WO2021047246A1 - Data transmission method and apparatus, terminal device and storage medium - Google Patents

Data transmission method and apparatus, terminal device and storage medium Download PDF

Info

Publication number
WO2021047246A1
WO2021047246A1 PCT/CN2020/098725 CN2020098725W WO2021047246A1 WO 2021047246 A1 WO2021047246 A1 WO 2021047246A1 CN 2020098725 W CN2020098725 W CN 2020098725W WO 2021047246 A1 WO2021047246 A1 WO 2021047246A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
terminal device
sub
network slice
data transmission
Prior art date
Application number
PCT/CN2020/098725
Other languages
French (fr)
Chinese (zh)
Inventor
刘维维
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2021047246A1 publication Critical patent/WO2021047246A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • H04W28/065Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information using assembly or disassembly of packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the embodiments of the present disclosure relate to, but are not limited to, the field of communications, and in particular to a data transmission method, device, terminal device, and storage medium.
  • the Internet has brought great convenience to people's lives. While people enjoy the convenient access to information on the Internet, there are hidden dangers in information security. Users will use network resources for data transmission. For the data transmission party, the transmitted data is likely to be very confidential materials, such as the company’s financial expenditure status, project applications, and R&D documents. The security of the data transmission process is very high. important. However, some lawbreakers use hidden network resources to illegally steal transmitted data to achieve specific purposes, causing the data transmission party to suffer huge economic losses.
  • embodiments of the present disclosure provide a data transmission method, device, terminal device, and storage medium.
  • an embodiment of the present disclosure provides a data transmission method, including: a first terminal device splits the data to be transmitted into multiple sub-data according to a set splitting rule; and inserts the sub-data into a network slice , Sending the network slice carrying the sub-data to the second terminal device.
  • embodiments of the present disclosure provide a data transmission method, including: receiving a network slice carrying sub-data sent by a first terminal device; and generating the network slice carrying the sub-data according to a split rule Complete data transmitted by the first terminal device.
  • an embodiment of the present disclosure provides a data transmission device, including: a splitting module, configured to split the data to be transmitted into multiple sub-data according to a set splitting rule by the first terminal device; and a sending module And configured to insert the sub-data into a network slice, and send the network slice carrying the sub-data to a second terminal device.
  • an embodiment of the present disclosure provides a data transmission device, including: a receiving module configured to receive a network slice carrying sub-data sent by a first terminal device; and a generating module configured to divide The network slice carrying the sub-data generates complete data transmitted by the first terminal device.
  • embodiments of the present disclosure provide a terminal device, including: a processor and a memory, and the processor is configured to execute a data transmission program stored in the memory to implement any one of the first aspect or the second aspect described above.
  • the data transmission method described in item including: a processor and a memory, and the processor is configured to execute a data transmission program stored in the memory to implement any one of the first aspect or the second aspect described above. The data transmission method described in item.
  • embodiments of the present disclosure provide a storage medium that stores one or more programs, and the one or more programs can be executed by one or more processors to implement the first aspect or The data transmission method of any one of the second aspect.
  • FIG. 1 is a schematic flowchart of a data transmission method provided by an embodiment of the disclosure
  • FIG. 2 is a schematic diagram of signaling interaction of a data transmission method provided by an embodiment of the disclosure
  • FIG. 3 is a schematic structural diagram of a data transmission device provided by an embodiment of the disclosure.
  • FIG. 4 is a schematic structural diagram of another data transmission device provided by an embodiment of the disclosure.
  • FIG. 5 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure.
  • FIG. 6 is a schematic structural diagram of another terminal device provided by an embodiment of the disclosure.
  • FIG. 1 is a schematic flowchart of a data transmission method provided by an embodiment of the disclosure. As shown in FIG. 1, the method specifically includes:
  • the first terminal device splits the data to be transmitted into multiple sub-data according to the set splitting rule.
  • the data transmission method of this embodiment is applied to end-to-end short-distance transmission of terminal devices in a 5G network, such as data transmission between two terminal devices in the same cell of a base station.
  • the transmission method uses network slicing technology and does not pass through the base station. Direct data transmission between the two terminals reduces the transmission delay through the base station. Improve the end-to-end transmission rate through network slicing technology.
  • the sending end and the receiving end are determined before data transmission.
  • the first terminal device is used as the data sending end
  • the second terminal device is used as the data receiving end.
  • both the first terminal device and the second terminal device involved in this embodiment have the functions of sending and receiving data.
  • the first terminal device and the second terminal device may be, but are not limited to: 5G smart phones, 5G smart phones, and 5G smart phones. Bracelet etc.
  • the split rule of the data to be transmitted is preset, and the split rule is stored in the terminal.
  • the split rule can be the split size of the data, the split quantity of the data, and so on.
  • the first terminal When performing data transmission, the first terminal splits the data to be transmitted into multiple sub-data according to a pre-stored splitting rule.
  • the first terminal device transmits the split sub-data end-to-end through the network slicing technology, inserts the sub-data into the network slice, and then sends the network slice carrying the sub-data directly to the second terminal device without forwarding via the base station .
  • the first terminal device splits the data to be transmitted into multiple sub-data according to a set splitting rule, inserts the sub-data into a network slice, and carries the sub-data.
  • the network slice of the data is sent to the second terminal device.
  • the data transmission method provided by the embodiments of the present disclosure adopts end-to-end data transmission, which reduces the delay of forwarding by the base station.
  • the data transmission method provided by the embodiments of the present disclosure adopts the form of network slicing for data transmission, which improves the data transmission rate and at the same time improves the security of data transmission.
  • FIG. 2 is a schematic diagram of signaling interaction of a data transmission method provided by an embodiment of the disclosure. As shown in FIG. 2, the method includes:
  • the first terminal device receives an opening trigger operation on the data transmission mode button, and starts the data transmission mode.
  • the I/O port of the Subscriber Identification Module (SIM) card is designed to connect with the terminal device power IC, and the connection or disconnection between the two is realized through software, and the data transmission is turned on when connected mode.
  • SIM Subscriber Identification Module
  • a control button for the data transmission mode is added, and the data transmission mode can be turned on or off by triggering the button.
  • control button of the data transmission mode can be added to the setting application of the terminal device, or added to the shortcut bar of the terminal device.
  • the first terminal device is used as the sending end (for example, terminal device A), and the second terminal device is used as the receiving end (for example, terminal device B).
  • terminal device A needs to transmit data to terminal device B
  • the data transmission mode is triggered by clicking the button of the data transmission mode on the display interface of the terminal device A.
  • both the first terminal device and the second terminal device can be used as the sending end or the receiving end, and can be set according to actual requirements, which is not specifically limited in this embodiment.
  • both the terminal device A and the terminal device B include a 5G module, and the 5G module is used for data transmission between the two.
  • the 5G module may include: a 5G chip and a Wi-Fi antenna.
  • S202 Determine a second terminal device corresponding to the data transmission mode.
  • the corresponding range of the data transmission mode can be understood as the maximum range that can realize the data transmission of this embodiment.
  • the user determines the second terminal device that receives the data from the displayed multiple second terminal devices as the receiving end. For example, when the data transmission mode is turned on, there are 5 second terminal devices that can be searched. Among the second terminal devices, terminal device B is selected as the receiving end.
  • S203 The first terminal device receives the input authentication information.
  • the authentication information for pairing between the two is agreed in advance.
  • the authentication information can be a password agreed by both parties.
  • the purpose of adding authentication information is to increase the authenticity of the second terminal device. , Increase the security in the transmission process.
  • the authentication information is input, the authentication information is automatically verified, and the connection request is sent to the second terminal device after the authentication information is passed.
  • the 5G module of terminal device A calls the underlying wireless communication protocol stack to send a connection request to the 5G module of terminal device B to request a transport layer connection with terminal device B.
  • the second terminal device generates a consent message in response to the connection request.
  • the terminal device B obtains the connection request from the underlying protocol stack through the wireless communication protocol stack interface layer, the stack interface layer informs the terminal device B of the connection request through the event callback function, and the terminal device B obtains the connection request from the underlying protocol stack through the stack interface layer.
  • the stack interface layer informs the processor of the connection request through the event callback function, and the processor displays the connection request on the display interface of the terminal device B, and provides the option of accepting the connection or rejecting the connection.
  • the consent message When sending the consent message to the first terminal device, it is necessary to input the pre-appointed authentication information, and when the authentication is passed, the consent message is sent to the first terminal device, and the terminal device A and the terminal device B establish a Transport layer connection.
  • the transmission layer of the first terminal device and the target second terminal device notifies the processor of the execution status through the control code of the event (Callback callback function).
  • the second terminal device inserts the address information and port information of the second terminal device into the network slice.
  • the first terminal device sends the network slice carrying the split rule to the second terminal device according to the address information and the port information.
  • the first terminal device generates multiple sub-data from the data to be transmitted according to the set split rule.
  • the first terminal device inserts the sub-data into the network slice, and sends the network slice carrying the sub-data to the second terminal device.
  • a split rule is preset, the data to be transmitted is split according to the split rule to generate multiple sub-data, and the sub-data is inserted into the network slice, and the first terminal device adopts the 5G module
  • the Wi-Fi antenna in the Wi-Fi antenna directly sends the network slice carrying the sub-data to the target second terminal device without forwarding through the base station, reducing the delay of the base station forwarding, and increasing the transmission speed through the Wi-Fi antenna in the 5G module.
  • the first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
  • the size of the data to be transmitted by the first terminal device is 1024M
  • the current data transmission rate between the first terminal device and the second terminal device is 2M/S
  • 8 different network slices are used for data transmission.
  • the optimal transmission scheme is when the transmission time of each sub-data packet is 2s
  • the number of sub-data packets to be split is 256
  • the transmission time is 64s.
  • the sub-data is encrypted; a random identifier is assigned to the encrypted sub-data according to a random processing rule, and the encrypted sub-data is split according to the random identifier.
  • a random identifier is assigned to the encrypted sub-data according to a random processing rule, and the encrypted sub-data is split according to the random identifier.
  • Encrypting the sub-data may be: inserting a set character and/or a set picture into a set position in the sub-data.
  • the sub-data can be inserted into different network slices, and multiple different network slices can be sent from the first terminal device to the target second terminal device in the form of isolated transmission.
  • the use of multiple different network slices can adopt the form of isolated transmission.
  • the first terminal device and the target second terminal device can access multiple network slices at the same time to ensure the security of data transmission Sex.
  • the target second terminal device generates complete data transmitted by the first terminal device from the network slice carrying the sub-data according to the split rule.
  • the target second terminal device parses the network slice carrying the sub-data according to the splitting rule to obtain multiple sub-data, and restores the multiple sub-data to complete data sent by the first terminal device according to the mark and the splitting order of the sub-data.
  • the random identification of the sub-data is processed according to the random processing rule, and the combination sequence corresponding to the sub-data is determined; the sub-data is decrypted; the decrypted all is The sub-data generates complete data transmitted by the first terminal device according to the combination sequence.
  • Decrypting the sub-data may include: removing the set character insertion and/or the set picture inserted at the set position in the sub-data.
  • the first terminal device receives the closing trigger operation of the data transmission mode button, and closes the data transmission mode to disconnect the communication connection between the first terminal device and the second terminal device.
  • the first terminal device After the data transmission is completed, the first terminal device receives the closing trigger operation of the data transmission mode button, the first terminal device sends a disconnection request to the target second terminal device, and the target second terminal device disconnects according to the disconnection request.
  • the communication connection between the first terminal device and the target second terminal device is opened; the first terminal device notifies the protocol layer to disconnect the transmission layer connection.
  • a connection request is sent to a second terminal device through a first terminal device, a consent message sent by the second terminal device in response to the connection request is received, and all data is established according to the consent message
  • the first terminal device is in communication connection with the second terminal device; the data to be transmitted is generated according to a set splitting rule into multiple sub-data; the sub-data is inserted into the network slice, and the sub-data will be carried.
  • the network slice of the data is sent to the second terminal device; the network slice carrying the sub-data is generated according to the split rule to generate complete data transmitted by the first terminal device.
  • the data transmission method provided by the embodiments of the present disclosure adopts end-to-end data transmission, which reduces the delay of forwarding by the base station.
  • the data transmission method provided by the embodiments of the present disclosure adopts the form of network slicing for data transmission, which improves the data transmission rate and at the same time improves the security of data transmission.
  • FIG. 3 is a schematic structural diagram of a data transmission device provided by an embodiment of the disclosure.
  • the data transmission device may be the first terminal device in FIG. 2.
  • the device specifically includes a splitting module 301 and a sending module 302.
  • the splitting module 301 is configured to split the data to be transmitted into multiple sub-data according to the set splitting rules
  • the sending module 302 is configured to insert the sub-data into the network slice, and send the network slice carrying the sub-data to the second terminal device.
  • the device further includes: a processing module 303 configured to encrypt the sub-data; and assign a random identifier to the encrypted sub-data according to a random processing rule.
  • the sending module 302 is specifically configured to split the encrypted sub-data into network slices according to the random identification.
  • the sending module 302 is specifically configured to insert a set character and/or a set picture into a set position in the sub-data.
  • the splitting module 301 is specifically configured to split the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
  • the apparatus further includes: a receiving module 304 configured to receive the input authentication information; a connection module 305 configured to send a connection request to the second terminal device after the authentication information passes To establish a communication connection with the second terminal device.
  • the receiving module 304 is further configured to receive the network slice carrying address information and port information sent by the second terminal device.
  • the sending module 302 is specifically configured to send the network slice carrying the split rule to the second terminal device according to the address information and the port information.
  • the sending module 302 is specifically configured to send the network slice carrying the sub-data to the second terminal device according to the address information and the port information.
  • the receiving module 304 is further configured to receive a close trigger operation of the data transmission mode button, and close the data transmission mode to disconnect the communication connection with the second terminal device.
  • the data transmission device includes a processor and a memory.
  • the above-mentioned splitting module, sending module, processing module, and receiving module are all stored in the memory as program modules, and the processor executes the above-mentioned program modules stored in the memory to implement corresponding Features.
  • the processor contains the kernel, and the kernel calls the corresponding program module from the memory.
  • One or more kernels can be set, and data transmission between terminal devices can be realized by adjusting kernel parameters.
  • the data transmission device provided in this embodiment may be the data transmission device shown in FIG. 3, which can perform all the steps of the first terminal device in the data transmission method shown in FIG. 2 to realize the technology of the data transmission method shown in FIG.
  • FIG. 4 is a schematic structural diagram of another data transmission device provided by an embodiment of the disclosure.
  • the data transmission device may be the second terminal device in FIG. 2.
  • the device specifically includes a receiving module 401 and a generating module 402.
  • the receiving module 401 is configured to receive the network slice carrying the sub-data sent by the first terminal device.
  • the generating module 402 is configured to generate the complete data transmitted by the first terminal device from the network slice carrying the sub-data according to the split rule.
  • the device further includes: a processing module 403, configured to process the random identification of the sub-data according to random processing rules, and determine the combination sequence corresponding to the sub-data;
  • the data is decrypted; and the generating module 402 is specifically configured to generate the complete data transmitted by the first terminal device according to the combined sequence of the decrypted sub-data.
  • the processing module 403 is specifically configured to remove the set character insertion and/or the set picture inserted at the set position in the sub-data.
  • the processing module 403 is further configured to insert the address information and port information of the second terminal device into the network slice.
  • the apparatus further includes a sending module 404 configured to send the network slice carrying the address information and the port information to the first terminal device.
  • the receiving module 401 is further configured to receive the network slice carrying the splitting rule sent by the first terminal device.
  • the data transmission device includes a processor and a memory.
  • the above-mentioned receiving module, generating module, processing module, and sending module are all stored in the memory as program modules, and the processor executes the above-mentioned program modules stored in the memory to realize corresponding functions. .
  • the processor contains the kernel, and the kernel calls the corresponding program module from the memory.
  • One or more kernels can be set, and data transmission between terminal devices can be realized by adjusting kernel parameters.
  • the data transmission device provided in this embodiment may be the data transmission device shown in FIG. 4, which can perform all the steps of the second terminal device in the data transmission method shown in FIG. 2 to realize the technology of the data transmission method shown in FIG. 2
  • FIG. 2 For the effect, please refer to the related description in FIG. 2 for details, which is a concise description and will not be repeated here.
  • FIG. 5 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure.
  • the terminal device may be the first terminal device in FIG. 1.
  • the terminal device 500 shown in FIG. 5 includes: at least one processor 501, a memory 502. At least one network interface 504 and other user interfaces 503.
  • the various components in the terminal device 500 are coupled together through the bus system 505.
  • the bus system 505 is used to implement connection and communication between these components.
  • the bus system 505 also includes a power bus, a control bus, and a status signal bus.
  • various buses are marked as the bus system 505 in FIG. 5.
  • the user interface 503 may include a display, a keyboard, or a pointing device (for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.).
  • a pointing device for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.
  • the memory 502 in the embodiment of the present disclosure may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Synchronous Link Dynamic Random Access Memory
  • Synchlink DRAM Synchronous Link Dynamic Random Access Memory
  • DRRAM Direct Rambus RAM
  • the memory 502 stores the following elements, executable units or data structures, or their subsets, or their extended sets: operating system 5021 and application programs 5022.
  • the operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks.
  • the application program 5022 includes various application programs, such as a media player (MediaPlayer), a browser (Browser), etc., which are used to implement various application services.
  • a program that implements the method of the embodiment of the present disclosure may be included in the application program 5022.
  • the processor 501 by calling a program or instruction stored in the memory 502, specifically, a program or instruction stored in the application program 5022, the processor 501 is configured to execute the method steps provided by each method embodiment, for example, including :
  • the method used by the processor 501 to execute further includes: encrypting the sub-data; and assigning a random identifier to the encrypted sub-data according to a random processing rule.
  • the method executed by the processor 501 further includes: splitting the encrypted sub-data into network slices according to the random identification.
  • the method used by the processor 501 to execute further includes: inserting a set character and/or a set picture into a set position in the sub-data.
  • the method executed by the processor 501 further includes: the first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
  • the method used by the processor 501 to execute further includes: receiving input authentication information; after the authentication information is passed, sending a connection request to the second terminal device, so that the first terminal device Establishing a communication connection with the second terminal device.
  • the method used by the processor 501 to execute further includes: receiving the network slice carrying address information and port information sent by the second terminal device.
  • the method executed by the processor 501 further includes: sending the network slice carrying the splitting rule to the second terminal device according to the address information and the port information.
  • the method executed by the processor 501 further includes: sending the network slice carrying the sub-data to the second terminal device according to the address information and the port information.
  • the method used by the processor 501 to execute further includes: receiving a closing trigger operation of the data transmission mode button, and closing the data transmission mode to disconnect the first terminal device and the second terminal device Communication connection between.
  • the method in the above embodiment of the present disclosure may be applied to the processor 501 or implemented by the processor 501.
  • the processor 501 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 501 or instructions in the form of software.
  • the aforementioned processor 501 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present disclosure may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software units in the decoding processor.
  • the software unit may be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 502, and the processor 501 reads information in the memory 502, and completes the steps of the foregoing method in combination with its hardware.
  • the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (DSPDevice, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, and other electronics used to perform the functions described in this application Unit or its combination.
  • ASICs application specific integrated circuits
  • DSP digital signal processors
  • DSPDevice digital signal processing devices
  • PLD programmable logic Device
  • FPGA Field-Programmable Gate Array
  • general-purpose processors controllers, microcontrollers, microprocessors, and other electronics used to perform the functions described in this application Unit or its combination.
  • the technology described herein can be implemented by a unit that performs the functions described herein.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.
  • the terminal device provided in this embodiment may be the terminal device shown in FIG. 5, which can perform all the steps performed by the first terminal device in the data transmission method shown in FIG. 2 to realize the technical effects of the data transmission method shown in FIG. 2
  • FIG. 2 For details, please refer to the related description in FIG. 2, which is a concise description and will not be repeated here.
  • the embodiment of the present disclosure also provides a storage medium (computer-readable storage medium).
  • the storage medium here stores one or more programs.
  • the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk or solid state hard disk; the memory may also include the above-mentioned types of memory. combination.
  • One or more programs in the storage medium may be executed by one or more processors to implement the above-mentioned data transmission method executed on the data transmission device side.
  • the processor is used to execute the data transmission program stored in the memory to implement the following steps of the data transmission method executed on the data transmission device side:
  • the data transmission method executed by the data transmission device side further includes: encrypting the sub-data; and assigning a random identifier to the encrypted sub-data according to a random processing rule.
  • the data transmission method executed by the data transmission device side further includes: splitting the encrypted sub-data into network slices according to the random identification.
  • the data transmission method executed by the data transmission device side further includes: inserting a set character and/or a set picture into a set position in the sub-data.
  • the data transmission method executed by the data transmission device side further includes: the first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
  • the data transmission method executed on the data transmission device side further includes: receiving input authentication information; after the authentication information is passed, sending a connection request to the second terminal device, so that the first terminal The device establishes a communication connection with the second terminal device.
  • the data transmission method executed by the data transmission device side further includes: receiving the network slice that carries address information and port information sent by the second terminal device.
  • the data transmission method executed on the data transmission device side further includes: sending the network slice carrying the split rule to the second terminal device according to the address information and the port information.
  • the data transmission method executed by the data transmission device side further includes: sending the network slice carrying the sub-data to the second terminal device according to the address information and the port information .
  • the data transmission method executed on the data transmission device side further includes: receiving a closing trigger operation on the data transmission mode button, and closing the data transmission mode to disconnect the first terminal device and the second terminal Communication connection between devices.
  • FIG. 6 is a schematic structural diagram of another terminal device provided by an embodiment of the disclosure.
  • the data transmission apparatus may be the second terminal device in FIG. 2.
  • the terminal device shown in FIG. 6 includes: at least one processor 601, A memory 602, at least one network interface 604, and other user interfaces 603.
  • the various components in the terminal device 600 are coupled together through the bus system 605.
  • the bus system 605 is used to implement connection and communication between these components.
  • the bus system 605 also includes a power bus, a control bus, and a status signal bus.
  • various buses are marked as the bus system 605 in FIG. 6.
  • the processor 601, the memory 602, the user interface 603, the network interface 604, and the bus system 605 are similar to the processor 601, the memory 602, other user interfaces 603, the network interface 604, and the bus system 605 as shown in FIG. 4. For details, please refer to FIG. 4 Part of the related description is for concise description, so I won’t repeat it here.
  • the processor 601 by calling a program or instruction stored in the memory 602, specifically, a program or instruction stored in the application program 6022, the processor 601 is used to execute the method steps provided by each method embodiment, for example, including :
  • the method used by the processor 601 to execute further includes: processing the random identification of the sub-data according to a random processing rule, and determining the combination sequence corresponding to the sub-data; Decryption; generating the complete data transmitted by the first terminal device according to the combined sequence of the decrypted sub-data.
  • the method executed by the processor 601 further includes: removing the set character insertion and/or the set picture inserted at the set position in the sub-data.
  • the method used by the processor 601 to execute further includes: inserting the address information and port information of the second terminal device into the network slice; The network slice is sent to the first terminal device.
  • the method executed by the processor 601 further includes: receiving the network slice carrying the splitting rule sent by the first terminal device.
  • the methods disclosed in the foregoing embodiments of the present disclosure may be applied to the processor 601 or implemented by the processor 601.
  • the processor 601 may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method can be completed by an integrated logic circuit of hardware in the processor 601 or instructions in the form of software.
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present disclosure may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software units in the decoding processor.
  • the software unit may be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 602, and the processor 601 reads the information in the memory 602, and completes the steps of the foregoing method in combination with its hardware.
  • the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (DSPDevice, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, and other electronic units used to perform the functions described in this application Or a combination thereof.
  • ASICs application specific integrated circuits
  • DSP digital signal processors
  • DSPDevice digital signal processing devices
  • PLD programmable logic Device
  • Field-Programmable Gate Array Field-Programmable Gate Array
  • FPGA Field-Programmable Gate Array
  • the technology described herein can be implemented by a unit that performs the functions described herein.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.
  • the terminal device provided in this embodiment may be the terminal device shown in FIG. 6, which can perform all the steps performed by the second terminal device in the data transmission method shown in FIG. 2, thereby achieving the technical effects of the data transmission method shown in FIG. 2.
  • FIG. 2 For details, please refer to the related description in FIG. 2, which is a concise description and will not be repeated here.
  • the embodiment of the present disclosure also provides a storage medium (computer-readable storage medium).
  • the storage medium here stores one or more programs.
  • the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk, or solid-state hard disk; and the memory may also include the above-mentioned types of memory. combination.
  • One or more programs in the storage medium may be executed by one or more processors to implement the above-mentioned data transmission method executed on the data transmission device side.
  • the processor is used to execute the data transmission program stored in the memory to implement the following steps of the data transmission method executed on the data transmission device side:
  • the data transmission method executed on the data transmission device side further includes: processing the random identification of the sub-data according to a random processing rule, and determining the combination sequence corresponding to the sub-data; Performing decryption; generating the complete data transmitted by the first terminal device according to the combined sequence of the decrypted sub-data.
  • the data transmission method executed by the data transmission device side further includes: removing the set character insertion and/or the set picture inserted at the set position in the sub-data.
  • the data transmission method performed on the data transmission device side further includes: inserting the address information and port information of the second terminal device into the network slice; and carrying the address information and the port information The network slice of is sent to the first terminal device.
  • the data transmission method executed by the data transmission device side further includes: receiving the network slice carrying the splitting rule sent by the first terminal device.
  • the steps of the method or algorithm described in combination with the embodiments disclosed in this document can be implemented by hardware, a software module executed by a processor, or a combination of the two.
  • the software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all in the technical field. Any other known storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the present disclosure relate to a data transmission method and apparatus, a terminal device and a storage medium. The method comprises: a first terminal device splits data to be transmitted into a plurality of pieces of sub-data according to a set splitting rule; and inserts the sub-data into a network slice, and sends the network slice carrying the sub-data to a second terminal device.

Description

数据传输方法、装置、终端设备及存储介质Data transmission method, device, terminal equipment and storage medium 技术领域Technical field
本公开实施例涉及但不限于通信领域,尤其涉及一种数据传输方法、装置、终端设备及存储介质。The embodiments of the present disclosure relate to, but are not limited to, the field of communications, and in particular to a data transmission method, device, terminal device, and storage medium.
背景技术Background technique
互联网给人们生活带来了极大的便利,人们在享受网络便捷信息获取的同时,却存在信息安全隐患。用户会利用网络资源进行数据的传输,对于数据传输方而言,传输的数据很可能是非常机密的材料,比如企业的财政开支状况、项目申请及研发文档等,数据传输过程中的安全性十分重要。而存在一些不法分子利用网络隐蔽资源非法窃取传输的数据以达到特定的目的,使数据传输方遭受巨大的经济损失。The Internet has brought great convenience to people's lives. While people enjoy the convenient access to information on the Internet, there are hidden dangers in information security. Users will use network resources for data transmission. For the data transmission party, the transmitted data is likely to be very confidential materials, such as the company’s financial expenditure status, project applications, and R&D documents. The security of the data transmission process is very high. important. However, some lawbreakers use hidden network resources to illegally steal transmitted data to achieve specific purposes, causing the data transmission party to suffer huge economic losses.
用户会利用电脑进行拷贝,或者通过蓝牙等传输技术进行数据传输,但是当没有携带电脑或者进行大文件传输时,此方式会带来不便。Users will use a computer to copy, or use Bluetooth and other transmission technology for data transmission, but this method will bring inconvenience when the computer is not carried or when large files are transferred.
发明内容Summary of the invention
鉴于此,为解决上述技术问题或部分技术问题,本公开实施例提供一种数据传输方法、装置、终端设备及存储介质。In view of this, in order to solve the above technical problems or part of the technical problems, embodiments of the present disclosure provide a data transmission method, device, terminal device, and storage medium.
第一方面,本公开实施例提供一种数据传输方法,包括:第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据;以及将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。In a first aspect, an embodiment of the present disclosure provides a data transmission method, including: a first terminal device splits the data to be transmitted into multiple sub-data according to a set splitting rule; and inserts the sub-data into a network slice , Sending the network slice carrying the sub-data to the second terminal device.
第二方面,本公开实施例提供一种数据传输方法,包括:接收第一终端设备发送的携带有子数据的网络切片;以及根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。In a second aspect, embodiments of the present disclosure provide a data transmission method, including: receiving a network slice carrying sub-data sent by a first terminal device; and generating the network slice carrying the sub-data according to a split rule Complete data transmitted by the first terminal device.
第三方面,本公开实施例提供一种数据传输装置,包括:拆分模块,被构造成第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据;以及发送模块,被构造成将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。In a third aspect, an embodiment of the present disclosure provides a data transmission device, including: a splitting module, configured to split the data to be transmitted into multiple sub-data according to a set splitting rule by the first terminal device; and a sending module And configured to insert the sub-data into a network slice, and send the network slice carrying the sub-data to a second terminal device.
第四方面,本公开实施例提供一种数据传输装置,包括:接收模块,被构造成接收第一终端设备发送的携带有子数据的网络切片;以及生成模块,被构造成根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。In a fourth aspect, an embodiment of the present disclosure provides a data transmission device, including: a receiving module configured to receive a network slice carrying sub-data sent by a first terminal device; and a generating module configured to divide The network slice carrying the sub-data generates complete data transmitted by the first terminal device.
第五方面,本公开实施例提供一种终端设备,包括:处理器和存储器,所述处理器用于执行所述存储器中存储的数据传输程序,以实现上述第一方面或第二方面中任一项所述的数据传输方法。In a fifth aspect, embodiments of the present disclosure provide a terminal device, including: a processor and a memory, and the processor is configured to execute a data transmission program stored in the memory to implement any one of the first aspect or the second aspect described above. The data transmission method described in item.
第六方面,本公开实施例提供一种存储介质,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现上述第一方面或第二方面中任一项所述的数据传输方法。In a sixth aspect, embodiments of the present disclosure provide a storage medium that stores one or more programs, and the one or more programs can be executed by one or more processors to implement the first aspect or The data transmission method of any one of the second aspect.
附图说明Description of the drawings
图1为本公开实施例提供的一种数据传输方法的流程示意图;FIG. 1 is a schematic flowchart of a data transmission method provided by an embodiment of the disclosure;
图2为本公开实施例提供的一种数据传输方法的信令交互的示意图;2 is a schematic diagram of signaling interaction of a data transmission method provided by an embodiment of the disclosure;
图3为本公开实施例提供的一种数据传输装置的结构示意图;FIG. 3 is a schematic structural diagram of a data transmission device provided by an embodiment of the disclosure;
图4为本公开实施例提供的另一种数据传输装置的结构示意图;4 is a schematic structural diagram of another data transmission device provided by an embodiment of the disclosure;
图5为本公开实施例提供的一种的终端设备的结构示意图;以及FIG. 5 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure; and
图6为本公开实施例提供的另一种的终端设备的结构示意图。FIG. 6 is a schematic structural diagram of another terminal device provided by an embodiment of the disclosure.
具体实施方式detailed description
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、 完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。In order to make the objectives, technical solutions, and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments These are a part of the embodiments of the present disclosure, but not all of the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present disclosure.
为便于对本公开实施例的理解,下面将结合附图以具体实施例做进一步的解释说明,实施例并不构成对本公开实施例的限定。In order to facilitate the understanding of the embodiments of the present disclosure, specific embodiments will be further explained below in conjunction with the accompanying drawings, and the embodiments do not constitute a limitation to the embodiments of the present disclosure.
图1为本公开实施例提供的一种数据传输方法的流程示意图,如图1所示,该方法具体包括:FIG. 1 is a schematic flowchart of a data transmission method provided by an embodiment of the disclosure. As shown in FIG. 1, the method specifically includes:
S11、第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据。S11. The first terminal device splits the data to be transmitted into multiple sub-data according to the set splitting rule.
本实施例的数据传输方法应用于5G网络中终端设备端对端的短距离传输,例如基站同一小区内两终端设备之间的数据传输。传输方式采用网络切片技术,且不通过基站。两终端之间直接进行数据传输,减少通过基站传输的时延。通过网络切片技术提高端到端的传输速率。The data transmission method of this embodiment is applied to end-to-end short-distance transmission of terminal devices in a 5G network, such as data transmission between two terminal devices in the same cell of a base station. The transmission method uses network slicing technology and does not pass through the base station. Direct data transmission between the two terminals reduces the transmission delay through the base station. Improve the end-to-end transmission rate through network slicing technology.
在进行数据传输之前确定发送端和接收端,本实施例中以第一终端设备作为数据的发送端,第二终端设备作为数据的接收端。需要说明的是,本实施例涉及的第一终端设备和第二终端设备均具备发送数据和接收数据的功能,第一终端设备和第二终端设备可以是但不限于:5G智能手机、5G智能手环等。The sending end and the receiving end are determined before data transmission. In this embodiment, the first terminal device is used as the data sending end, and the second terminal device is used as the data receiving end. It should be noted that both the first terminal device and the second terminal device involved in this embodiment have the functions of sending and receiving data. The first terminal device and the second terminal device may be, but are not limited to: 5G smart phones, 5G smart phones, and 5G smart phones. Bracelet etc.
预先设定待传输数据的拆分规则,并将拆分规则存储于终端中,拆分规则可以是数据的拆分大小、数据的拆分数量等。The split rule of the data to be transmitted is preset, and the split rule is stored in the terminal. The split rule can be the split size of the data, the split quantity of the data, and so on.
在进行数据传输时,第一终端根据预先存储的拆分规则将待传输的数据拆分为多个子数据。When performing data transmission, the first terminal splits the data to be transmitted into multiple sub-data according to a pre-stored splitting rule.
S12、将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。S12. Insert the sub-data into a network slice, and send the network slice carrying the sub-data to a second terminal device.
第一终端设备通过网络切片技术对拆分后的子数据进行端对端的传输,将子数据插入网络切片中,再将携带有子数据的网络切片直接发送给第二终端设备,不在经由基站转发。The first terminal device transmits the split sub-data end-to-end through the network slicing technology, inserts the sub-data into the network slice, and then sends the network slice carrying the sub-data directly to the second terminal device without forwarding via the base station .
本公开实施例提供的数据传输方法,通过第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据,将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。本公开实施例提供的数据传输方法采用端到端之间数据之间传输,减少了由基站转发的时延。本公开实施例提供的数据传输方法采用网络切片的形式进行数据传输,提升数据传输的速率,同时提升数据传输的安全性。In the data transmission method provided by the embodiment of the present disclosure, the first terminal device splits the data to be transmitted into multiple sub-data according to a set splitting rule, inserts the sub-data into a network slice, and carries the sub-data. The network slice of the data is sent to the second terminal device. The data transmission method provided by the embodiments of the present disclosure adopts end-to-end data transmission, which reduces the delay of forwarding by the base station. The data transmission method provided by the embodiments of the present disclosure adopts the form of network slicing for data transmission, which improves the data transmission rate and at the same time improves the security of data transmission.
图2为本公开实施例提供的一种数据传输方法的信令交互的示意图,如图2所示,该方法包括:FIG. 2 is a schematic diagram of signaling interaction of a data transmission method provided by an embodiment of the disclosure. As shown in FIG. 2, the method includes:
S201、第一终端设备接收对数据传输模式按钮的开启触发操作,开启数据传输模式。S201: The first terminal device receives an opening trigger operation on the data transmission mode button, and starts the data transmission mode.
在本实施中通过设计用户身份识别卡(Subscriber Identification Module,SIM)卡I/O口与终端设备电源IC的接通,并通过软件实现二者的连通或者断开,当连通时对应开启数据传输模式。In this implementation, the I/O port of the Subscriber Identification Module (SIM) card is designed to connect with the terminal device power IC, and the connection or disconnection between the two is realized through software, and the data transmission is turned on when connected mode.
在终端设备的显示界面,增加数据传输模式的控制按钮,通过对该按钮的触发操作,可实现数据传输模式的开启或关闭。On the display interface of the terminal device, a control button for the data transmission mode is added, and the data transmission mode can be turned on or off by triggering the button.
在本公开实施例的一可选方案中,数据传输模式的控制按钮可添加于终端设备的设置应用中,或添加于终端设备的快捷栏中。In an optional solution of the embodiment of the present disclosure, the control button of the data transmission mode can be added to the setting application of the terminal device, or added to the shortcut bar of the terminal device.
具体地,本实施例将第一终端设备作为发送端(如,终端设备A),第二终端设备作为接收端(如,终端设备B),当终端设备A需要向终端设备B传输数据时,通过点击终端设备A显示界面的数据传输模式的按钮触发开启数据传输模式。Specifically, in this embodiment, the first terminal device is used as the sending end (for example, terminal device A), and the second terminal device is used as the receiving end (for example, terminal device B). When terminal device A needs to transmit data to terminal device B, The data transmission mode is triggered by clicking the button of the data transmission mode on the display interface of the terminal device A.
需要说明的是:第一终端设备和第二终端设备均可作为发送端或接收端,可根据实际需求进行设定,对此,本实施例不作具体限定。It should be noted that both the first terminal device and the second terminal device can be used as the sending end or the receiving end, and can be set according to actual requirements, which is not specifically limited in this embodiment.
进一步地,终端设备A和终端设备B均包含有5G模块,该5G模块用于二者之间的数据传输,5G模块可以包括:5G芯片和Wi-Fi天线。Further, both the terminal device A and the terminal device B include a 5G module, and the 5G module is used for data transmission between the two. The 5G module may include: a 5G chip and a Wi-Fi antenna.
S202、确定数据传输模式对应的第二终端设备。S202: Determine a second terminal device corresponding to the data transmission mode.
在开启数据传输模式后,显示相应的在数据传输模式对应范围内的多个第二终端设备,数据传输模式对应范围内可以理解为能够实现本实施例数据传输的最大范围。After the data transmission mode is turned on, corresponding multiple second terminal devices within the corresponding range of the data transmission mode are displayed, and the corresponding range of the data transmission mode can be understood as the maximum range that can realize the data transmission of this embodiment.
用户从显示的多个第二终端设备中确定接收该数据的第二终端设备作为接收端,例如,当开启数据传输模式后,显示有5个能够搜索到的第二终端设备,用户从这5个第二终端设备中选择终端设备B作为接收端。The user determines the second terminal device that receives the data from the displayed multiple second terminal devices as the receiving end. For example, when the data transmission mode is turned on, there are 5 second terminal devices that can be searched. Among the second terminal devices, terminal device B is selected as the receiving end.
S203、第一终端设备接收输入的认证信息。S203: The first terminal device receives the input authentication information.
在第一终端设备与第二终端设备进行配对时,预先约定二者进行配对的认证信息,该认证信息可以是双方约定的密码等,增加认证信息的目的在于增加确保第二终端设备为真实的,增加传输过程中的安全性。When the first terminal device and the second terminal device are paired, the authentication information for pairing between the two is agreed in advance. The authentication information can be a password agreed by both parties. The purpose of adding authentication information is to increase the authenticity of the second terminal device. , Increase the security in the transmission process.
S204、认证信息通过后向所述第二终端设备发送连接请求。S204: After the authentication information is passed, a connection request is sent to the second terminal device.
在输入认证信息后,自动对认证信息进行验证,在认证信息通过后向第二终端设备发送连接请求。After the authentication information is input, the authentication information is automatically verified, and the connection request is sent to the second terminal device after the authentication information is passed.
具体地,终端设备A的5G模块调用底层无线通信协议栈向终端设备B的5G模块发送连接请求,以请求与终端设备B的一个传输层连接。Specifically, the 5G module of terminal device A calls the underlying wireless communication protocol stack to send a connection request to the 5G module of terminal device B to request a transport layer connection with terminal device B.
S205、第二终端设备响应于所述连接请求生成同意消息。S205. The second terminal device generates a consent message in response to the connection request.
终端设备B通过无线通信协议栈接口层获得从底层协定栈中得到的连接请求,栈接口层通过事件回调函数将连接请求告知终端设备B,终端设备B通过栈界面层获得从底层协定栈中得到的连接请求,栈界面层通过事件回调函数将连接请求告知处理器,处理器将该连接请求显示于终端设备B的显示界面,并提供接受连接或拒绝连接的选项。The terminal device B obtains the connection request from the underlying protocol stack through the wireless communication protocol stack interface layer, the stack interface layer informs the terminal device B of the connection request through the event callback function, and the terminal device B obtains the connection request from the underlying protocol stack through the stack interface layer. The stack interface layer informs the processor of the connection request through the event callback function, and the processor displays the connection request on the display interface of the terminal device B, and provides the option of accepting the connection or rejecting the connection.
当触发接受连接的选项时,生成该连接请求的同意消息。When the option to accept the connection is triggered, a consent message for the connection request is generated.
S206、接收输入的认证信息。S206. Receive the input authentication information.
S207、认证信息通过后向所述第一终端设备发送同意消息,以建 立所述第二终端设备与所述第一终端设备通信连接。S207: After the authentication information is passed, an agreement message is sent to the first terminal device to establish a communication connection between the second terminal device and the first terminal device.
当将该同意消息发送给第一终端设备时,需要输入预先约定好的认证信息,在认证通过时向所述第一终端设备发送同意消息,终端设备A与终端设备B建立Transport层连接。When sending the consent message to the first terminal device, it is necessary to input the pre-appointed authentication information, and when the authentication is passed, the consent message is sent to the first terminal device, and the terminal device A and the terminal device B establish a Transport layer connection.
在本公开实施例的一可选方案中,第一终端设备和目标第二终端设备的传输层通过事件的控制码(Callback回调函数)将执行状态通知处理器。In an optional solution of the embodiment of the present disclosure, the transmission layer of the first terminal device and the target second terminal device notifies the processor of the execution status through the control code of the event (Callback callback function).
S208、第二终端设备将所述第二终端设备的地址信息和端口信息插入网络切片中。S208. The second terminal device inserts the address information and port information of the second terminal device into the network slice.
S209、将携带有所述地址信息和所述端口信息的所述网络切片发送给所述第一终端设备。S209. Send the network slice carrying the address information and the port information to the first terminal device.
S210、第一终端设备根据所述地址信息和所述端口信息将携带有拆分规则的所述网络切片发送给所述第二终端设备。S210. The first terminal device sends the network slice carrying the split rule to the second terminal device according to the address information and the port information.
S211、第一终端设备按照设定的拆分规则将待传输的数据生成多个子数据。S211. The first terminal device generates multiple sub-data from the data to be transmitted according to the set split rule.
S212、第一终端设备将所述子数据插入所述网络切片中,将携带有所述子数据的所述网络切片发送给所述第二终端设备。S212. The first terminal device inserts the sub-data into the network slice, and sends the network slice carrying the sub-data to the second terminal device.
在本实施例中,预先设定拆分规则,按照该拆分规则将待传输的数据进行拆分,生成多个子数据,并将子数据插入网络切片中,并且第一终端设备采用通过5G模块中的Wi-Fi天线直接将携带有子数据的网络切片发送给目标第二终端设备,不必经过基站转发,减少基站转发的时延,并且通过5G模块中的Wi-Fi天线可提升传输速度。In this embodiment, a split rule is preset, the data to be transmitted is split according to the split rule to generate multiple sub-data, and the sub-data is inserted into the network slice, and the first terminal device adopts the 5G module The Wi-Fi antenna in the Wi-Fi antenna directly sends the network slice carrying the sub-data to the target second terminal device without forwarding through the base station, reducing the delay of the base station forwarding, and increasing the transmission speed through the Wi-Fi antenna in the 5G module.
在本公开实施例的一可选方案中,第一终端设备根据待传输的数据的大小和当前网络参数将所述数据拆分为多个子数据。In an optional solution of the embodiment of the present disclosure, the first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
例如,第一终端设备待传输的数据的大小为1024M,当前第一终端设备和第二终端设备之间的数据传输速率为2M/S,采用8个不同的网络切片进行数据传输。假设每个子数据包传输时间为2s时为最优传输方案,则拆分的子数据包的个数为:256个,传输时间为64s。For example, the size of the data to be transmitted by the first terminal device is 1024M, the current data transmission rate between the first terminal device and the second terminal device is 2M/S, and 8 different network slices are used for data transmission. Assuming that the optimal transmission scheme is when the transmission time of each sub-data packet is 2s, the number of sub-data packets to be split is 256, and the transmission time is 64s.
在本公开实施例的一可选方案中,对所述子数据进行加密;按照随机处理规则为加密后的所述子数据分配随机标识,根据所述随机标识将加密后的所述子数据拆入网络切片中。In an optional solution of the embodiment of the present disclosure, the sub-data is encrypted; a random identifier is assigned to the encrypted sub-data according to a random processing rule, and the encrypted sub-data is split according to the random identifier. Into the network slice.
对所述子数据进行加密可以是:将设定的字符插入和/或设定的图片插入所述子数据中的设定位置。Encrypting the sub-data may be: inserting a set character and/or a set picture into a set position in the sub-data.
在本公开实施例的一可选方案中,子数据可插入不同的网络切片,多个不同的网络切片可采用隔离传输的形式由第一终端设备向目标第二终端设备发送。In an optional solution of the embodiment of the present disclosure, the sub-data can be inserted into different network slices, and multiple different network slices can be sent from the first terminal device to the target second terminal device in the form of isolated transmission.
采用多个不同的网络切片可采用隔离传输的形式,利用网络切片相互隔离,切片间互补影响的特性,第一终端设备和目标第二终端设备同时接入多个网络切片,保证数据传输的安全性。The use of multiple different network slices can adopt the form of isolated transmission. Using the characteristics of network slices being isolated from each other and complementary effects between slices, the first terminal device and the target second terminal device can access multiple network slices at the same time to ensure the security of data transmission Sex.
S213、目标第二终端设备根据所述拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。S213. The target second terminal device generates complete data transmitted by the first terminal device from the network slice carrying the sub-data according to the split rule.
目标第二终端设备根据拆分规则解析携带有子数据的网络切片获得多个子数据,根据子数据的标记和拆分顺序将多个子数据恢复为完整的由第一终端设备发送的数据。The target second terminal device parses the network slice carrying the sub-data according to the splitting rule to obtain multiple sub-data, and restores the multiple sub-data to complete data sent by the first terminal device according to the mark and the splitting order of the sub-data.
在本公开实施例的一可选方案中,根据随机处理规则对所述子数据的随机标识进行处理,确定所述子数据对应的组合顺序;对所述子数据进行解密;将解密后的所述子数据按照所述组合顺序生成所述第一终端设备传输的完整数据。In an optional solution of the embodiment of the present disclosure, the random identification of the sub-data is processed according to the random processing rule, and the combination sequence corresponding to the sub-data is determined; the sub-data is decrypted; the decrypted all is The sub-data generates complete data transmitted by the first terminal device according to the combination sequence.
对所述子数据进行解密,可以包括:去除所述子数据中设定位置插入的设定的字符插入和/或设定的图片。Decrypting the sub-data may include: removing the set character insertion and/or the set picture inserted at the set position in the sub-data.
S214、第一终端设备接收对数据传输模式按钮的关闭触发操作,关闭数据传输模式以断开所述第一终端设备与所述第二终端设备之间的通信连接。S214. The first terminal device receives the closing trigger operation of the data transmission mode button, and closes the data transmission mode to disconnect the communication connection between the first terminal device and the second terminal device.
在数据传输完成后,第一终端设备接收到对数据传输模式按钮的关闭触发操作,第一终端设备向目标第二终端设备发送断开连接请求,目标第二终端设备根据该断开连接请求断开第一终端设备与目标第二 终端设备之间的通信连接;第一终端设备通知协议层断开传输层的连接。After the data transmission is completed, the first terminal device receives the closing trigger operation of the data transmission mode button, the first terminal device sends a disconnection request to the target second terminal device, and the target second terminal device disconnects according to the disconnection request. The communication connection between the first terminal device and the target second terminal device is opened; the first terminal device notifies the protocol layer to disconnect the transmission layer connection.
本公开实施例提供的数据传输方法,通过第一终端设备向第二终端设备发送连接请求,接收所述第二终端设备发送的响应于所述连接请求的同意消息,根据所述同意消息建立所述第一终端设备与所述第二终端设备通信连接;按照设定的拆分规则将待传输的数据生成多个子数据;将所述子数据插入所述网络切片中,将携带有所述子数据的所述网络切片发送给所述第二终端设备;根据所述拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。本公开实施例提供的数据传输方法采用端到端之间数据之间传输,减少了由基站转发的时延。本公开实施例提供的数据传输方法采用网络切片的形式进行数据传输,提升数据传输的速率,同时提升数据传输的安全性。According to the data transmission method provided by the embodiments of the present disclosure, a connection request is sent to a second terminal device through a first terminal device, a consent message sent by the second terminal device in response to the connection request is received, and all data is established according to the consent message The first terminal device is in communication connection with the second terminal device; the data to be transmitted is generated according to a set splitting rule into multiple sub-data; the sub-data is inserted into the network slice, and the sub-data will be carried. The network slice of the data is sent to the second terminal device; the network slice carrying the sub-data is generated according to the split rule to generate complete data transmitted by the first terminal device. The data transmission method provided by the embodiments of the present disclosure adopts end-to-end data transmission, which reduces the delay of forwarding by the base station. The data transmission method provided by the embodiments of the present disclosure adopts the form of network slicing for data transmission, which improves the data transmission rate and at the same time improves the security of data transmission.
图3为本公开实施例提供的一种数据传输装置的结构示意图,该数据传输装置可以是图2中的第一终端设备,如图3所示,该装置具体包括拆分模块301和发送模块302。FIG. 3 is a schematic structural diagram of a data transmission device provided by an embodiment of the disclosure. The data transmission device may be the first terminal device in FIG. 2. As shown in FIG. 3, the device specifically includes a splitting module 301 and a sending module 302.
拆分模块301,被构造成按照设定的拆分规则将待传输的数据拆分为多个子数据;并且The splitting module 301 is configured to split the data to be transmitted into multiple sub-data according to the set splitting rules; and
发送模块302,被构造成将所述子数据插入所述网络切片中,将携带有所述子数据的所述网络切片发送给所述第二终端设备。The sending module 302 is configured to insert the sub-data into the network slice, and send the network slice carrying the sub-data to the second terminal device.
在一个示例性实施例中,所述装置还包括:处理模块303,被构造成对所述子数据进行加密;按照随机处理规则为加密后的所述子数据分配随机标识。In an exemplary embodiment, the device further includes: a processing module 303 configured to encrypt the sub-data; and assign a random identifier to the encrypted sub-data according to a random processing rule.
在一个示例性实施例中,所述发送模块302,具体被构造成根据所述随机标识将加密后的所述子数据拆入网络切片中。In an exemplary embodiment, the sending module 302 is specifically configured to split the encrypted sub-data into network slices according to the random identification.
在一个示例性实施例中,所述发送模块302,具体被构造成将设定的字符插入和/或设定的图片插入所述子数据中的设定位置。In an exemplary embodiment, the sending module 302 is specifically configured to insert a set character and/or a set picture into a set position in the sub-data.
在一个示例性实施例中,拆分模块301,具体被构造成根据待传输的数据的大小和当前网络参数将所述数据拆分为多个子数据。In an exemplary embodiment, the splitting module 301 is specifically configured to split the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
在一个示例性实施例中,所述装置还包括:接收模块304,被构造成接收输入的认证信息;连接模块305,被构造成所述认证信息通过后向所述第二终端设备发送连接请求,以使与所述第二终端设备建立通信连接。In an exemplary embodiment, the apparatus further includes: a receiving module 304 configured to receive the input authentication information; a connection module 305 configured to send a connection request to the second terminal device after the authentication information passes To establish a communication connection with the second terminal device.
在一个示例性实施例中,所述接收模块304,还被构造成接收所述第二终端设备发送的携带有地址信息和端口信息的所述网络切片。In an exemplary embodiment, the receiving module 304 is further configured to receive the network slice carrying address information and port information sent by the second terminal device.
在一个示例性实施例中,发送模块302,具体被构造成根据所述地址信息和所述端口信息将携带有拆分规则的所述网络切片发送给所述第二终端设备。In an exemplary embodiment, the sending module 302 is specifically configured to send the network slice carrying the split rule to the second terminal device according to the address information and the port information.
在一个示例性实施例中,发送模块302,具体被构造成根据所述地址信息和所述端口信息将携带有所述子数据的所述网络切片发送给所述第二终端设备。In an exemplary embodiment, the sending module 302 is specifically configured to send the network slice carrying the sub-data to the second terminal device according to the address information and the port information.
在一个示例性实施例中,所述接收模块304,还被构造成接收对数据传输模式按钮的关闭触发操作,关闭数据传输模式以断开与所述第二终端设备之间的通信连接。In an exemplary embodiment, the receiving module 304 is further configured to receive a close trigger operation of the data transmission mode button, and close the data transmission mode to disconnect the communication connection with the second terminal device.
所述数据传输装置包括处理器和存储器,上述拆分模块、发送模块、处理模块和接收模块等均作为程序模块存储在存储器中,由处理器执行存储在存储器中的上述程序模块来实现相应的功能。The data transmission device includes a processor and a memory. The above-mentioned splitting module, sending module, processing module, and receiving module are all stored in the memory as program modules, and the processor executes the above-mentioned program modules stored in the memory to implement corresponding Features.
处理器中包含内核,由内核去存储器中调取相应的程序模块。内核可以设置一个或以上,通过调整内核参数来实现终端设备之间的数据传输。The processor contains the kernel, and the kernel calls the corresponding program module from the memory. One or more kernels can be set, and data transmission between terminal devices can be realized by adjusting kernel parameters.
本实施例提供的数据传输装置可以是如图3中所示的数据传输装置,可执行如图2中数据传输方法中第一终端设备的所有步骤,进而实现图2所示数据传输方法的技术效果,具体请参照图2相关描述,为简洁描述,在此不作赘述。The data transmission device provided in this embodiment may be the data transmission device shown in FIG. 3, which can perform all the steps of the first terminal device in the data transmission method shown in FIG. 2 to realize the technology of the data transmission method shown in FIG. For the effect, please refer to the related description in FIG. 2 for details, which is a concise description and will not be repeated here.
图4为本公开实施例提供的另一种数据传输装置的结构示意图,该数据传输装置可以是图2中的第二终端设备,如图4所示,该装置具体包括接收模块401和生成模块402。FIG. 4 is a schematic structural diagram of another data transmission device provided by an embodiment of the disclosure. The data transmission device may be the second terminal device in FIG. 2. As shown in FIG. 4, the device specifically includes a receiving module 401 and a generating module 402.
接收模块401,被构造成接收第一终端设备发送的携带有子数据的网络切片;并且The receiving module 401 is configured to receive the network slice carrying the sub-data sent by the first terminal device; and
生成模块402,被构造成根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。The generating module 402 is configured to generate the complete data transmitted by the first terminal device from the network slice carrying the sub-data according to the split rule.
在一个示例性实施例中,所述装置还包括:处理模块403,被构造成根据随机处理规则对所述子数据的随机标识进行处理,确定所述子数据对应的组合顺序;对所述子数据进行解密;以及所述生成模块402,具体被构造成将解密后的所述子数据按照所述组合顺序生成所述第一终端设备传输的完整数据。In an exemplary embodiment, the device further includes: a processing module 403, configured to process the random identification of the sub-data according to random processing rules, and determine the combination sequence corresponding to the sub-data; The data is decrypted; and the generating module 402 is specifically configured to generate the complete data transmitted by the first terminal device according to the combined sequence of the decrypted sub-data.
在一个示例性实施例中,所述处理模块403,具体被构造成去除所述子数据中设定位置插入的设定的字符插入和/或设定的图片。In an exemplary embodiment, the processing module 403 is specifically configured to remove the set character insertion and/or the set picture inserted at the set position in the sub-data.
在一个示例性实施例中,所述处理模块403,还被构造成将所述第二终端设备的地址信息和端口信息插入网络切片中。In an exemplary embodiment, the processing module 403 is further configured to insert the address information and port information of the second terminal device into the network slice.
所述装置还包括:发送模块404,被构造成将携带有所述地址信息和所述端口信息的所述网络切片发送给所述第一终端设备。The apparatus further includes a sending module 404 configured to send the network slice carrying the address information and the port information to the first terminal device.
在一个示例性实施例中,所述接收模块401,还被构造成接收所述第一终端设备发送的携带有拆分规则的所述网络切片。In an exemplary embodiment, the receiving module 401 is further configured to receive the network slice carrying the splitting rule sent by the first terminal device.
所述数据传输装置包括处理器和存储器,上述接收模块、生成模块、处理模块和发送模块等均作为程序模块存储在存储器中,由处理器执行存储在存储器中的上述程序模块来实现相应的功能。The data transmission device includes a processor and a memory. The above-mentioned receiving module, generating module, processing module, and sending module are all stored in the memory as program modules, and the processor executes the above-mentioned program modules stored in the memory to realize corresponding functions. .
处理器中包含内核,由内核去存储器中调取相应的程序模块。内核可以设置一个或以上,通过调整内核参数来实现终端设备之间的数据传输。The processor contains the kernel, and the kernel calls the corresponding program module from the memory. One or more kernels can be set, and data transmission between terminal devices can be realized by adjusting kernel parameters.
本实施例提供的数据传输装置可以是如图4中所示的数据传输装置,可执行如图2中数据传输方法中第二终端设备的所有步骤,进而 实现图2所示数据传输方法的技术效果,具体请参照图2相关描述,为简洁描述,在此不作赘述。The data transmission device provided in this embodiment may be the data transmission device shown in FIG. 4, which can perform all the steps of the second terminal device in the data transmission method shown in FIG. 2 to realize the technology of the data transmission method shown in FIG. 2 For the effect, please refer to the related description in FIG. 2 for details, which is a concise description and will not be repeated here.
图5为本公开实施例提供的一种的终端设备的结构示意图,该终端设别可以是图1中的第一终端设备,图5所示的终端设备500包括:至少一个处理器501、存储器502、至少一个网络接口504和其他用户接口503。终端设备500中的各个组件通过总线系统505耦合在一起。可理解,总线系统505用于实现这些组件之间的连接通信。总线系统505除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图5中将各种总线都标为总线系统505。FIG. 5 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure. The terminal device may be the first terminal device in FIG. 1. The terminal device 500 shown in FIG. 5 includes: at least one processor 501, a memory 502. At least one network interface 504 and other user interfaces 503. The various components in the terminal device 500 are coupled together through the bus system 505. It can be understood that the bus system 505 is used to implement connection and communication between these components. In addition to the data bus, the bus system 505 also includes a power bus, a control bus, and a status signal bus. However, for the sake of clear description, various buses are marked as the bus system 505 in FIG. 5.
在一个示例性实施例中,用户接口503可以包括显示器、键盘或者点击设备(例如,鼠标,轨迹球(trackball)、触感板或者触摸屏等。In an exemplary embodiment, the user interface 503 may include a display, a keyboard, or a pointing device (for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.).
可以理解,本公开实施例中的存储器502可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的存储器502旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory 502 in the embodiment of the present disclosure may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (Random Access Memory, RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), Synchronous Link Dynamic Random Access Memory (Synchlink DRAM, SLDRAM) And Direct Rambus RAM (DRRAM). The memory 502 described herein is intended to include, but is not limited to, these and any other suitable types of memory.
在一些实施方式中,存储器502存储了如下的元素,可执行单元 或者数据结构,或者他们的子集,或者他们的扩展集:操作系统5021和应用程序5022。In some embodiments, the memory 502 stores the following elements, executable units or data structures, or their subsets, or their extended sets: operating system 5021 and application programs 5022.
在一个示例性实施例中,操作系统5021,包含各种系统程序,例如框架层、核心库层、驱动层等,用于实现各种基础业务以及处理基于硬件的任务。应用程序5022,包含各种应用程序,例如媒体播放器(MediaPlayer)、浏览器(Browser)等,用于实现各种应用业务。实现本公开实施例方法的程序可以包含在应用程序5022中。In an exemplary embodiment, the operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks. The application program 5022 includes various application programs, such as a media player (MediaPlayer), a browser (Browser), etc., which are used to implement various application services. A program that implements the method of the embodiment of the present disclosure may be included in the application program 5022.
在本公开实施例中,通过调用存储器502存储的程序或指令,具体的,可以是应用程序5022中存储的程序或指令,处理器501用于执行各方法实施例所提供的方法步骤,例如包括:In the embodiment of the present disclosure, by calling a program or instruction stored in the memory 502, specifically, a program or instruction stored in the application program 5022, the processor 501 is configured to execute the method steps provided by each method embodiment, for example, including :
按照设定的拆分规则将待传输的数据拆分为多个子数据;以及Split the data to be transmitted into multiple sub-data according to the set splitting rules; and
将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。Insert the sub-data into the network slice, and send the network slice carrying the sub-data to the second terminal device.
在一个示例性实施例中,处理器501用于执行的方法还包括:对所述子数据进行加密;按照随机处理规则为加密后的所述子数据分配随机标识。In an exemplary embodiment, the method used by the processor 501 to execute further includes: encrypting the sub-data; and assigning a random identifier to the encrypted sub-data according to a random processing rule.
在一个示例性实施例中,处理器501用于执行的方法还包括:根据所述随机标识将加密后的所述子数据拆入网络切片中。In an exemplary embodiment, the method executed by the processor 501 further includes: splitting the encrypted sub-data into network slices according to the random identification.
在一个示例性实施例中,处理器501用于执行的方法还包括:将设定的字符插入和/或设定的图片插入所述子数据中的设定位置。In an exemplary embodiment, the method used by the processor 501 to execute further includes: inserting a set character and/or a set picture into a set position in the sub-data.
在一个示例性实施例中,处理器501用于执行的方法还包括:第一终端设备根据待传输的数据的大小和当前网络参数将所述数据拆分为多个子数据。In an exemplary embodiment, the method executed by the processor 501 further includes: the first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
在一个示例性实施例中,处理器501用于执行的方法还包括:接收输入的认证信息;所述认证信息通过后向所述第二终端设备发送连接请求,以使所述第一终端设备与所述第二终端设备建立通信连接。In an exemplary embodiment, the method used by the processor 501 to execute further includes: receiving input authentication information; after the authentication information is passed, sending a connection request to the second terminal device, so that the first terminal device Establishing a communication connection with the second terminal device.
在一个示例性实施例中,处理器501用于执行的方法还包括:接收所述第二终端设备发送的携带有地址信息和端口信息的所述网络切 片。In an exemplary embodiment, the method used by the processor 501 to execute further includes: receiving the network slice carrying address information and port information sent by the second terminal device.
在一个示例性实施例中,处理器501用于执行的方法还包括:根据所述地址信息和所述端口信息将携带有拆分规则的所述网络切片发送给所述第二终端设备。In an exemplary embodiment, the method executed by the processor 501 further includes: sending the network slice carrying the splitting rule to the second terminal device according to the address information and the port information.
在一个示例性实施例中,处理器501用于执行的方法还包括:根据所述地址信息和所述端口信息将携带有所述子数据的所述网络切片发送给所述第二终端设备。In an exemplary embodiment, the method executed by the processor 501 further includes: sending the network slice carrying the sub-data to the second terminal device according to the address information and the port information.
在一个示例性实施例中,处理器501用于执行的方法还包括:接收对数据传输模式按钮的关闭触发操作,关闭数据传输模式以断开所述第一终端设备与所述第二终端设备之间的通信连接。In an exemplary embodiment, the method used by the processor 501 to execute further includes: receiving a closing trigger operation of the data transmission mode button, and closing the data transmission mode to disconnect the first terminal device and the second terminal device Communication connection between.
上述本公开实施例的方法可以应用于处理器501中,或者由处理器501实现。处理器501可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器501中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器501可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本公开实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本公开实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器502,处理器501读取存储器502中的信息,结合其硬件完成上述方法的步骤。The method in the above embodiment of the present disclosure may be applied to the processor 501 or implemented by the processor 501. The processor 501 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 501 or instructions in the form of software. The aforementioned processor 501 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present disclosure may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software units in the decoding processor. The software unit may be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory 502, and the processor 501 reads information in the memory 502, and completes the steps of the foregoing method in combination with its hardware.
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在 一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSPDevice,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。It can be understood that the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof. For hardware implementation, the processing unit can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (DSPDevice, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, and other electronics used to perform the functions described in this application Unit or its combination.
对于软件实现,可通过执行本文所述功能的单元来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。For software implementation, the technology described herein can be implemented by a unit that performs the functions described herein. The software codes can be stored in the memory and executed by the processor. The memory can be implemented in the processor or external to the processor.
本实施例提供的终端设备可以是如图5中所示的终端设备,可执行如图2中数据传输方法中第一终端设备执行的所有步骤,进而实现图2所示数据传输方法的技术效果,具体请参照图2相关描述,为简洁描述,在此不作赘述。The terminal device provided in this embodiment may be the terminal device shown in FIG. 5, which can perform all the steps performed by the first terminal device in the data transmission method shown in FIG. 2 to realize the technical effects of the data transmission method shown in FIG. 2 For details, please refer to the related description in FIG. 2, which is a concise description and will not be repeated here.
本公开实施例还提供了一种存储介质(计算机可读存储介质)。这里的存储介质存储有一个或者多个程序。其中,存储介质可以包括易失性存储器,例如随机存取存储器;存储器也可以包括非易失性存储器,例如只读存储器、快闪存储器、硬盘或固态硬盘;存储器还可以包括上述种类的存储器的组合。The embodiment of the present disclosure also provides a storage medium (computer-readable storage medium). The storage medium here stores one or more programs. Among them, the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk or solid state hard disk; the memory may also include the above-mentioned types of memory. combination.
当存储介质中一个或者多个程序可被一个或者多个处理器执行,以实现上述在数据传输设备侧执行的数据传输方法。One or more programs in the storage medium may be executed by one or more processors to implement the above-mentioned data transmission method executed on the data transmission device side.
所述处理器用于执行存储器中存储的数据传输程序,以实现以下在数据传输设备侧执行的数据传输方法的步骤:The processor is used to execute the data transmission program stored in the memory to implement the following steps of the data transmission method executed on the data transmission device side:
按照设定的拆分规则将待传输的数据拆分为多个子数据;以及Split the data to be transmitted into multiple sub-data according to the set splitting rules; and
将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。Insert the sub-data into the network slice, and send the network slice carrying the sub-data to the second terminal device.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:对所述子数据进行加密;按照随机处理规则为加密后的所述子数据分配随机标识。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: encrypting the sub-data; and assigning a random identifier to the encrypted sub-data according to a random processing rule.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:根据所述随机标识将加密后的所述子数据拆入网络切片中。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: splitting the encrypted sub-data into network slices according to the random identification.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:将设定的字符插入和/或设定的图片插入所述子数据中的设定位置。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: inserting a set character and/or a set picture into a set position in the sub-data.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:第一终端设备根据待传输的数据的大小和当前网络参数将所述数据拆分为多个子数据。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: the first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:接收输入的认证信息;所述认证信息通过后向所述第二终端设备发送连接请求,以使所述第一终端设备与所述第二终端设备建立通信连接。In an exemplary embodiment, the data transmission method executed on the data transmission device side further includes: receiving input authentication information; after the authentication information is passed, sending a connection request to the second terminal device, so that the first terminal The device establishes a communication connection with the second terminal device.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:接收所述第二终端设备发送的携带有地址信息和端口信息的所述网络切片。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: receiving the network slice that carries address information and port information sent by the second terminal device.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:根据所述地址信息和所述端口信息将携带有拆分规则的所述网络切片发送给所述第二终端设备。In an exemplary embodiment, the data transmission method executed on the data transmission device side further includes: sending the network slice carrying the split rule to the second terminal device according to the address information and the port information.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:根据所述地址信息和所述端口信息将携带有所述子数据的所述网络切片发送给所述第二终端设备。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: sending the network slice carrying the sub-data to the second terminal device according to the address information and the port information .
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:接收对数据传输模式按钮的关闭触发操作,关闭数据传输模式以断开所述第一终端设备与所述第二终端设备之间的通信连接。In an exemplary embodiment, the data transmission method executed on the data transmission device side further includes: receiving a closing trigger operation on the data transmission mode button, and closing the data transmission mode to disconnect the first terminal device and the second terminal Communication connection between devices.
图6为本公开实施例提供的另一种的终端设备的结构示意图,该数据传输装置可以是图2中的第二终端设备,如图6所示的终端设备包括:至少一个处理器601、存储器602、至少一个网络接口604和其 他用户接口603。终端设备600中的各个组件通过总线系统605耦合在一起。可理解,总线系统605用于实现这些组件之间的连接通信。总线系统605除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图6中将各种总线都标为总线系统605。FIG. 6 is a schematic structural diagram of another terminal device provided by an embodiment of the disclosure. The data transmission apparatus may be the second terminal device in FIG. 2. The terminal device shown in FIG. 6 includes: at least one processor 601, A memory 602, at least one network interface 604, and other user interfaces 603. The various components in the terminal device 600 are coupled together through the bus system 605. It can be understood that the bus system 605 is used to implement connection and communication between these components. In addition to the data bus, the bus system 605 also includes a power bus, a control bus, and a status signal bus. However, for the sake of clear description, various buses are marked as the bus system 605 in FIG. 6.
处理器601、存储器602、用户接口603、网络接口604、总线系统605与如图4中的处理器601、存储器602、其他用户接口603、网络接口604和总线系统605类似,具体可参照图4部分的相关描述,为简洁描述,在此,不作赘述。The processor 601, the memory 602, the user interface 603, the network interface 604, and the bus system 605 are similar to the processor 601, the memory 602, other user interfaces 603, the network interface 604, and the bus system 605 as shown in FIG. 4. For details, please refer to FIG. 4 Part of the related description is for concise description, so I won’t repeat it here.
在本公开实施例中,通过调用存储器602存储的程序或指令,具体的,可以是应用程序6022中存储的程序或指令,处理器601用于执行各方法实施例所提供的方法步骤,例如包括:In the embodiments of the present disclosure, by calling a program or instruction stored in the memory 602, specifically, a program or instruction stored in the application program 6022, the processor 601 is used to execute the method steps provided by each method embodiment, for example, including :
接收第一终端设备发送的携带有子数据的网络切片;根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。Receiving the network slice carrying the sub-data sent by the first terminal device; generating the complete data transmitted by the first terminal device from the network slice carrying the sub-data according to a split rule.
在一个示例性实施例中,处理器601用于执行的方法还包括:根据随机处理规则对所述子数据的随机标识进行处理,确定所述子数据对应的组合顺序;对所述子数据进行解密;将解密后的所述子数据按照所述组合顺序生成所述第一终端设备传输的完整数据。In an exemplary embodiment, the method used by the processor 601 to execute further includes: processing the random identification of the sub-data according to a random processing rule, and determining the combination sequence corresponding to the sub-data; Decryption; generating the complete data transmitted by the first terminal device according to the combined sequence of the decrypted sub-data.
在一个示例性实施例中,处理器601用于执行的方法还包括:去除所述子数据中设定位置插入的设定的字符插入和/或设定的图片。In an exemplary embodiment, the method executed by the processor 601 further includes: removing the set character insertion and/or the set picture inserted at the set position in the sub-data.
在一个示例性实施例中,处理器601用于执行的方法还包括:将所述第二终端设备的地址信息和端口信息插入网络切片中;将携带有所述地址信息和所述端口信息的所述网络切片发送给所述第一终端设备。In an exemplary embodiment, the method used by the processor 601 to execute further includes: inserting the address information and port information of the second terminal device into the network slice; The network slice is sent to the first terminal device.
在一个示例性实施例中,处理器601用于执行的方法还包括:接收所述第一终端设备发送的携带有拆分规则的所述网络切片。In an exemplary embodiment, the method executed by the processor 601 further includes: receiving the network slice carrying the splitting rule sent by the first terminal device.
上述本公开实施例揭示的方法可以应用于处理器601中,或者由 处理器601实现。处理器601可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器601中的硬件的集成逻辑电路或者软件形式的指令完成。可以实现或者执行本公开实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本公开实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器602,处理器601读取存储器602中的信息,结合其硬件完成上述方法的步骤。The methods disclosed in the foregoing embodiments of the present disclosure may be applied to the processor 601 or implemented by the processor 601. The processor 601 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by an integrated logic circuit of hardware in the processor 601 or instructions in the form of software. The methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present disclosure may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software units in the decoding processor. The software unit may be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory 602, and the processor 601 reads the information in the memory 602, and completes the steps of the foregoing method in combination with its hardware.
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSPDevice,DSPD)、可编程逻辑设备(Programmable LogicDevice,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。It can be understood that the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof. For hardware implementation, the processing unit can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (DSPDevice, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, and other electronic units used to perform the functions described in this application Or a combination thereof.
对于软件实现,可通过执行本文所述功能的单元来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。For software implementation, the technology described herein can be implemented by a unit that performs the functions described herein. The software codes can be stored in the memory and executed by the processor. The memory can be implemented in the processor or external to the processor.
本实施例提供的终端设备可以是如图6中所示的终端设备,可执行如图2中数据传输方法中第二终端设备执行的所有步骤,进而实现图2所示数据传输方法的技术效果,具体请参照图2相关描述,为简洁描述,在此不作赘述。The terminal device provided in this embodiment may be the terminal device shown in FIG. 6, which can perform all the steps performed by the second terminal device in the data transmission method shown in FIG. 2, thereby achieving the technical effects of the data transmission method shown in FIG. 2. For details, please refer to the related description in FIG. 2, which is a concise description and will not be repeated here.
本公开实施例还提供了一种存储介质(计算机可读存储介质)。这里的存储介质存储有一个或者多个程序。其中,存储介质可以包括 易失性存储器,例如随机存取存储器;存储器也可以包括非易失性存储器,例如只读存储器、快闪存储器、硬盘或固态硬盘;存储器还可以包括上述种类的存储器的组合。The embodiment of the present disclosure also provides a storage medium (computer-readable storage medium). The storage medium here stores one or more programs. The storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk, or solid-state hard disk; and the memory may also include the above-mentioned types of memory. combination.
当存储介质中一个或者多个程序可被一个或者多个处理器执行,以实现上述在数据传输设备侧执行的数据传输方法。One or more programs in the storage medium may be executed by one or more processors to implement the above-mentioned data transmission method executed on the data transmission device side.
所述处理器用于执行存储器中存储的数据传输程序,以实现以下在数据传输设备侧执行的数据传输方法的步骤:The processor is used to execute the data transmission program stored in the memory to implement the following steps of the data transmission method executed on the data transmission device side:
接收第一终端设备发送的携带有子数据的网络切片;根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。Receiving the network slice carrying the sub-data sent by the first terminal device; generating the complete data transmitted by the first terminal device from the network slice carrying the sub-data according to a split rule.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:根据随机处理规则对所述子数据的随机标识进行处理,确定所述子数据对应的组合顺序;对所述子数据进行解密;将解密后的所述子数据按照所述组合顺序生成所述第一终端设备传输的完整数据。In an exemplary embodiment, the data transmission method executed on the data transmission device side further includes: processing the random identification of the sub-data according to a random processing rule, and determining the combination sequence corresponding to the sub-data; Performing decryption; generating the complete data transmitted by the first terminal device according to the combined sequence of the decrypted sub-data.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:去除所述子数据中设定位置插入的设定的字符插入和/或设定的图片。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: removing the set character insertion and/or the set picture inserted at the set position in the sub-data.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:将所述第二终端设备的地址信息和端口信息插入网络切片中;将携带有所述地址信息和所述端口信息的所述网络切片发送给所述第一终端设备。In an exemplary embodiment, the data transmission method performed on the data transmission device side further includes: inserting the address information and port information of the second terminal device into the network slice; and carrying the address information and the port information The network slice of is sent to the first terminal device.
在一个示例性实施例中,数据传输设备侧执行的数据传输方法还包括:接收所述第一终端设备发送的携带有拆分规则的所述网络切片。In an exemplary embodiment, the data transmission method executed by the data transmission device side further includes: receiving the network slice carrying the splitting rule sent by the first terminal device.
本领域技术人员应该还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用 和设计约束条件。本领域技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。Those skilled in the art should be further aware that the units and algorithm steps of the examples described in the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of the two, in order to clearly illustrate the hardware and For the interchangeability of software, the composition and steps of each example have been generally described in accordance with the function in the above description. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the present disclosure.
结合本文中所公开的实施例描述的方法或算法的步骤可以用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。The steps of the method or algorithm described in combination with the embodiments disclosed in this document can be implemented by hardware, a software module executed by a processor, or a combination of the two. The software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all in the technical field. Any other known storage media.
以上所述的具体实施方式,对本公开的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本公开的具体实施方式而已,并不用于限定本公开的保护范围,凡在本公开的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。The specific embodiments described above further describe the purpose, technical solutions, and beneficial effects of the present disclosure in further detail. It should be understood that the above descriptions are only specific embodiments of the present disclosure, and are not intended to limit the scope of the present disclosure. The scope of protection, any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure shall be included in the scope of protection of the present disclosure.

Claims (19)

  1. 一种数据传输方法,包括:A data transmission method, including:
    第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据;以及The first terminal device splits the data to be transmitted into multiple sub-data according to the set split rule; and
    将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。Insert the sub-data into the network slice, and send the network slice carrying the sub-data to the second terminal device.
  2. 根据权利要求1所述的方法,还包括:The method according to claim 1, further comprising:
    对所述子数据进行加密;Encrypt the sub-data;
    按照随机处理规则为加密后的所述子数据分配随机标识。A random identifier is allocated to the encrypted sub-data according to the random processing rule.
  3. 根据权利要求2所述的方法,其中,所述将所述子数据插入所述网络切片中的步骤,包括:The method according to claim 2, wherein the step of inserting the sub-data into the network slice comprises:
    根据所述随机标识将加密后的所述子数据拆入网络切片中。The encrypted sub-data is split into network slices according to the random identification.
  4. 根据权利要求2所述的方法,其中,所述对所述子数据进行加密的步骤,包括:The method according to claim 2, wherein the step of encrypting the sub-data comprises:
    将设定的字符插入和/或设定的图片插入所述子数据中的设定位置。Insert the set character and/or the set picture into the set position in the sub-data.
  5. 根据权利要求1所述的方法,其中,所述第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据的步骤,包括:The method according to claim 1, wherein the step of splitting the to-be-transmitted data into a plurality of sub-data by the first terminal device according to a set splitting rule comprises:
    第一终端设备根据待传输的数据的大小和当前网络参数将所述数据拆分为多个子数据。The first terminal device splits the data into multiple sub-data according to the size of the data to be transmitted and the current network parameters.
  6. 根据权利要求1所述的方法,还包括:The method according to claim 1, further comprising:
    第一终端设备接收输入的认证信息;以及The first terminal device receives the input authentication information; and
    所述认证信息通过后向所述第二终端设备发送连接请求,以使所述第一终端设备与所述第二终端设备建立通信连接。After the authentication information is passed, a connection request is sent to the second terminal device, so that the first terminal device and the second terminal device establish a communication connection.
  7. 根据权利要求6所述的方法,其中,在所述第一终端设备与所述第二终端设备建立通信连接之后,所述方法还包括:The method according to claim 6, wherein after the first terminal device establishes a communication connection with the second terminal device, the method further comprises:
    接收所述第二终端设备发送的携带有地址信息和端口信息的所述网络切片。Receiving the network slice that carries address information and port information sent by the second terminal device.
  8. 根据权利要7所述的方法,还包括:The method according to claim 7, further comprising:
    根据所述地址信息和所述端口信息将携带有拆分规则的所述网络切片发送给所述第二终端设备。Sending the network slice carrying the split rule to the second terminal device according to the address information and the port information.
  9. 根据权利要8所述的方法,其中,所述将携带有所述子数据的所述网络切片发送给所述第二终端设备的步骤,包括:The method according to claim 8, wherein the step of sending the network slice carrying the sub-data to the second terminal device comprises:
    根据所述地址信息和所述端口信息将携带有所述子数据的所述网络切片发送给所述第二终端设备。Sending the network slice carrying the sub-data to the second terminal device according to the address information and the port information.
  10. 根据权利要1所述的方法,还包括:The method according to claim 1, further comprising:
    接收对数据传输模式按钮的关闭触发操作,关闭数据传输模式以断开所述第一终端设备与所述第二终端设备之间的通信连接。Receiving a closing trigger operation on the data transmission mode button, closing the data transmission mode to disconnect the communication connection between the first terminal device and the second terminal device.
  11. 一种数据传输方法,包括:A data transmission method, including:
    接收第一终端设备发送的携带有子数据的网络切片;以及Receiving the network slice carrying the sub-data sent by the first terminal device; and
    根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。According to the split rule, the network slice carrying the sub-data is generated to generate complete data transmitted by the first terminal device.
  12. 根据权利要求11所述的方法,其中,所述根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数 据的步骤,包括:The method according to claim 11, wherein the step of generating the complete data transmitted by the first terminal device from the network slice carrying the sub-data according to the split rule comprises:
    根据随机处理规则对所述子数据的随机标识进行处理,确定所述子数据对应的组合顺序;Process the random identification of the sub-data according to the random processing rule, and determine the combination sequence corresponding to the sub-data;
    对所述子数据进行解密;以及Decrypt the sub-data; and
    将解密后的所述子数据按照所述组合顺序生成所述第一终端设备传输的完整数据。The decrypted sub-data is generated according to the combination sequence to generate complete data transmitted by the first terminal device.
  13. 根据权利要求12所述的方法,其中,所述对所述子数据进行解密的步骤,包括:The method according to claim 12, wherein the step of decrypting the sub-data comprises:
    去除所述子数据中设定位置插入的设定的字符插入和/或设定的图片。Remove the set character insertion and/or set picture inserted at the set position in the sub-data.
  14. 根据权利要求11所述的方法,还包括:The method according to claim 11, further comprising:
    将所述第二终端设备的地址信息和端口信息插入网络切片中;以及Inserting the address information and port information of the second terminal device into the network slice; and
    将携带有所述地址信息和所述端口信息的所述网络切片发送给所述第一终端设备。Sending the network slice carrying the address information and the port information to the first terminal device.
  15. 根据权利要求11所述的方法,还包括:The method according to claim 11, further comprising:
    接收所述第一终端设备发送的携带有拆分规则的所述网络切片。Receiving the network slice carrying the split rule sent by the first terminal device.
  16. 一种数据传输装置,包括:A data transmission device includes:
    拆分模块,被构造成第一终端设备按照设定的拆分规则将待传输的数据拆分为多个子数据;以及The splitting module is configured such that the first terminal device splits the data to be transmitted into multiple sub-data according to the set splitting rule; and
    发送模块,被构造成将所述子数据插入网络切片中,将携带有所述子数据的所述网络切片发送给第二终端设备。The sending module is configured to insert the sub-data into the network slice, and send the network slice carrying the sub-data to the second terminal device.
  17. 一种数据传输装置,包括:A data transmission device includes:
    接收模块,被构造成接收第一终端设备发送的携带有子数据的网络切片;以及A receiving module configured to receive a network slice carrying sub-data sent by the first terminal device; and
    生成模块,被构造成根据拆分规则将携带有所述子数据的所述网络切片生成所述第一终端设备传输的完整数据。The generating module is configured to generate the complete data transmitted by the first terminal device from the network slice carrying the sub-data according to the split rule.
  18. 一种终端设备,其中,所述终端设备包括:处理器和存储器,所述处理器用于执行所述存储器中存储的数据传输程序,以实现权利要求1~10或权利要求11~15中任一项所述的数据传输方法。A terminal device, wherein the terminal device includes a processor and a memory, and the processor is used to execute a data transmission program stored in the memory to implement any one of claims 1-10 or claims 11-15 The data transmission method described in item.
  19. 一种存储介质,其中所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现权利要求1~10或权利要求11~15中任一项所述的数据传输方法。A storage medium, wherein the storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to implement any of claims 1-10 or claims 11-15 The data transmission method described in one item.
PCT/CN2020/098725 2019-09-11 2020-06-29 Data transmission method and apparatus, terminal device and storage medium WO2021047246A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910863180.9 2019-09-11
CN201910863180.9A CN112492549A (en) 2019-09-11 2019-09-11 Data transmission method, device, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2021047246A1 true WO2021047246A1 (en) 2021-03-18

Family

ID=74867194

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/098725 WO2021047246A1 (en) 2019-09-11 2020-06-29 Data transmission method and apparatus, terminal device and storage medium

Country Status (2)

Country Link
CN (1) CN112492549A (en)
WO (1) WO2021047246A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438645A (en) * 2021-06-29 2021-09-24 恒安嘉新(北京)科技股份公司 Data security protection method, device, medium and electronic equipment in 5G network

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018099311A1 (en) * 2016-12-02 2018-06-07 中兴通讯股份有限公司 Resource allocation method, apparatus, system and computer storage medium
CN109218046A (en) * 2017-06-30 2019-01-15 中国移动通信有限公司研究院 The management method and system and storage medium of network slice
CN109257744A (en) * 2018-11-05 2019-01-22 广东工业大学 5G data transmission method, system and 5G data send and receive device
CN109257771A (en) * 2018-11-16 2019-01-22 腾讯科技(深圳)有限公司 Transmission method, device and the equipment of business datum
WO2019075479A1 (en) * 2017-10-13 2019-04-18 Huawei Technologies Co., Ltd. Apparatus, system and method for traffic data management in wireless communications
CN110856220A (en) * 2019-11-15 2020-02-28 深圳市东方拓宇科技有限公司 Data transmission method and terminal
CN110856153A (en) * 2019-11-15 2020-02-28 深圳市东方拓宇科技有限公司 Data transmission method and terminal
CN111211901A (en) * 2020-04-22 2020-05-29 广东纬德信息科技股份有限公司 5G-based distribution network communication secure transmission method, system, device and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018099311A1 (en) * 2016-12-02 2018-06-07 中兴通讯股份有限公司 Resource allocation method, apparatus, system and computer storage medium
CN109218046A (en) * 2017-06-30 2019-01-15 中国移动通信有限公司研究院 The management method and system and storage medium of network slice
WO2019075479A1 (en) * 2017-10-13 2019-04-18 Huawei Technologies Co., Ltd. Apparatus, system and method for traffic data management in wireless communications
CN109257744A (en) * 2018-11-05 2019-01-22 广东工业大学 5G data transmission method, system and 5G data send and receive device
CN109257771A (en) * 2018-11-16 2019-01-22 腾讯科技(深圳)有限公司 Transmission method, device and the equipment of business datum
CN110856220A (en) * 2019-11-15 2020-02-28 深圳市东方拓宇科技有限公司 Data transmission method and terminal
CN110856153A (en) * 2019-11-15 2020-02-28 深圳市东方拓宇科技有限公司 Data transmission method and terminal
CN111211901A (en) * 2020-04-22 2020-05-29 广东纬德信息科技股份有限公司 5G-based distribution network communication secure transmission method, system, device and storage medium

Also Published As

Publication number Publication date
CN112492549A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
US10531289B2 (en) Secure data transmission apparatus and method
CN107483383B (en) Data processing method, terminal, background server and storage medium
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
US8447970B2 (en) Securing out-of-band messages
US7890760B2 (en) Secure method of termination of service notification
AU2012367314B2 (en) Secure peer discovery and authentication using a shared secret
WO2016011778A1 (en) Data processing method and apparatus
US11108548B2 (en) Authentication method, server, terminal, and gateway
US10135618B2 (en) Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications
BRPI0418366B1 (en) SYSTEM AND METHOD FOR GENERATING REPRODUCABLE SESSION KEYS
WO2016015573A1 (en) Method, device and system for terminal to establish connection
US10097524B2 (en) Network configuration method, and related apparatus and system
WO2022111187A1 (en) Terminal authentication method and apparatus, computer device, and storage medium
TW200421812A (en) System and method for securing digital messages
TW201334595A (en) A method for encrypting a short message of mobile communicating
CN106685897B (en) Safe input method, device and system
WO2017004828A1 (en) Method and device for upgrading cryptographic algorithm
WO2021047246A1 (en) Data transmission method and apparatus, terminal device and storage medium
CN113992427A (en) Data encryption sending method and device based on adjacent nodes
WO2024032289A1 (en) Video playback method and system, video security platform, and communication device
CN112187726A (en) Data transmission method, device, storage medium and terminal
WO2014089968A1 (en) Virtual machine system data encryption method and device
CN115225389A (en) Communication encryption method, device, equipment and storage medium
CN106936686A (en) A kind of immediate communication platform for supporting safety moving to handle official business
CN115021919A (en) SSL negotiation method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20862500

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20862500

Country of ref document: EP

Kind code of ref document: A1