Data transmission method and device
A data transmission method and data technology, applied in the field of communication, can solve the problems of data leakage, slow transmission rate, limitation, etc., and achieve the effect of preventing malicious theft of secrets and improving the data transmission rate.
Pending Publication Date: 2021-10-15
北京深度吉通信息技术有限公司
4 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0003] The existing technology usually uses VPN (Virtual Private Network, virtual private network) for data transmission, but this data transmission method not ...
Abstract
The embodiment of the invention discloses a data transmission method and device. The method comprises the steps of performing encryption compression on acquired to-be-transmitted data according to a first defined password to obtain first data, then determining a plurality of first data blocks and connection information corresponding to the first data blocks, and performing encryption on the first data blocks and the connection information corresponding to the first data blocks according to a second defined password to obtain second data, and determining a plurality of target e-mail service providers according to the plurality of second data, and sending the plurality of second data to the target e-mail receiving accounts of the plurality of target e-mail service providers, so as to improve the data transmission rate, protect the transmission data and prevent malicious secret stealing.
Application Domain
Data switching networks
Technology Topic
Data transmissionService provider +7
Image
Examples
- Experimental program(1)
Example Embodiment
[0046] The present invention is described below based on the examples, but the present invention is not limited to these examples. In the detailed description of the invention, some particular detail portions are described in detail. The description of these detail portions can also be fully understood in the art. In order to avoid obscuring the substance of the present invention, the methods, processes, processes, components, and circuits are not described in detail.
[0047] In addition, one of ordinary skill in the art will appreciate that the accompanying drawings herein are for illustrative purposes, and the accompanying drawings are not necessarily drawn.
[0048] Unless the context clearly requires, "including", "including", "including", "including", "including", ", including", etc., should be interpreted as the meaning of the meaning of "including", "including", "including but not limited to," in the "including" of the specification rather than exclusive or exhaustive;
[0049] In the description of the invention, it is to be understood that the terms "first", "second", etc. are used only to describe purposes, and cannot be understood as instructions or implies relative importance. Moreover, in the description of the invention, the meaning of "multiple" is two or more unless otherwise stated.
[0050] figure 1 A flowchart of a data transmission method according to an embodiment of the present invention. like figure 1 As shown, the data processing method of the present embodiment includes the following steps.
[0051] S100: Get the data to be transferred.
[0052] Wherein the pending data is data to be transmitted to the recipient, the data can be anywhere, such as: the data may be one of the text data, image data, video data, or audio data. The combination, it should be understood, and any data that can be transmitted through the existing transmission can be transmitted in the present embodiment.
[0053] Alternatively, the acquired data to be transmitted can be local data, or data that the user is uploaded.
[0054] S200: Depending on the first definition password, encrypt the data to be transmitted to obtain the first data.
[0055] Wherein, the first definition password is a password that the sender and the recipient after the predetermined negotiation, the first data to be transmitted after encrypted compression, compressed data.
[0056] Alternatively, the first definition password may be in a character sequence, such as ABC / ABC 123, which should be understood, and the first definition password can also be other forms of password, such as a picture password during the actual application.
[0057]Alternatively, the same password can be used for a long time, and the password can be increased, and the first defined password can be changed regularly, and the first definition password to be changed can be randomly generated or by the sender. Specify, it should be understood that the first definition password is changed, and the changed first definition password should be known by the receiver.
[0058] For example, a first defined password is set to a randomly generated new password every other week and the new password is sent to the receiver.
[0059] Specifically, after obtaining the data to be transmitted, encrypt the acquired data using the first defined password to obtain the first data.
[0060] By step S200, the initial encryption compression to be transmitted to be transmitted, to obtain the first data, improve the security of data transmission, and reduce the risk of data being cracked.
[0061] S300: Determines a plurality of first data blocks and a connection information corresponding to each first data block according to the first data.
[0062] Wherein, the plurality of first data blocks are a plurality of data blocks obtained after splitting the first data, which is used to characterize the connection relationship between the plurality of first data blocks. The connection between each data block can be reorganized by multiple first data blocks and re-obtain the first data.
[0063] Alternatively, the first data can be split into a plurality of first data blocks, and the connection information corresponding to each of the first data blocks can be generated in accordance with the split order.
[0064] Alternatively, according to the length of the first data, the first data is split into a plurality of first data blocks, wherein the split ratio may be pre-set by the sender, for example, if the sender wants to The first data is split to 4 copies, and the split ratio can be set to 25%. If the sender wants to separate the first data to 5 parts, the split ratio can be set to 20%.
[0065] Alternatively, the split ratio can be determined according to the length of each of the first data, for example, for a first data longer than the length of the file, can set a smaller split ratio, for the file length shorter length. The first data can set a large split ratio to ensure that the file length of the first data block of the split first data is as consistent as possible to improve the data transmission stability.
[0066] specifically, figure 2 A first data split of the embodiment of the present invention. like figure 2 As shown, the file length of the first data 71 is 120, and the first data 71 is sequentially resolved into a plurality of first data blocks 72 from left to right, at this time, more first data. The file length of each of the first data blocks in block 72 is 30, and then the connection information corresponding to each of the first data blocks is generated in the split order, such as the first data from left to right in the left to right in a plurality of first data blocks 72. The connection information of the block is 1, 2, 3, 4, respectively.
[0067] Corresponding, the first data 71 can be split in accordance with a 20% split ratio to obtain a plurality of first data blocks 73, wherein the file length of each of the plurality of first data blocks 73 is twenty four.
[0068] Alternatively, in the connection information of the first data block, an identification information corresponding to the data to be transferred, the identification information, which is used to characterize the first data block, specifically, different identifiers to the data to be transmitted. Information, the identification information corresponding to the to be transferred is recorded in the connection information of each of the first data blocks, and the receiver can accurately receive data from a large number of data, determine a plurality of first data from the same time to be transmitted. Block in order to subsequent recombination.
[0069] By step S300, the first data after the initial encryption compression can be split into a plurality of first data blocks, and the data transmission is performed on this, and the single transmission of the first data can be converted into a plurality of first data blocks. Multiple transmission reduces the risk during the data transfer, that is, even if the data is stealing during the transmission process, the screwdrivers will only get part of the first data block, and unable to restructuring the complete first data, at the same time, The first data is divided into a plurality of first data blocks to transmit, reducing the size of the transmitted data, and the transmission speed of the data can be improved.
[0070] S400: For each of the first data blocks, the first data block and the connection information corresponding to the first data block are encrypted according to the second definition password, and the second data is obtained.
[0071] Wherein, the second definition password is similar to the first definition password, all of which are the password set after the sender and the recipient after the pre-negative negotiation, the second definition password can also change periodically, the specific change method is The change method of the first definition password is the same, and details are not described herein, the second data is encrypted data obtained after the first data block and the connection information are encrypted.
[0072] specifically, image 3 A schematic diagram of generating second data for an embodiment of the present invention. like image 3 As shown, after determining a plurality of first data block 72 and a plurality of bonding information 74 corresponding to each of the first data blocks, use the second definition password to each of the first data blocks and the connection information corresponding to the first data block, respectively. Multiple second data 75 is obtained.
[0073] By step S400, the plurality of first data blocks that are split can be subjected to secondary encryption, and the second encryption may be hidden on the conversion information, but also further increase data transmission. Security, reduce the risk of data being cracked.
[0074] S500: Determine multiple target email service providers based on the plurality of second data.
[0075] Among them, the target email service provider is an email service provider for transmitting the second data based on the second data.
[0076] Specifically, after determining a plurality of second data, multiple target email service providers are determined according to multiple second data.
[0077] Alternatively, some email service providers (such as Google, Yahoo, Yahoo, Sina and Sohu, etc.) can be stored in advance to the preset mailing list, and after determining multiple second data, it can be in the list of preset mail. Among the plurality of email service providers, it is determined that the target email service provider greater than or equal to the second data, wherein the way to determine the target email service provider may be randomized, or may be directly performed by the sender. OK, it should be understood that multiple email service providers in the preset mail list are set together by the sender and the recipient after a pre-negative.
[0078] specifically, Figure 4 A schematic diagram of the determination target email service provider of the embodiment of the present invention. like Figure 4 As shown, the preset mailing list 81 includes an email service provider A811, an email service provider B812, an email service provider C813, an email service provider D814, and an email service provider E815, the number of second data determined is three. At this time, from the preset mailing list 81 randomly select the email service provider A811, the email service provider C813 and the email service provider D814 as the target email service provider.
[0079] Alternatively, the sender can set different priorities for multiple email service providers in the preset mail list. When determining the target email service provider from the preset mail list, you can prefer a higher priority. OK in the email service provider.
[0080] Alternatively, you can regularly rotate the email service provider in the preset mail list, avoiding the transmission data for long-term use of the same email service, and reduces the possibility of transmitting data being intercepted by the aft.
[0081] It should be understood that after the email service provider in the preset mail list, the changed preset mail list should be known to the reception.
[0082] In step S500, an email is used as a carrier that transmits the second data, and the transmission data can be reduced compared to the VPN data transmission mode in the prior art, and the transmission stability can be improved, while in determining a plurality of After the second data, the target email service provider is determined from multiple email service providers to ensure that the target email service providers selected for each data transfer are different to reduce the stereotypes to pre-acquire data transmission paths, and then data The possibility of interception.
[0083] S600: Sending the plurality of second data to multiple target email service providers to receive mail accounts.
[0084] Specifically, after determining a plurality of target email service providers, send the second data to multiple target email service providers to receive mail accounts.
[0085] Optionally, Figure 5 The flow chart of the second data transmission method of the embodiment of the present invention can be passed Figure 5 The method shown will send the second data to a plurality of target email service providers to receive mail accounts, including the following steps.
[0086] S610: Depending on the multiple target email service providers, determine from the preset mail list to send mail accounts and target receiving mail accounts with the target email service providers.
[0087] Among them, the preset mailing list records multiple email service providers send mail accounts and receive mail accounts.
[0088] Image 6 The components of the preset mail list of the embodiments of the present invention should be understood that the email service providers and email accounts in the preset mail list in the actual application process are not limited to the quantity given in the figure, such as Image 6 As shown, the preset mailing list 81 includes email service providers A, B, C, D and E, where each service provider has its corresponding mail account and receive mail account, for example: email service provider A Have corresponding send mail account A and receive mail account A.
[0089] Specifically, after identifying multiple target email service providers, from the preset mail list will be identified as the target email account and receive mail account, respectively, to send mail account and target receiving mail account, respectively. .
[0090] For example, when determining that the email service provider A, C and D are the target email service provider, send mail account a, send mail account c and send mail account account D to determine the target to send mail account, will receive mail account A, receive The mail account c and the receiving mail account D determined to receive a mail account for the target.
[0091] S620: For each second data, the second data sends the second data to the corresponding target reception mail account according to the scheduled transmission rule.
[0092] Wherein, the predetermined transmission rule is a pre-set transmitting rule for indicating the transmission end to transmit the second data.
[0093] Alternatively, the predetermined transmission rule can receive a mail account for the target email service provider of the target email service provider that sends a second data to the target email service provider that sends a mail account with the target.
[0094] specifically, Figure 7 A schematic diagram of a predetermined transmission rule of the embodiment of the present invention, such as Figure 7 As shown in Figure 7In the application scenario, the determined target sends the mail account to send the mail account A8111, send mail account c8131 and send mail account D8141, determined target receiving mail account is receiving mail account A8112, receive mail account c8132 and receive mail account D8142 The number of second data is three. By sending the mail account A8111, a second data is sent to the receiving mail account D8142 different from the target email service provider sent by the mail account A8111, and the other second is passed by sending the mail account C8131. Data Send to the target email service provider of the sending mail account C8131, the received mail account A8112, by sending the mail account D8141, sending the last second data to the target email service provider of the sending mail account D8141 to receive mail accounts. C8132.
[0095] It should be understood that each time the target receives the mail account, the selected target receiving the mail account should receive the mail account for the target that is not sent to the second data, to ensure that the same target receives the mail account will not receive the source. A plurality of second data to be sent to the data to be transmitted.
[0096] It should be understood, Figure 7 What is given in the application scenario given in the present, there are six types in the selection method of the scene, and the remaining five are no longer described, in the actual application scenario, select mode The type is related to the number of second data to be sent and the number of email accounts selected.
[0097] By step S600, multiple second data can be sent to the corresponding target receiving mail account through the target of multiple email service providers, and ensure that the target sends a mail account and the target reception mail account will not be Repeat the use, you can improve the security of the data transfer process, which reduces the possibility of stealing the data being screamed.
[0098] The method of the embodiment of the present invention is encrypted according to the first definition password after obtaining the data to be transmitted, and the first data is obtained, and the first data is determined, determined according to the first data, determines the plurality of first data blocks and the first data. The connection information corresponding to the block, for each of the first data blocks, encrypts the first data block and the connection information corresponding to the first data block according to the second definition password, and obtains the second data, determined according to multiple second data. Target email service provider, send multiple second data to multiple target email service providers to receive mail accounts, and boost data transfer rates through the method, and protect transmission data to prevent transmission data from being malicious. Secret.
[0099] Figure 8 A flowchart of a data transmission method according to an embodiment of the present invention. like Figure 8 As shown, the data processing method of the present embodiment includes the following steps.
[0100] S100 ': Get the data to be received.
[0101] Wherein, the reception data is a receiver that can be acquired in the preset time (e.g., 5 minutes), which should include a plurality of second data transmitted by the sender, which should be received. It is understood that the preset time can be set according to the frequency of data transmission, for example, if the frequency of transmitting data is high, the preset time should be set slightly short, and if the frequency of transmission data is low, the preset time should be Set slightly longer to increase transmission efficiency while avoiding data stacking.
[0102] Alternatively, in order to ensure that the receiving end can accurately acquire data transmitted by the sender, the sender can be transmitted between segments, for example, once a data transmission is performed every 3 minutes, and it should be understood that the transmit party transmits data. Avoid consistent with the time of the receiver acquisition data.
[0103] Alternatively, the sender obtains the data to be received in the preset mail list, which acquires the received data, where the preset mail list is transmitted. The preset mailing list is the same preset mailing list, the preset mail list records multiple email service providers send mail accounts and receive mail accounts.
[0104] Specifically, the receiving end can acquire the data received in the preset mail account in the preset mailing list one by one.
[0105] Alternatively, the receiving end can get the data in each received mail account by POP (Post Office Protocol, Post Office Protocol) or IMAP (Internet Message Access Protocol) client.
[0106] Among them, POP is a protocol that allows users to send and receive mail from the mail server. It has two versions, namely POP2, and POP3, which have simple email storage forwarding. This embodiment is POP3, POP3 is currently the most commonly used email service protocol, supports offline mode of operation, but also supports online Way of working.
[0107] IMAP is also a protocol that allows users to send and receive mail from the mail server. Compared to POP3, IMAP can operate the message on the server directly through the client without downloading all mail of the server.
[0108] S200 ': According to the second definition password, the data to be received is decrypted to obtain a plurality of first data blocks, and the connection information corresponding to each first data block.
[0109] The second definition password is the same second definition password with the second definition password of the sender.
[0110] Specifically, after acquiring the data to be transmitted, the received password is decrypted to obtain a plurality of first data blocks, and the connection information corresponding to each first data block is obtained.
[0111] It should be understood that the receiving end can accurately determine a plurality of first data blocks from the same to be transmitted according to the identification information in the bonding information.
[0112] S300 ': Re-groups the plurality of first data blocks according to the connection information to obtain the first data.
[0113] Among them, the connection information is used to characterize the connection relationship between each first data block.
[0114] Specifically, the plurality of first data blocks are reorganized according to the connection relationship in the convergence information, so as to obtain the first data.
[0115] For example, the first data block is obtained as the first data block X, Y, Y and Z, and the connection information corresponding to the first data block X, Y, and Z is 1, 2, 3, respectively, according to the conversion information recorded. The connection relationship, the first data block X, Y, and Z recombinantly the first data, it should be understood that the connection information given in the examples is for convenience, in the actual application process, the expression of the connection information Will be more complicated, and it may also contain additional information, such as data transmission time, sending place, sender information, etc.
[0116] Alternatively, if data block is lost during transmission, the receiving end can transmit corresponding feedback information to the sender according to the connection relationship to first data, and record the sender and record in the feedback information. The identification information corresponding to the first data corresponding to the successful reorganization is successfully recombined to reissue.
[0117] S400 ': The first data is decrypted according to the first definition password, and the data to be transmitted is obtained.
[0118] The first definition password of the first definition password is the same first definition password.
[0119] Specifically, after obtaining the first data obtained, the first data is decrypted using the first definition password to obtain the data to be transmitted.
[0120] The method of the embodiment of the present invention is figure 1 On the basis of the method shown, the data to be received is obtained, and then the received data is decrypted according to the second definition password, obtaining a plurality of first data blocks and the connection information corresponding to each of the first data blocks, will be more A first data block is recombined to obtain the first data, decrypt the first data according to the first data, to obtain data to be transmitted, and the data transmission rate can be boosted, and the transmission data is protected to prevent Transmission data is maliciously stealing.
[0121] Figure 9 A flowchart of the specific application of the embodiment of the present invention. like Figure 9 As shown, the sender 91 will first obtain the data 911 to be transferred, and then the transmission data 911 performs the first encryption compression to obtain the first data 912, and the first data 912 is split into a plurality of first data blocks and each data. The corresponding connection information 913 is respectively encrypted with each of the plurality of first data blocks and each of the first data blocks and corresponding convergence information corresponding to each data block, and obtains multiple second data 914. , Send the second data 914 to the corresponding target receiving mail account through multiple target email service providers, the receiver 92 can acquire the second data 914 through the target receiving mail account, and the second data 914 The first decryption is performed, obtaining a plurality of first data blocks, and the adapter information 913 corresponding to each data block, and the connection information in the connection information 913 corresponding to each data block and the connection information corresponding to each data block will be multiple first. The data block is recombined into the first data 912 and the second decryption decryption is decompressed to obtain the data 911 for the first data 912.
[0122] Figure 10 It is a schematic diagram of an electronic device according to an embodiment of the present invention. like Figure 10 As shown, the electronic device is a general purpose data processing apparatus comprising a generic computer hardware structure, which includes at least processor 101 and memory 102. The processor 101 and the memory 102 are connected via a bus 103. Memory 102 is adapted to store instructions or programs that processor 101 executable. Processor 101 can be a separate microprocessor or one or more microprocessor sets. Thereby, the processor 101 performs processing of the data of the present invention as described above to implement processing of the data and control of other devices by executing instructions stored in memory 102. The bus 103 connects the plurality of components together while connecting the components to the display controller 104 and the display device and the input / output (I / O) device 105. The input / output (I / O) device 105 can be a mouse, a keyboard, a modem, a network interface, a touch input device, a body sensation input device, a printer, and other devices well known in the art. Typically, the input / output device 105 is connected to the system via an input / output (I / O) controller 106.
[0123] Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, apparatus (device) or computer program product. Accordingly, the present application can use a full hardware embodiment, a fully software embodiment or in combination of software and hardware embodiments. Moreover, the present application can employ computer program products implemented on one or more computer readable storage media (including but not limited to disk storage, CD-ROM, optical memory, etc.) implemented in one or more computer available program codes.
[0124] The present application is described with reference to the flowchart of the method, device (device) and computer program product according to the embodiment of the present application. It should be understood that each of the flowcharts can be implemented by computer program instructions.
[0125] These computer program instructions can store in a computer readable memory capable of booting a computer or other programmable data processing device in a particular manner, making instructions stored in the computer readable memory generate a manufacturing article of instruction devices, the instruction device Implement process Figure one The function specified in a plurality of processes.
[0126]These computer program instructions can also be provided to a general purpose computer, a dedicated computer, an embedded processor, or another programmable data processing device, to generate a machine such that instructions executed by the processor of the computer or other programmable data processing device For implementation Figure one Device for functionality specified in multiple processes.
[0127] Another embodiment of the present invention is directed to a non-volatile storage medium for storing a computer readable program, the computer readable program for performing the computer execution of the above or all method embodiments.
[0128] That is, those skilled in the art will appreciate that all or some of the steps in the above embodiment method can be done by the program to specify the relevant hardware, which is stored in a storage medium, including several instructions to make one device ( It can be a single chip microcomputer, a chip, or the like, or a processor, performs all or some of the steps of the methods described in this application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM, RAD-ONLYMEMORY), random access memory (RAM, RANDOM Access Memory), a disk or disc or a medium such as a memory program code.
[0129] It is not intended to limit the invention and is not intended to limit the invention, and those skilled in the art may have various changes and variations. Any modification, equivalent replacement, improvement, etc. according to the spirit and principles of the present invention should be included within the scope of the invention.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Satellite-ground direct connection system and data transmission method of satellite-ground direct connection terminal
Owner:NAT INNOVATION INST OF DEFENSE TECH PLA ACAD OF MILITARY SCI
Distance education providing system
Owner:杨玉兰
Embedded multi-channel data acquisition system for aircraft and control method of embedded multi-channel data acquisition system
Owner:湖南艾科诺维科技有限公司
Video conference acceleration method and system and video conference acceleration platform
Owner:CHINANETCENT TECH
Production processing order wireless order picking method and system
Owner:江苏欧软信息科技有限公司
Classification and recommendation of technical efficacy words
- Prevent malicious theft
- Increase data transfer rate
Communication method and device for high-speed real-time industrial Ethernet
Owner:BEIHANG UNIV +1
Communication method of serial real-time bus special in electricity
Owner:STATE GRID ELECTRIC POWER RES INST
Data transmission method, device and system
Owner:HUAWEI TECH CO LTD
Multichannel wavelength division multiplexing visible light communication system based on red green blue (RGB) light-emitting diode (LED)
Owner:NANJING UNIV OF POSTS & TELECOMM
Channel initialization method
ActiveCN101202564AIncrease data transfer rateMeet the transmission requirements of large amounts of data
Owner:CHINA NAT OFFSHORE OIL CORP +1