on the target transmission quantity and the transmitted first data.
5. The method for breakpoint resume based on an encryption protocol bandwidth according to claim 1, wherein when the transmission state is a normal state, controlling the data transmission process to continue transmitting the missing data based on the encryption protocol bandwidth, comprises:
monitoring the transmission state in real time, and sending a continuous transmission request to a data receiving end when the transmission state is monitored to be switched from an abnormal state to a normal state;
and receiving confirmation information which is made by the data receiving end based on the continuous transmission request, acquiring the missing data according to the confirmation information, and continuing to transmit the missing data based on the encryption protocol bandwidth.
6. The method for breakpoint resume based on an encryption protocol bandwidth according to claim 5, wherein the continuing the transmission of the missing data based on the encryption protocol bandwidth comprises:
obtaining broken bit data in the missing data, wherein the broken bit data is data of a breakpoint position corresponding to the abnormal moment information;
transmitting the broken bit data to a data receiving end based on the encryption protocol bandwidth;
after the data receiving end is controlled to receive the broken bit data, the broken bit data is compared with the transmitted first data, and whether repeated data exist or not is determined;
if the repeated data exist, discarding the broken bit data, and acquiring the data after the breakpoint position from the missing data for transmission.
7. The encryption protocol bandwidth-based breakpoint resume method according to claim 1, further comprising:
and acquiring a network state in real time, controlling the data transmission process to suspend data transmission when the network state is judged to be a congestion state, and controlling the data transmission process to resume data transmission when the network state is judged to be a allowance state.
8. A breakpoint resume device based on an encryption protocol bandwidth, the device comprising:
the abnormal time determining module is used for acquiring the transmission state of the data transmission process, and recording abnormal time information when the transmission state is an abnormal state, wherein the abnormal time information is used for reflecting the occurrence time of the abnormal state;
the missing data determining module is used for determining first data transmitted by the data transmission process before the abnormal time information based on the abnormal time information and determining missing data based on the transmitted first data, wherein the missing data is data which is not transmitted completely;
and the breakpoint continuous transmission module is used for controlling the data transmission process to continue transmitting the missing data based on the encryption protocol bandwidth when the transmission state is a normal state.
9. A terminal comprising a memory, a processor and an encryption protocol bandwidth based breakpoint resume program stored in the memory and operable on the processor, the processor implementing the steps of the encryption protocol bandwidth based breakpoint resume method of any of claims 1-7 when executing the encryption protocol bandwidth based breakpoint resume program.
10. A computer readable storage medium, wherein a breakpoint resume program based on an encryption protocol bandwidth is stored on the computer readable storage medium, and when the breakpoint resume program based on the encryption protocol bandwidth is executed by a processor, the steps of the breakpoint resume method based on the encryption protocol bandwidth are implemented as claimed in any one of claims 1 to 7.
CN202410010783.5A 2024-01-04 2024-01-04 Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth Active CN117527793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410010783.5A CN117527793B (en) 2024-01-04 2024-01-04 Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410010783.5A CN117527793B (en) 2024-01-04 2024-01-04 Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth

Publications (2)

Publication Number Publication Date
CN117527793A true CN117527793A (en) 2024-02-06
CN117527793B CN117527793B (en) 2024-04-02

Family

ID=89751631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410010783.5A Active CN117527793B (en) 2024-01-04 2024-01-04 Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth

Country Status (1)

Country Link
CN (1) CN117527793B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035858A (en) * 2009-09-27 2011-04-27 华为技术有限公司 Method and device for controlling file breakpoint continuous transmission
CN102761614A (en) * 2012-06-29 2012-10-31 浪潮(北京)电子信息产业有限公司 Method and system for realizing breakpoint resume of network data transmission
CN112203138A (en) * 2020-10-16 2021-01-08 深圳乐播科技有限公司 Projection screen data transmission method, device, equipment and storage medium based on UDP protocol

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035858A (en) * 2009-09-27 2011-04-27 华为技术有限公司 Method and device for controlling file breakpoint continuous transmission
CN102761614A (en) * 2012-06-29 2012-10-31 浪潮(北京)电子信息产业有限公司 Method and system for realizing breakpoint resume of network data transmission
CN112203138A (en) * 2020-10-16 2021-01-08 深圳乐播科技有限公司 Projection screen data transmission method, device, equipment and storage medium based on UDP protocol

Also Published As

Publication number Publication date
CN117527793B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
KR20130082070A (en) Communication apparatus and communication method
CN110460412B (en) Method and RDMA network card for data transmission
KR20090094362A (en) Providing secure inter-application communication for a mobile operating environment
WO2022017529A1 (en) Data transmission method and system, electronic device, and storage medium
CN105379164A (en) Methods and apparatuses for transmitting and receiving data and recording medium for executing the methods
CN116527593B (en) Network traffic congestion control method and related device
US11316930B2 (en) Connection control method and device
CN111181698B (en) Data processing method, device, equipment and medium
CN109120385B (en) Data transmission method, device and system based on data transmission system
CN117527793B (en) Breakpoint continuous transmission method, device, terminal and medium based on encryption protocol bandwidth
CN108124504B (en) TFO transmission method, proxy server and system
CN111522571B (en) Equipment upgrading method and device, terminal equipment and storage medium
US10785306B1 (en) Data transmission and network interface controller
CN107409427A (en) The data transmission method and device of a kind of data service
CN112118594A (en) Data uploading method, data downloading method, electronic equipment and storage medium
CN111818582A (en) Data transmission method and device and electronic equipment
CN108429700B (en) Method and device for sending message
CN114553375A (en) Data transmission method and device, electronic equipment and storage medium
CN111669431B (en) Message transmission method and device, computer equipment and storage medium
US10750383B2 (en) Method of providing management and control of hotspots with reduced messaging
CN110649993B (en) Method for quickly confirming frame
CN112118273B (en) Data interaction method, system and first client
US11165870B2 (en) Connection control method and device
JP6863274B2 (en) Transmitters and their control methods, communication systems, and communication control programs
ZA200605982B (en) Methods and apparatus to optimize delivery of multicast content using probabilistic feedback

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant