[go: up one dir, main page]

CN111131446A - Data sending method and device, computer equipment and medium - Google Patents

Data sending method and device, computer equipment and medium Download PDF

Info

Publication number
CN111131446A
CN111131446A CN201911338391.7A CN201911338391A CN111131446A CN 111131446 A CN111131446 A CN 111131446A CN 201911338391 A CN201911338391 A CN 201911338391A CN 111131446 A CN111131446 A CN 111131446A
Authority
CN
China
Prior art keywords
file
transmission
fragmented
sending
fragment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911338391.7A
Other languages
Chinese (zh)
Other versions
CN111131446B (en
Inventor
张海鹰
周海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gupanchuangshi Science And Technology Development Co ltd
Original Assignee
Beijing Gupanchuangshi Science And Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gupanchuangshi Science And Technology Development Co ltd filed Critical Beijing Gupanchuangshi Science And Technology Development Co ltd
Priority to CN201911338391.7A priority Critical patent/CN111131446B/en
Publication of CN111131446A publication Critical patent/CN111131446A/en
Application granted granted Critical
Publication of CN111131446B publication Critical patent/CN111131446B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method, a device, computer equipment and a medium for data transmission, wherein the method comprises the following steps: a sending end carries out fragment processing on a file to be transmitted so as to obtain at least two fragment files; the sending end determines a transmission strategy for each fragment file according to the comprehensive information; the sending end sends each fragment file to a receiving end according to the transmission strategy; and the sending end sends the transmission strategy to a receiving end. In the embodiment of the application, after a complete transmission file is fragmented, the corresponding transmission link is selected for each fragmented file according to the comprehensive information, and the fragmented files are transmitted to the receiving end through different transmission links, so that the complete transmission file cannot be obtained even if the fragmented files are intercepted, and data leakage caused by the intercepted data in the transmission process is reduced.

Description

Data sending method and device, computer equipment and medium
Technical Field
The present application relates to the field of data transmission, and in particular, to a method, an apparatus, a computer device, and a medium for data transmission.
Background
Cloud storage is a new concept derived from cloud computing, is an emerging network storage technology, and is an online storage mode. In order to improve the running speed of the local device, a general user can select to store data through cloud storage, so that the data storage capacity of the local device is reduced, and the running speed of the local device is improved.
In the process of cloud storage, data to be stored is generally transmitted to a cloud storage server through a fixed transmission link, but in this unchangeable storage manner, a hacker or an adversary can easily acquire uploaded data, and the security of data transmission is reduced.
Disclosure of Invention
In view of this, an object of the present application is to provide a method, an apparatus, a computer device and a medium for data transmission, so as to solve the problem of how to improve security of data transmission in the prior art.
In a first aspect, an embodiment of the present application provides a method for data transmission, including:
a sending end carries out fragment processing on a file to be transmitted so as to obtain at least two fragment files;
the sending end determines a transmission strategy for each fragment file according to the comprehensive information;
the sending end sends each fragment file to a receiving end according to the transmission strategy;
and the sending end sends the transmission strategy to a receiving end.
Optionally, the comprehensive information includes one or more of the following information: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
Optionally, when the comprehensive information is sending environment information for a sending end to send fragmented files, the sending end determines a transmission policy for each fragmented file according to the comprehensive information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information.
Optionally, when the comprehensive information is attribute information of a fragmented file, the sending end determines a transmission policy for each fragmented file according to the comprehensive information, including:
and the sending end determines a transmission strategy for each fragment file according to the attribute information of each fragment file.
Optionally, the attribute information includes any one or more of the following: the quality condition of the fragmented files, the confidentiality condition of the fragmented files and the classification condition of the fragmented files.
Optionally, the determining, by the sending end, a transmission policy for each fragmented file according to the attribute information of each fragmented file includes:
and aiming at each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
Optionally, when the comprehensive information is attribute information of a fragmented file and sending environment information of a sending end sending the fragmented file, the sending end determines a transmission policy for each fragmented file according to the comprehensive information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information and the attribute information of each fragment file.
Optionally, the determining, by the sending end, a transmission policy for each fragmented file according to the sending environment information and the attribute information of each fragmented file includes:
the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
and aiming at each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
In a second aspect, an embodiment of the present application provides an apparatus for data transmission, including:
the fragment module is used for carrying out fragment processing on the file to be transmitted by the transmitting end to obtain at least two fragment files;
the first determining module is used for determining a transmission strategy for each fragment file by the sending end according to the comprehensive information;
the first sending module is used for sending each fragment file to a receiving end by the sending end according to the transmission strategy;
and the second sending module is used for sending the transmission strategy to a receiving end by the sending end.
In a third aspect, an embodiment of the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the steps of the above method when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, performs the steps of the above method.
The embodiment of the application provides a data sending method, which comprises the steps that firstly, a sending end carries out fragment processing on a file to be transmitted to obtain at least two fragment files; secondly, the sending end determines a transmission strategy for each fragment file according to the comprehensive information; thirdly, the sending end sends each fragment file to a receiving end according to the transmission strategy; and finally, the transmitting end transmits the transmission strategy to a receiving end.
In the prior art, a complete file is sent to a receiving end through a fixed transmission link, and a hacker or an adversary can easily acquire the file in the transmission process, so that data in the file is leaked. In the method, after a complete transmission file is fragmented, the corresponding transmission link is selected for each fragmented file according to the environment information, and the fragmented files are transmitted to the receiving end through different transmission links, so that the complete transmission file cannot be obtained even if the fragmented files are intercepted, and data leakage caused by the intercepted data in the transmission process is reduced.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic basic flowchart of a data transmission method according to an embodiment of the present application;
fig. 2 is a schematic basic flowchart of a method for determining a transmission policy according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a computer device 400 according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
In the prior art, in order to increase the security of data transmission, only data to be transmitted is encrypted, and the encrypted data is transmitted to a cloud storage server by using a fixed transmission link, however, when data transmission is performed by using the transmission method, the transmission link is unchanged, which easily causes the transmitted data to be acquired by hackers or enemies, especially, the data transmitted by troops or the data transmitted by public security authorities have high confidentiality, and once the data is leaked, a significant loss is caused.
Based on the above problem, as shown in fig. 1, an embodiment of the present application provides a method for data transmission, including:
s101, a sending end carries out fragment processing on a file to be transmitted to obtain at least two fragment files;
s102, the sending end determines a transmission strategy for each fragment file according to sending environment information;
s103, the sending end sends each fragment file to the receiving end according to the transmission strategy;
and S104, the sending end sends the transmission strategy to the receiving end.
In the step S101, the sending end may be a device that implements a data transceiving function, for example, a computer, a mobile phone, a tablet computer, and the like, which is not limited herein. The file to be transmitted may be data to be stored, such as documents, audio, video, pictures, etc., and the application is not limited thereto. The fragment processing may be to cut the complete file by a preset cutting rule, where the preset cutting rule may be pre-stored in the sending end, and the preset cutting rule may be determined according to an actual situation, for example, the preset cutting rule may averagely cut the complete file into n parts, or the preset cutting rule may cut the complete file according to a certain ratio (the ratio is 1:2:3, etc.). When the file is fragmented, the complete file is obtained by cutting the complete file according to a preset rule, and if the complete file is cut into 3 parts according to the preset rule, a fragmented file 1, a fragmented file 2 and a fragmented file 3 are generated. In the application, data transmission is real-time transmission, and the condition of asynchronization does not exist between every two fragmented files.
Specifically, the leakage of transmission data can be caused by interception by a hacker or an enemy in the process of transmitting the complete file, the complete file to be transmitted can be cut into a plurality of fragments in order to improve the security of data transmission, even if the complete file to be transmitted is intercepted in the process of fragment transmission, the intercepted file is not the complete transmission file, and the leakage of the transmitted file is reduced because the intercepted file is incomplete. The file is fragmented, and the whole large file is divided into a plurality of small files, so that the transmission pressure of a transmission link can be reduced, and the data transmission efficiency is improved.
In the step S102, the integrated information may include one or more of the following information: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file. The sending environment information may be information of an environment where the sending end sends the file to be transmitted, and the sending environment information may include any one or more of the following: the position of the sending end when sending the fragment file and the time when the sending end sends the fragment file. The transmission policy may be a transmission link selected by the transmitting end for each fragmented file according to the transmission environment information. A transmission link may be a path for a user to transmit data between a transmitting end and a receiving end. The transmission link may include a variety of forms, such as: the transmission link adopts a WiFi link, the transmission link adopts a mobile communication link, the transmission link adopts a satellite link and the like. The WiFi link needs to be provided with WiFi modules at the sending end and the receiving end, and the sending end and the receiving end are connected to the WiFi network through the WiFi modules, so that data interaction of the sending end and the receiving end is realized. The mobile communication link needs to install mobile communication modules at the sending end and the receiving end, the mobile communication modules can be 2G modules, 3G modules, 4G modules or 5G modules, and the like, and data interaction between the sending end and the receiving end is realized through a mobile communication technology. The satellite link needs to install satellite modules at the sending end and the receiving end, the satellite modules can realize data interaction between the sending end and the receiving end through a satellite transmission technology, and the satellite transmission technology can realize remote data transmission by using an artificial satellite. Each form of transmission link may include at least one transmission link. The attribute information includes any one or more of the following: the quality condition of the fragmented files, the confidentiality condition of the fragmented files, and the classification condition of the fragmented files. The quality condition of the fragmented files can be the size of the fragmented files, the size of the fragmented files can be distinguished according to a preset numerical value, the quality of the fragmented files is high when the size of the fragmented files exceeds the preset numerical value, the quality of the fragmented files is low when the size of the fragmented files does not exceed the preset numerical value, the preset numerical value can be manually specified, and the fragmented files can be determined according to actual conditions. The secrecy of the fragmented files may be artificially defined, and the fragmented files may be divided into files with high secrecy and files with low secrecy. The classification of the fragmented files may be divided according to the form of fragmented text, such as voice files, video files, picture files, text files, and the like, which is not limited herein.
Specifically, when the sending end sends the fragmented files, the sending end may select a corresponding transmission link according to the environment where the sending end is located. The sending end can select the corresponding transmission link according to the current position, or the sending end can select the corresponding transmission link according to the current time for sending the file to be transmitted.
The step S102 includes:
step 1021, for each fragmented file, the sending end determines a transmission policy for transmitting the fragmented file in the transmission link table according to the current sending environment information.
In the above step 1021, the sending environment information and the transmission link identifier in the transmission link table are stored in association.
Specifically, after the sending end determines the sending environment information of the file to be sent currently, the sending end finds the transmission link corresponding to the sending environment information in the transmission link table, and then determines the transmission link of the fragmented file.
For example, the current sending environment information is 10: 30, there are two fragment files, that is, fragment file 1 and fragment file 2, and the transmission link list is shown in table 1, then it is determined that the transmission link of fragment file 1 can be transmission link 4, and the transmission link of fragment file 2 can be transmission link 5, according to the current sending environment information.
TABLE 1
Time information Transmission link
8:00-10:00 1、2、3
10:00-12:00 4、5、6
12:00-14:00 7、8、9
14:00-16:00 10、11、12
In order to make the determination of the transmission link of the fragmented file more accurate, the transmission link of the fragmented file may also be determined by a combination of different transmission environment information.
For example, the sending environment information of the fragment file includes a time when the fragment file is sent and a position where the fragment file is sent, there are two fragment files, which are fragment file 1 and fragment file 2, respectively, the sending end sends the fragment file 1 at a location a, the sending time is 8: 30 minutes, the sending end sends the fragment file 2 at a location B, the sending time is 13: 20 minutes, and the transmission link list is shown in table 2, it is determined that the transmission link of the fragment file 1 may be transmission link 2, and the transmission link of the fragment file 2 may be transmission link 7, according to the sending environment information of each fragment file.
TABLE 2
Figure BDA0002331588120000081
In the above step S103, after determining the transmission link of each fragmented file in step S102, the sending end sends the fragmented file to the receiving end through the corresponding transmission link according to the determined transmission link.
In step S104, after the sending end sends the fragmented files to the receiving end, the receiving end does not know which fragmented files can form a complete file, and therefore, the sending end needs to send the transmission policy to the receiving end, so that the receiving end integrates the corresponding fragmented files according to the transmission policy to obtain the complete file.
In the embodiment of the application, through the four steps, after a complete transmission file is fragmented, the corresponding transmission link is selected for each fragmented file according to the comprehensive information, the fragmented files are transmitted to the receiving end through different transmission links, even if the fragmented files are intercepted, the complete transmission file cannot be obtained, and data leakage caused by the fact that data in the transmission process are intercepted is reduced.
Besides considering the sending environment information of the sending end to determine the transmission strategy for the fragmented files, the method can also consider the attribute information of the fragmented files, and the application also provides another data sending method, which comprises the following steps:
and 105, the transmitting end determines a transmission strategy for each fragment file according to the attribute information of each fragment file.
In the above step 105, the meaning of the attribute information may refer to the meaning of the attribute information mentioned above.
Specifically, step 105 includes:
step 1051, for each fragmented file, the sending end determines a transmission policy for transmitting the fragmented file in a transmission link list according to the attribute information of the fragmented file.
In the above step 1051, the attribute information of the fragment file in the transmission link list and the transmission link identifier are stored in association.
Specifically, in the transmission link list, the sending end selects one transmission link from the transmission links corresponding to the attribute information of the fragmented file.
For example, the attribute information of the fragmented files is the confidentiality of the fragmented files, two fragmented files are provided, namely, fragmented file 1 and fragmented file 2, the confidentiality of fragmented file 1 is high, the confidentiality of fragmented file 2 is low, and the transmission link list is shown in table 3, so that it is determined that the transmission link of fragmented file 1 can be transmission link 1, and the transmission link of fragmented file 2 can be transmission link 4, according to the confidentiality of each fragmented file.
TABLE 3
Attribute information Transmission link
High security 1、2、3
Low security 4、5、6
In order to make the determination of the transmission link of the fragmented file more accurate, the transmission link of the fragmented file may also be determined by a combination of different attribute information.
For example, the attribute information of the fragmented file includes the confidentiality of the fragmented file and the quality of the fragmented file, there are two fragmented files, namely fragmented file 1 and fragmented file 2, the confidentiality of fragmented file 1 is high, the quality of fragmented file 1 is 1005KB, the confidentiality of fragmented file 2 is low, and the quality of fragmented file 2 is 300KB, and the transmission link list is shown in table 4, so that it is determined that the transmission link of fragmented file 1 can be transmission link 2, and the transmission link of fragmented file 2 can be transmission link 7, according to the confidentiality and the quality of each fragmented file.
TABLE 4
Figure BDA0002331588120000091
Figure BDA0002331588120000101
In addition to the determination of the transmission link through the combination of two attribute information and the determination of the transmission link through the combination of three attribute information given in the above example, the determination method may refer to the above step of determining the transmission link, and will not be described too much here.
In order to make the transmission of fragmented files more uncertain and to reduce the interception of fragmented files in the transmission link, a transmission policy may be determined for each fragmented file by sending a combination of the environment information and the attribute information of the fragmented file. The application provides another data transmission method, which comprises the following steps:
and 106, the sending end determines a transmission strategy for each fragmented file according to the sending environment information and the attribute information of each fragmented file.
In step 106, a corresponding transmission link is specifically determined for each fragmented file according to the sending status information and the attribute information corresponding to each fragmented file.
As shown in fig. 2, in step 106, an embodiment of the present application provides a method for determining a transmission policy, including:
s1061, the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
s1062, for each fragmented file, the sending end determines, according to the attribute information of the fragmented file, a transmission policy for transmitting the fragmented file in the transmission link list.
In the above step S1061, the transmission link library sends the environment information and the transmission link list for key storage, and the attribute information of the fragment file and the transmission link identifier in the transmission link list are stored in association.
Specifically, a transmission link list corresponding to the current sending environment information is found in a transmission link library according to the sending environment information of the current sending fragmented file of the sending end. By sending the combination of the environment information and the fragmented files, the transmission link can be timely changed, and the possibility of intercepting the fragmented files can be further reduced.
For example, when the sending environment information is the place a, a transmission link list for performing associated storage on the confidentiality of the fragmented file and the transmission link identifier can be determined in the transmission link library; when the sending environment information is the site B, a transmission link list in which the quality of the fragmented files and the transmission link identifiers are stored in association can be determined in the transmission link library.
In the above step S1062, after the transmission link list is determined in step S1061, the transmission link of each fragmented file can be determined according to the attribute information of the fragmented file.
It will be appreciated from the above discussion that determining the transmission link for fragmented files may include any one or more of the following: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
The transmission link can be randomly selected to transmit the fragmented files, so that the unit ensures that the receiving end can arrange the fragmented files into a complete file, and the transmitting end is required to transmit the randomly determined transmission strategy to the receiving end. The random determination of the transmission link can also reduce the possibility of intercepting the transmission file, and further reduce the possibility of leaking the data corresponding to the complete file.
In the prior art, there may also be a transit node having a connection relationship with the transmission link, and the intermediate node may include a base station, a server, a terminal device, a router, and the like, which is not limited herein. Transit nodes may be used to cache data. When one transmission link and one transit node are in a one-to-one correspondence relationship, the transit node does not need to be selected in the process of transmitting fragmented files. However, when one transmission link corresponds to a plurality of relay nodes, in order to more effectively improve the security of data transmission, the relay nodes may be determined for each fragmented file according to the integrated information, that is, the determination of the transmission policy includes determining the transmission link and determining the relay nodes.
In the process of transmitting fragmented files, when one transmission link corresponds to a plurality of transfer nodes, for one fragmented file, a transmission link corresponding to the fragmented file is determined according to the data transmission method, and then a transfer node is determined from the transfer nodes corresponding to the determined transmission link according to the current sending environment information and/or the attribute information of the fragmented file to transmit the fragmented file.
As shown in fig. 3, an embodiment of the present application provides an apparatus for data transmission, including:
a fragmentation module 301, configured to perform fragmentation processing on a file to be transmitted by a sending end to obtain at least two fragmented files;
a first determining module 302, configured to determine, by the sending end, a transmission policy for each fragmented file according to the comprehensive information;
a first sending module 303, configured to send each fragmented file to a receiving end according to the transmission policy by a sending end;
a second sending module 304, configured to send the transmission policy to the receiving end by the sending end.
Optionally, the comprehensive information includes one or more of the following information: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
Optionally, when the comprehensive information is sending environment information for sending a fragmented file by a sending end, the first determining module 302 includes: a first determination unit;
the first determining unit is configured to determine, by the sending end, a transmission policy for each fragmented file according to the sending environment information.
Optionally, when the comprehensive information is attribute information of a fragmented file, the first determining module 302 includes: a second determination unit;
the second determining unit is configured to determine, by the sending end, a transmission policy for each fragmented file according to the attribute information of each fragmented file.
Optionally, the attribute information includes any one or more of the following: the quality condition of the fragmented files, the confidentiality condition of the fragmented files, and the classification condition of the fragmented files.
Optionally, when the sending end determines the transmission policy for each fragmented file according to the attribute information of each fragmented file, the second determining unit includes:
and for each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
Optionally, when the comprehensive information is attribute information of a fragmented file and sending environment information of a fragmented file sent by a sending end, the first determining module 302 includes: a third determination unit;
the third determining unit is configured to determine, by the sending end, a transmission policy for each fragmented file according to the sending environment information and the attribute information of each fragmented file.
Optionally, when the sending end determines a transmission policy for each fragmented file according to the sending environment information and the attribute information of each fragmented file, the third determining unit includes:
the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
and for each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
Corresponding to the method of data transmission in fig. 1, an embodiment of the present application further provides a computer device 400, as shown in fig. 4, the device includes a memory 401, a processor 402, and a computer program stored on the memory 401 and executable on the processor 402, wherein the processor 402 implements the steps of the method of data transmission when executing the computer program.
Specifically, the memory 401 and the processor 402 can be general memories and processors, which are not specifically limited herein, and when the processor 402 runs a computer program stored in the memory 401, the method for sending data can be executed, so as to solve the problem of how to improve the security of data transmission in the prior art.
Corresponding to the method of data transmission in fig. 1, the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program is executed by a processor to perform the steps of the method of data transmission.
Specifically, the storage medium can be a general storage medium, such as a mobile disk, a hard disk, and the like, and when a computer program on the storage medium is executed, the method for sending data can be executed, so as to solve the problem of how to improve the security of data transmission in the prior art.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. A method of data transmission, comprising:
a sending end carries out fragment processing on a file to be transmitted so as to obtain at least two fragment files;
the sending end determines a transmission strategy for each fragment file according to the comprehensive information;
the sending end sends each fragment file to a receiving end according to the transmission strategy;
and the sending end sends the transmission strategy to a receiving end.
2. The method of claim 1, wherein the aggregated information comprises one or more of the following: and the sending end sends the sending environment information of the fragment file and the attribute information of the fragment file.
3. The method of claim 2, wherein when the integrated information is transmission environment information for a transmitting end to transmit fragmented files, the transmitting end determines a transmission policy for each fragmented file according to the integrated information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information.
4. The method of claim 2, wherein when the integrated information is attribute information of fragmented files, the determining, by the sending end, a transmission policy for each fragmented file according to the integrated information comprises:
and the sending end determines a transmission strategy for each fragment file according to the attribute information of each fragment file.
5. The method of claim 4, wherein the attribute information comprises any one or more of: the quality condition of the fragmented files, the confidentiality condition of the fragmented files and the classification condition of the fragmented files.
6. The method of claim 4, wherein the determining, by the sender, a transmission policy for each fragmented file according to the attribute information of each fragmented file comprises:
and aiming at each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
7. The method of claim 2, wherein when the integrated information is attribute information of fragmented files and transmission environment information of fragmented files transmitted by a transmitting end, the transmitting end determines a transmission policy for each fragmented file according to the integrated information, including:
and the sending end determines a transmission strategy for each fragment file according to the sending environment information and the attribute information of each fragment file.
8. The method of claim 7, wherein the determining, by the sender, a transmission policy for each fragmented file according to the sending environment information and attribute information of each fragmented file comprises:
the sending end screens out a transmission link list corresponding to the environment information from a transmission link library according to the sending environment information;
and aiming at each fragment file, the sending end determines a transmission strategy for transmitting the fragment file in a transmission link list according to the attribute information of the fragment file.
9. An apparatus for data transmission, comprising:
the fragment module is used for carrying out fragment processing on the file to be transmitted by the transmitting end to obtain at least two fragment files;
the first determining module is used for determining a transmission strategy for each fragment file by the sending end according to the comprehensive information;
the first sending module is used for sending each fragment file to a receiving end by the sending end according to the transmission strategy;
and the second sending module is used for sending the transmission strategy to a receiving end by the sending end.
10. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of the preceding claims 1-8 are implemented when the computer program is executed by the processor.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of the claims 1 to 8.
CN201911338391.7A 2019-12-23 2019-12-23 Data sending method and device, computer equipment and medium Active CN111131446B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911338391.7A CN111131446B (en) 2019-12-23 2019-12-23 Data sending method and device, computer equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911338391.7A CN111131446B (en) 2019-12-23 2019-12-23 Data sending method and device, computer equipment and medium

Publications (2)

Publication Number Publication Date
CN111131446A true CN111131446A (en) 2020-05-08
CN111131446B CN111131446B (en) 2022-12-13

Family

ID=70501263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911338391.7A Active CN111131446B (en) 2019-12-23 2019-12-23 Data sending method and device, computer equipment and medium

Country Status (1)

Country Link
CN (1) CN111131446B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2023576A2 (en) * 2007-04-12 2009-02-11 Siemens Aktiengesellschaft Method and system for providing services tailored for subscribers
CN104601826A (en) * 2009-05-26 2015-05-06 苹果公司 Space & time based device customization
CN105245612A (en) * 2015-10-27 2016-01-13 惠州Tcl移动通信有限公司 File transmission method and system of terminal
CN106330920A (en) * 2016-08-26 2017-01-11 中国科学院半导体研究所 A secure communication method based on multi-channel signal fragmentation transmission technology
CN106557518A (en) * 2015-09-29 2017-04-05 北大方正集团有限公司 A kind of method for transmitting file, device and terminal
CN106559413A (en) * 2016-10-19 2017-04-05 深圳众享互联科技有限公司 The message fragment method and its system of P2P network data securities transmission
CN107277837A (en) * 2017-05-22 2017-10-20 南京邮电大学 A kind of public network system of selection based on when and where
US20180337993A1 (en) * 2017-05-22 2018-11-22 Microsoft Technology Licensing, Llc Sharding over multi-link data channels
CN109120683A (en) * 2018-08-01 2019-01-01 Oppo广东移动通信有限公司 data transmission method and related product

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2023576A2 (en) * 2007-04-12 2009-02-11 Siemens Aktiengesellschaft Method and system for providing services tailored for subscribers
CN104601826A (en) * 2009-05-26 2015-05-06 苹果公司 Space & time based device customization
CN106557518A (en) * 2015-09-29 2017-04-05 北大方正集团有限公司 A kind of method for transmitting file, device and terminal
CN105245612A (en) * 2015-10-27 2016-01-13 惠州Tcl移动通信有限公司 File transmission method and system of terminal
CN106330920A (en) * 2016-08-26 2017-01-11 中国科学院半导体研究所 A secure communication method based on multi-channel signal fragmentation transmission technology
CN106559413A (en) * 2016-10-19 2017-04-05 深圳众享互联科技有限公司 The message fragment method and its system of P2P network data securities transmission
CN107277837A (en) * 2017-05-22 2017-10-20 南京邮电大学 A kind of public network system of selection based on when and where
US20180337993A1 (en) * 2017-05-22 2018-11-22 Microsoft Technology Licensing, Llc Sharding over multi-link data channels
CN109120683A (en) * 2018-08-01 2019-01-01 Oppo广东移动通信有限公司 data transmission method and related product

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吕阳等: "基于覆盖网络的多路径数据传输系统", 《网络新媒体技术》 *

Also Published As

Publication number Publication date
CN111131446B (en) 2022-12-13

Similar Documents

Publication Publication Date Title
US10915822B2 (en) Complex event processing method, apparatus, and system
CN107332876B (en) Method and device for synchronizing state of blockchain
EP2790358A1 (en) Anonymous friend-making method, system, network server and storage medium
CN108881354B (en) Push information storage method and device, server and computer storage medium
CN108683668B (en) Resource checking method, device, storage medium and equipment in content distribution network
CN104065540A (en) Data monitoring system and method
CN103618733A (en) Data filtering system and method applied to mobile internet
US9935861B2 (en) Method, system and apparatus for detecting instant message spam
CN108710547B (en) Data backup method, device, terminal and storage medium
US11720433B2 (en) System and method for data error notification in interconnected data production systems
CN109756528A (en) Control method for frequency and device, equipment, storage medium, server
US20190065534A1 (en) Method and device for data deduplication
CN112817602A (en) JSON format data sending and receiving method, device and medium
CN105991407A (en) Message processing method, message processing device and processing server
CN107241312B (en) A kind of right management method and device
CN115292729B (en) Privacy protection multiparty data processing method, device and equipment
CN104639394A (en) Statistical method, device and system for number of users of client
CN111131446B (en) Data sending method and device, computer equipment and medium
CN102905236A (en) Method, device and system for monitoring spam short messages
CN106101079A (en) A kind of method and system realizing encrypted signature
CN114793172B (en) A private message processing method and system
CN110618989A (en) Information processing method, information processing device and related product
CN104506424B (en) The notification method of linkman state and notice device in instant messaging
JP2011234345A (en) Method of extracting object from dm client and device management system associated therewith
KR100962045B1 (en) Message filtering device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant