Unlock instant, AI-driven research and patent intelligence for your innovation.

Data transmission control method, device, computer equipment and storage medium

A technology of data transmission pipe and transmission scheme, applied in the fields of data transmission control method, device, computer equipment and storage medium, can solve the problems of intrusion, high maintenance cost and low efficiency, and achieve comprehensive collection, low maintenance cost and high efficiency Effect

Active Publication Date: 2022-04-12
深圳红途科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are three ways to collect user behavior data and application transmission data uploaded by the terminal and transmit them through the network. One is to use preset application program burying points or secondary development fixed-point collection solutions to collect user behavior data and application transmission data. However, this method requires secondary development for each designated collection point, and the development and maintenance costs are extremely high, because each collection requires secondary development, code modification and operation, which is intrusive to the original business; The data collection switch needs to be maintained on the code, and the data collection objects cannot be dynamically configured and adjusted interactively, such as only collecting user behavior data and application transmission data of specified users, specified interfaces, and specified application services. For large-scale collection of user behavior data and application transmission data, there are no technical means and solutions for network availability and data transmission security; the second method is to collect user behavior data and application transmission data by analyzing network traffic. The traffic and data content of some private protocols cannot be analyzed, and the network traffic analysis cannot be performed due to the undisclosed fields and standards of private protocols, so traffic analysis and data analysis cannot be performed, and the application interface of the application system and the restored transmission data cannot be analyzed. Encrypted traffic cannot be parsed, because the deployment mode limits the range of application transmission data that can be collected, only part of the data accessed by users can be collected, and data calls between terminals cannot be collected. Road deployment and network agent deployment will increase the complexity of the network architecture, increase the difficulty of network operation and maintenance, reduce the efficiency of troubleshooting, and reduce the reliability and availability of the overall network, and the data cannot be analyzed through interactive data collection strategies. Manage and control the collected objects, such as through collection frequency, data content, etc. Another way is to collect application transmission data by setting up an application security gateway. In this way, applications that are not included in the scope of the application gateway cannot be collected. In the gateway range, only user access data can be collected, and data transmission between applications cannot be collected. The existing application system architecture needs to be adjusted, which has a very large impact, and it is impossible to use interactive data collection strategies for data collection objects. For management and control, such as through collection frequency, data content, etc.; when the second and third methods are collecting, processing and transmitting the transmission data of the terminal, because a large amount of collected data needs to be transmitted through the network, the network may The transmission of a large amount of data will cause network congestion, which may cause the delay and jitter of the entire network, or cause network paralysis, resulting in delay or unavailability on the network; during the long-distance transmission of data, security-related measures such as encryption are not carried out, which may be Hijacking and acquisition, followed by data leakage
[0004] To sum up, the current collection and transmission methods of user behavior data and application transmission data cannot be controlled, the collection is complicated and not flexible enough, the efficiency is low, and the maintenance cost is high, and network delays or unavailability are prone to occur when large amounts of data are transmitted. , and prone to information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission control method, device, computer equipment and storage medium
  • Data transmission control method, device, computer equipment and storage medium
  • Data transmission control method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0057] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data transmission management and control method, device, computer equipment and storage medium. The method includes obtaining a collection strategy from a management terminal; setting the actual collection strategy by using a switch mode according to the collection strategy; using byte enhancement technology to intercept access data, and Obtain the intercepted data; collect user behavior data and application transmission data for the intercepted data according to the actual collection strategy to obtain the target data; cache the target data; obtain the dynamic management strategy and secure transmission strategy from the management side; according to the dynamic management strategy and secure transmission Policies transfer target data. The invention realizes the controllable collection of user behavior data and application transmission data, and the collection is more comprehensive, simple and flexible, with high efficiency and low maintenance cost; a dynamic management strategy based on network conditions and a secure transmission strategy for encrypting channels and data are adopted Manage and control data transmission to ensure network availability during data transmission and avoid information leakage.

Description

technical field [0001] The present invention relates to a computer, and more specifically refers to a data transmission management and control method, device, computer equipment and storage medium. Background technique [0002] When conducting network security and data security control, it is necessary to conduct big data real-time analysis, security analysis, traceability analysis, and evidence collection on user behavior data and application transmission data. Gradually, the demand is also increasing. In addition to the data collection itself, how to transmit the large amount of collected data through the network and ensure the availability of the network and the security of the data during the transmission process is a challenge. [0003] At present, there are three ways to collect user behavior data and application transmission data uploaded by the terminal and transmit them through the network. One is to use preset application program burying points or secondary develop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/306H04L63/20H04L63/0428
Inventor 刘新凯
Owner 深圳红途科技有限公司