[go: up one dir, main page]

CN113438299A - File transmission method and transmission device - Google Patents

File transmission method and transmission device Download PDF

Info

Publication number
CN113438299A
CN113438299A CN202110693766.2A CN202110693766A CN113438299A CN 113438299 A CN113438299 A CN 113438299A CN 202110693766 A CN202110693766 A CN 202110693766A CN 113438299 A CN113438299 A CN 113438299A
Authority
CN
China
Prior art keywords
file
transmission
protocol
transfer
systems
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110693766.2A
Other languages
Chinese (zh)
Inventor
胡钱珊
吕思琦
吕军梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202110693766.2A priority Critical patent/CN113438299A/en
Publication of CN113438299A publication Critical patent/CN113438299A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The application provides a file transmission method and a file transmission device. According to the technical scheme, a plurality of files which are indicated by file names in a first system and need to be transmitted are obtained through a file transmission system, and then the files are transmitted by using a first transmission protocol. In the technical scheme, the first transmission protocol modules do not need to be developed in the plurality of first systems, and the first transmission protocols in the file transmission system are directly used for transmission, so that the development cost can be effectively reduced.

Description

File transmission method and transmission device
Technical Field
The present application relates to the field of network communication technologies, and in particular, to a file transmission method and a file transmission device.
Background
At present, if a file in a certain file system (a system including a plurality of files) in a bank needs to be transferred with an external system, a corresponding transfer protocol module needs to be developed on the file system.
At this time, if a plurality of file systems are included in the bank and each file system needs to perform file transmission with an external system, a transmission protocol module needs to be developed on each file system, for example, if 5 file systems need to use a hypertext transfer protocol (HTTP) for transmission, HTTP protocol modules need to be developed on the 5 file systems, which increases development cost.
Disclosure of Invention
The application provides a file transmission method and a file transmission device, which can reduce the cost of file transmission development and can improve the security of file transmission.
In a first aspect, the present application provides a file transfer method performed by a file transfer system configured to transfer a file between any first system and a second system in a plurality of first systems, the method including: receiving a file name input by a user, wherein the file name is used for indicating a file needing to be transmitted; acquiring target transmission files indicated by file names in a plurality of first systems, wherein at least two first systems in the plurality of first systems need to transmit the files by using a first transmission protocol; and sending the target transmission file to a second system by using a first transmission protocol.
According to the file transmission method provided by the embodiment of the application, the file which is indicated by the file name and needs to be transmitted is obtained through the file transmission system, and then the file is transmitted by using the first transmission protocol. That is to say, in the technical solution, the first system that uses the first transmission protocol for transmission does not need to develop a corresponding transmission protocol module, but uses the first protocol in the file transmission system for transmission.
It can be understood that the method can effectively reduce the development cost.
For example, when there are 4 first systems all needing to transmit a file in a first transmission protocol, for the prior art, modules of the first transmission protocol need to be developed in the 4 first systems respectively; in the scheme, the 4 first systems do not need to develop modules of the first transmission protocol, only the modules need to be developed once in the file transmission system, and then the 4 modules can be transmitted by using the first transmission protocol in the file transmission system. I.e. the development cost is greatly reduced.
With reference to the first aspect, in a possible implementation manner, the type of a transmission protocol included in the file transmission system is greater than 1, and the method further includes: receiving configuration parameters input by a user, wherein the configuration parameters comprise a first parameter used for indicating that the target transmission file is transmitted by using a first transmission protocol.
In the technical scheme, if the file transmission system comprises a plurality of protocols, a first parameter input by a user is received to determine that a target transmission file is transmitted by using a first transmission protocol.
It is understood that when the kind of the transmission protocol is more than 1, the development cost can be further reduced.
As an example, assuming that there are two first systems, a first system uses the transmission protocol 1, and a second first system uses the transmission protocol 2, at this time, if the first system needs to use the transmission protocol 2 to transmit a file, then for the prior art, it needs to develop a module of the transmission protocol 2 on the first system, and in this scheme, because the file transmission system already includes the transmission protocol 2, the first system can directly use the transmission protocol 2 in the file transmission system to perform file transmission, so that it is not necessary to redevelop the first system, i.e. the development cost is greatly reduced.
With reference to the first aspect, in a possible implementation manner, the plurality of first systems are located in a first network, the second system is located in a second network, a quarantine zone DMZ is included between the first network and the second network, a part of the file transfer system is deployed in the first network, and a part except the part is deployed on the DMZ.
According to the technical scheme, the file transmission system is deployed on the first network and the DMZ, so that the situation that a plurality of first systems and second systems in the first network directly perform data interaction during file transmission is effectively avoided, and the safety during target file transmission is improved.
With reference to the first aspect, in a possible implementation manner, the configuration parameter includes a second parameter, where the second parameter is used to indicate encryption information when a target transmission file is transmitted, and the method further includes: encrypting the target transmission file by using the encryption information; accordingly, sending the target transfer file to the second system using the first transfer protocol includes: and sending the encrypted target transmission file to the second system by using the first transmission protocol.
According to the technical scheme, the second parameter input by the user is received, and the target transmission file is encrypted according to the encryption information indicated by the second parameter, so that the safety of the target transmission file in the transmission process is improved.
With reference to the first aspect, in a possible implementation manner, the configuration parameter includes a third parameter, where the third parameter is used to instruct to transmit the target transmission file at a specified time.
According to the technical scheme, the target transmission file is transmitted within the appointed time by receiving the third parameter input by the user. The target transmission file can avoid the peak period, thereby reducing the influence on other transmission files with higher priority.
With reference to the first aspect, in a possible implementation manner, the first transmission protocol includes any one of: file transfer protocol FTP, secure file transfer protocol SFTP, hypertext transfer protocol HTTP and hypertext transfer security protocol HTTPs.
In a second aspect, the present application provides a document transfer device. The device is used for file transmission between any first system and a second system in a plurality of first systems. The device comprises: the receiving module is used for receiving a file name input by a user, wherein the file name is used for indicating a file needing to be transmitted; an obtaining module, configured to obtain a target transmission file indicated by the file name in multiple first systems, where at least two first systems in the multiple first systems need to transmit the file using a first transmission protocol; a sending module, configured to send the target transmission file to the second system using a first transmission protocol.
With reference to the second aspect, in a possible implementation manner, the file transfer system includes a type of transfer protocol greater than 1, and the receiving module is further configured to: receiving configuration parameters input by the user, wherein the configuration parameters comprise a first parameter used for indicating that the target transmission file is transmitted by using a first transmission protocol.
With reference to the second aspect, in a possible implementation manner, the plurality of first systems are located in a first network, the second system is located in a second network, a quarantine zone DMZ is included between the first network and the second network, a part of the file transfer system is deployed in the first network, and a part except the part is deployed on the DMZ.
With reference to the second aspect, in a possible implementation manner, the configuration parameter includes a second parameter, where the second parameter is used to indicate encryption information when the target transmission file is transmitted, and the apparatus further includes: an encryption module for encrypting the target transmission file using the encryption information; correspondingly, the sending module is specifically configured to: and sending the encrypted target transmission file to the second system by using the first transmission protocol.
With reference to the second aspect, in a possible implementation manner, the configuration parameter includes a third parameter, and the third parameter is used to indicate that the target transmission file is transmitted at a specified time.
With reference to the second aspect, in a possible implementation manner, the first transmission protocol includes any one of: file transfer protocol FTP, secure file transfer protocol SFTP, hypertext transfer protocol HTTP and hypertext transfer security protocol HTTPs.
In a third aspect, the present application provides a file transfer apparatus, comprising: a memory and a processor; the memory is to store program instructions; the processor is configured to call program instructions in the memory to execute the file transfer method according to the first aspect or any one of the possible implementations.
In some implementations, the apparatus may be a chip. In this implementation, the apparatus may optionally further include a communication interface for communicating with other apparatuses or devices.
In a fourth aspect, the present application provides a computer-readable medium storing program code for execution by a computer, the program code comprising instructions for performing the file transfer method according to the first aspect or any one of its possible implementations.
In a fifth aspect, the present application provides a computer program product, where the computer program product includes computer program code, and when the computer program code runs on a computer, the computer is caused to implement the file transmission method according to the first aspect or any one of the possible implementation manners.
Drawings
Fig. 1 is a schematic structural diagram of a transmission system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a transmission system according to an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a file transfer method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a file transfer method according to another embodiment of the present application;
FIG. 5 is a schematic structural diagram of a document transportation device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a document transmission device according to another embodiment of the present application.
Detailed Description
For understanding, the relevant terminology referred to in this application will be first described.
1、DMZ
The quarantine zone (DMZ), also called an extranet zone, is a buffer between the insecure system and the secure system, which is set up to solve the problem that the external network cannot access the internal network server. The buffer zone is located within a small network area between the enterprise internal network and the external network. Some server facilities such as enterprise Web (Web) servers and forums that must be exposed may be placed within this small network area. The visitor of the external network can only access the service in the DMZ, but can not contact the information stored in the internal network, and the information in the internal network can not be influenced even if the server in the DMZ is damaged, so that compared with a common firewall, the DMZ area is arranged, one more barrier is provided for the attacker from the external network, and the internal network is protected more effectively.
The DMZ is better than a barrier, and an external network server is placed in the DMZ, so that the safety of an internal network is effectively guaranteed while the DMZ provides services for external network users.
2. MIS region
Refers to a company's internal system deployment area that has direct access to the extranet area and accesses the extranet through the extranet area.
3. Data exchange platform
The data exchange platform is an information exchange platform which is constructed by integrating a plurality of application information systems which are constructed in a scattered way and a computer network, and enables a plurality of application subsystems to transmit and share information/data, thereby improving the utilization rate of information resources. The data exchange platform has multiple functions of storage, forwarding, management and the like, and can realize data file exchange among main branches, among branches and between a peripheral system and a core system.
4、FTP
The File Transfer Protocol (FTP) is a set of standard protocols used for file transfer on a network, is a protocol for transferring files between two computers on a transmission control protocol/internet protocol (TCP/IP) network, is one of the earliest protocols used on a TCP/IP network and the internet, and belongs to an application layer of a network protocol group. The client-side needs to go through the three-way handshake process before establishing connection with the server, so that the connection between the client-side and the server is reliable, connection-oriented, and reliable guarantee is provided for data transmission.
FTP allows a user to communicate with another host in the form of file operations, such as addition, deletion, modification, retrieval, transfer, etc., of files. However, the user does not really log on the computer which the user wants to access, so that the user becomes a complete user, the FTP program can be used for accessing remote resources, and even though the two computers are possibly provided with different operating systems and file storage modes, the functions of file transmission, directory management, e-mail access and the like can be realized.
Fig. 1 is a schematic structural diagram of a transmission system according to an embodiment of the present application. As shown in fig. 1, the transmission system includes a system 101 and a system 102, where the system 101 includes a plurality of first systems, and any one of the plurality of first systems can perform file transmission with the system 102.
Wherein, the system 101 can be a sender during file transmission, and the system 102 is a receiver during file transmission; or system 101 may be the recipient of the file transfer and system 102 may be the sender of the file transfer. The embodiment of the present application does not limit this.
Taking the system 102 as an example of a receiving party, it is understood that a client of a certain user in the system 102 may receive a file sent by any first system in the system 101, or may receive a file sent by any first system in the system 101 by a file system in the system 102. The embodiment of the present application does not limit this.
In this application, the first system is also referred to as a file system, and may be understood as a system including a plurality of files. The plurality of file systems may be a plurality of file systems obtained by classifying information stored in files, for example: the files in the first file system store information about the amount of the transaction, the files in the second file system store information about the employees inside the bank, and so on.
For ease of understanding, the embodiments in this application are described with system 101 as the sender and system 102 as the receiver. However, it should be understood that the embodiments in the present application are also applicable to the case where the system 102 is used as a sender, and the embodiments in the present application are not limited thereto.
At present, if any file system in the system 101 is to perform file transfer with the system 102, a corresponding transfer protocol module needs to be developed on the file system.
At this time, for the system 101, if each file system included therein needs to perform file transfer with the system 102, a transfer protocol module needs to be developed on each file system, resulting in an increase in development cost.
As an example, it is assumed that the system 101 includes 10 file systems, and different types of data are stored in the 10 file systems, for example, the file system 1 stores daily transaction data in a bank, and the file system 2 stores partner company data, and the like. If all of the 10 file systems need to perform file transfer with the system 102, and the same transfer protocol, such as hypertext transfer protocol (HTTP), is used for the transfer of the 10 file systems, an HTTP protocol module needs to be separately developed for each of the 10 file systems, so that the development cost is very high.
In addition, the existing file transmission mode is that data interaction is directly performed between the system 101 and the system 102, and this mode has security risks. For example, an attacker of the extranet is very likely to invade the inside of the system 101, thereby leaking some highly confidential data inside the system 101.
In view of this, an embodiment of the present application provides a file transmission method, when a file system needs to transmit a file, the file system only needs to transmit the transmitted file to the file transmission system without developing a corresponding protocol module, and then the file transmission system transmits the file using a corresponding transmission protocol.
As an example, fig. 2 is a schematic structural diagram of a transmission system provided in an embodiment of the present application. As shown in fig. 2, a file transfer system 103 is provided between the systems 101 and 102, and when a file needs to be transferred in any first system in the system 101, the file is directly transferred by using a file transfer protocol in the file transfer system 103.
Further, in the embodiment of the application, by setting the DMZ and then deploying the file transmission system in the MIS area where the file system is located and the DMZ, potential safety hazards caused by direct interaction between the file system and the system 102 are effectively avoided, and the safety of data inside the system 101 is ensured.
Fig. 3 is a file transfer method according to an embodiment of the present application. The file transfer method may be executed by a file transfer system for performing file transfer between any of a plurality of first systems and a second system. As shown in fig. 2, the method of the embodiment of the present application includes S301, S302, and S303.
The first system in the embodiment of the present application is also referred to as a file system. The second system is a system for receiving a transmission file, and is the same as the system 102 in fig. 1 and 2, and the detailed description may refer to the related description in fig. 1 or 2, and is not repeated here.
S301, receiving a file name input by a user, wherein the file name is used for indicating a file needing to be transmitted.
The file name refers to the name of each file in the file system.
It will be appreciated that each file to be transferred has a corresponding name, so that the different files can be distinguished.
In the embodiment of the application, the type of the file name is not limited, for example, only one file name needs to be transmitted, and then the user can input the name; or there are two names of the files to be transferred, the user can input either one of the two names.
S302, obtaining target transmission files indicated by file names in a plurality of first systems, wherein at least two first systems in the plurality of first systems need to use a first transmission protocol to transmit the files.
Wherein the target transmission file represents a file indicated by a file name input by a user.
In this embodiment, after the file transfer system obtains the file name input by the user, the target transfer file to be transferred is obtained from the plurality of file systems.
In one implementation, the file transfer system may send a request message to each of the file systems, where the request message is used to request the file systems to send the target transfer file indicated by the file name. At this time, after receiving the request message, if the file system of the multiple file systems includes the target transmission file indicated by the file name, the file system may send the target transmission file to the file transmission system.
Alternatively, the file transfer system may send the request message to multiple file systems simultaneously. For example, there are 6 file systems in total, and the file transfer system may simultaneously send a request message to the 6 file transfer systems and then obtain the target transfer file.
Alternatively, the file transfer system may not send the request message to multiple file systems at the same time. For example, the file transfer system first sends a request message to the first file system, and if a target transfer file sent by the first file system is received, the request message is not sent to other file systems. The embodiment of the present application does not limit this.
S303, the target transmission file is sent to the second system by using the first transmission protocol.
The first transmission protocol is a transmission protocol when the target transmission file is transmitted.
In this embodiment, after the target transfer file is obtained, the target transfer file may be sent to the second system using the first transfer protocol.
In one implementation, the file transfer system may be caused to transfer the target transfer file to the second system by inputting parameter values of the second system such as a server address, a port, a user name, a path of the received file, a recipient or a receiving mechanism, and the like into the file transfer system.
It should be noted that, in the embodiments of the present application, a type of a specific receiver that receives the target transmission file is not limited. For example, it may be a user client in the second system, or it may be a file system.
According to the file transmission method provided by the embodiment of the application, the file which is indicated by the file name and needs to be transmitted is obtained through the file transmission system, and then the file is transmitted by using the first transmission protocol. That is to say, in the technical solution, the first system that uses the first transmission protocol for transmission does not need to develop a corresponding transmission protocol module, but uses the first protocol in the file transmission system for transmission.
It can be understood that, in this implementation, if at least two first systems use the same transmission protocol, at this time, it is not necessary to develop the transmission protocol for both of the at least two first systems, and it is only necessary to develop the transmission protocol once in the file transmission system, and both of the at least two first systems can use the protocol in the file transmission, which greatly reduces the development cost.
As an optional embodiment, the file transfer system includes a transfer protocol of which the kind is greater than 1, and the method further includes: receiving configuration parameters input by a user, wherein the configuration parameters comprise a first parameter used for indicating that the target transmission file is transmitted by using a first transmission protocol.
It is understood that when there are a plurality of transfer protocols of the file transfer system, one transfer protocol must be selected if the target transfer file is to be transferred. Therefore, in the embodiment of the present application, when the file transfer system includes a transfer protocol of which the kind is greater than 1, it is determined to transfer the target transfer file using the first transfer protocol by receiving the first parameter input by the user.
For example, there are 6 file systems in total, and the file transfer system includes three protocols, i.e., SFTP, HTTP and HTTPs, and in this case, if a file in the first file system needs to be transferred, it needs to select which of the three protocols is used for the file to be transferred.
In one implementation, the user may select the protocol type for file transfer based on the size of the target transfer file, the transfer mode, and the transfer performance requirements. For example, if the file to be transmitted is greater than 1 million (M) and the file security requirement is low, the transmission protocol may be configured as FTP, and the transmission speed is fastest; if the file to be transmitted is larger than 1M and the file security requirement is high, the configurable transmission protocol is SFTP; if the file to be transmitted is less than 1M and the transmission mode is a special line mode or the safety requirement is not high, the configurable transmission protocol is HTTP; if the file to be transmitted is less than 1M and the transmission mode is the Internet mode or the file transmission security requirement is high, the configurable transmission protocol is HTTPS.
It should be noted that, the manner in which the user selects the protocol is merely an example, and the embodiment of the present application is not limited thereto.
It will also be appreciated that when the file transfer system includes more than 1 type of protocol, the development cost can be further reduced.
As an example, assume that there are 4 file systems, wherein the first file system and the second file system can use two types of transfer protocols when performing file transfer with the second system, one is HTTP, and the other is SFTP. When the third file system and the fourth file system are transmitted with the external system, the transmission protocol used is HTTPS. At this time, if the first file system and the second file system both need to use HTTPS to transmit files, there is no need to additionally develop an HTTPS protocol module for the first file system and the second file system, thereby reducing development cost. That is, each transfer protocol only needs to be developed once in the file transfer system, and other file systems can use the protocol in the file transfer system, thereby greatly reducing the development cost.
In the file transmission method provided by this embodiment, the file transmission system supports multiple transmission protocols, and can meet the performance requirements of various file transmissions. The development cost of each file system is reduced.
As an optional embodiment, the plurality of first systems are located in a first network, the second system is located in a second network, and a quarantine zone DMZ is included between the first network and the second network, and a part of the file transfer system is deployed in the first network, and a part other than the part is deployed on the DMZ.
As an example, as shown in fig. 4, the network is divided into three areas, the plurality of file systems are located in a first network (also referred to as MIS region network), the second system is located in a second network (also referred to as external network), and in this embodiment, a DMZ network is further included between the first network and the second network. Because the DMZ region has the characteristics that visitors of the external network can only access the DMZ and cannot contact information in the MIS region network, and the like, if the file transmission system is deployed on the first network and the DMZ, the potential safety hazard caused by direct interaction between the file system and the second system is effectively avoided, and the safety of the file system is ensured.
It can be understood that, because there is a great potential safety hazard when the file system in the MIS region directly interacts with the second system in the external network, in this embodiment, the file transfer system is deployed in the MIS region and the DMZ, so that the file system in the MIS region performs data interaction with the second system in the external network through the file transfer system, thereby avoiding the problem of direct interaction, and ensuring the security of the file system in the MIS region.
As an optional embodiment, when receiving the configuration parameters input by the user, the configuration parameters input by the user include a second parameter, where the second parameter is used to indicate encryption information when the target transmission file is transmitted, and the method further includes: encrypting the target transmission file by using the encryption information; accordingly, sending the target transfer file to the second system using the first transfer protocol includes: and sending the encrypted target transmission file to the second system by using the first transmission protocol.
It can be understood that the target transmission file may be intercepted during the transmission process, and if the target transmission file includes the secret information, the secret information may be leaked. Therefore, in the present embodiment, the target transmission file is encrypted by receiving the second parameter input by the user and then encrypting the target transmission file according to the encryption information indicated by the second parameter.
In one implementation, the file transfer system may encrypt the target transfer file using a user name and a password, where the second parameter that the user needs to input includes the user name and the password.
As an example, assuming that the content of the target transmission file is "abcdefg", the file transmission system uses a user name and password for encryption in such a way that the user name is used in front of the content and the password is used behind the content. Assume that the user name input by the user is "123", the corresponding password is "xiaoming 123", and at this time, the content of the encrypted target transmission file is "123 abcdefgxiaoming 123".
In another implementation, the file transfer system may encrypt the contents of the target transfer file using a key.
For example, the user may input a key path for key encryption, and then the file transfer system finds a corresponding key according to the key path to encrypt the content of the target transfer file.
According to the file transmission method provided by the embodiment of the application, the second parameter input by the user is received, and then the target transmission file is encrypted according to the encryption information indicated by the second parameter, so that the possibility that the content in the target transmission file is tampered in the transmission process is reduced, and the file transmission safety is improved.
As an alternative embodiment, when receiving the configuration parameters input by the user, the configuration parameters input by the user include a third parameter, and the third parameter is used for instructing the target transmission system to transmit the target transmission file at the specified time.
For example, there are 100 file systems, and at a certain moment, files in all 100 file systems need to be transmitted, and at this moment, if 10 files are transmitted simultaneously, a jam may occur, so the file transmission system in this embodiment may further receive a parameter for setting a file transmission execution time input by a user according to a user's requirement, so that a target transmission file avoids a peak period, and is executed at the time corresponding to a transmission task, thereby reducing an influence on other files with higher priorities.
Optionally, when receiving the configuration parameters input by the user, the configuration parameters input by the user may further include a fourth parameter, where the fourth parameter is used to indicate whether to send a feedback file to the target first system, where the target first system includes the target transmission file, and the feedback file includes a file that the second system responds to the target transmission file.
Fig. 5 is a schematic structural diagram of a document transmission device according to an embodiment of the present application. The file transfer apparatus shown in fig. 5 may be used to perform the file transfer method described in any of the foregoing embodiments. As shown in fig. 5, the file transmission apparatus 500 of the present embodiment includes a receiving module 501, configured to receive a file name input by a user, where the file name is used to indicate a file that needs to be transmitted; an obtaining module 502, configured to obtain a target transmission file indicated by a file name in a plurality of first systems, where at least two first systems in the plurality of first systems need to transmit the file using a first transmission protocol; a sending module 503, configured to send the target transmission file to the second system using the first transmission protocol.
As an example, the receiving module 501 may be configured to execute the step of receiving the file name input by the user in the file transmission method described in fig. 2. For example, the receiving module 501 is configured to execute S201.
As another example, the obtaining module 502 may be configured to execute the step of obtaining a plurality of target transmission files indicated by file names in the first system in the file transmission method described in fig. 2. For example, the obtaining module 502 is configured to execute S202.
In a possible implementation manner, the file transmission apparatus includes a transmission protocol of a kind greater than 1, and the receiving module 501 is further configured to: receiving configuration parameters input by a user, wherein the configuration parameters comprise a first parameter used for indicating that a target transmission file is transmitted by using a first transmission protocol.
In a possible implementation manner, the plurality of first systems are located in a first network, the second system is located in a second network, a quarantine zone DMZ is included between the first network and the second network, a part of the file transfer system is deployed in the first network, and a part except the part is deployed on the DMZ.
In a possible implementation manner, the configuration parameter includes a second parameter, where the second parameter is used to indicate encryption information when the target transmission file is transmitted, and the apparatus further includes: an encryption module 504 for encrypting the target transmission file using the encryption information; correspondingly, the sending module 503 is specifically configured to: and sending the encrypted target transmission file to the second system by using the first transmission protocol.
In one possible implementation manner, the configuration parameters include a third parameter, and the third parameter is used for indicating that the target transmission file is transmitted at a specified time.
In one possible implementation, the first transmission protocol includes any one of: file transfer protocol FTP, secure file transfer protocol SFTP, hypertext transfer protocol HTTP and hypertext transfer security protocol HTTPs.
Fig. 6 is a schematic structural diagram of a document transmission device according to an embodiment of the present application. The file transfer apparatus shown in fig. 6 may be used to execute the file transfer method described in any of the foregoing embodiments.
As shown in fig. 6, the apparatus 600 of the present embodiment includes: memory 601, processor 602, communication interface 703, and bus 604. The memory 601, the processor 602, and the communication interface 603 are communicatively connected to each other via a bus 604.
The memory 601 may be a Read Only Memory (ROM), a static memory device, a dynamic memory device, or a Random Access Memory (RAM). The memory 601 may store programs and the processor 602 is configured to perform the steps of the method shown in fig. 2 when the programs stored in the memory 601 are executed by the processor 602.
The processor 602 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits, and is configured to execute related programs to implement the methods of the embodiments of the present application.
The processor 602 may also be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the method of planning an autonomous vehicle according to an embodiment of the present application may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 602.
The processor 602 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 601, and the processor 602 reads the information in the memory 601, and performs the functions required to be performed by the units included in the thermometric apparatus according to the application in combination with the hardware thereof, for example, the steps/functions of the embodiment shown in fig. 2 may be performed.
The communication interface 603 may enable communication between the apparatus 600 and other devices or communication networks using, but not limited to, transceiver means.
Bus 604 may include a pathway to transfer information between various components of apparatus 600 (e.g., memory 601, processor 602, communication interface 603).
It should be understood that the apparatus 600 shown in the embodiment of the present application may be an electronic device, or may also be a chip configured in the electronic device.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. The procedures or functions according to the embodiments of the present application are wholly or partially generated when the computer instructions or the computer program are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A file transfer method performed by a file transfer system for file transfer between any first system and a second system among a plurality of first systems, the method comprising:
receiving a file name input by a user, wherein the file name is used for indicating a file needing to be transmitted;
acquiring target transmission files indicated by the file names in a plurality of first systems, wherein at least two first systems in the plurality of first systems need to transmit the files by using a first transmission protocol;
and sending the target transmission file to the second system by using a first transmission protocol.
2. The method of claim 1, wherein the file transfer system comprises a transport protocol of a type greater than 1, and wherein the method further comprises:
receiving configuration parameters input by the user, wherein the configuration parameters comprise a first parameter used for indicating that the target transmission file is transmitted by using the first transmission protocol.
3. The method of claim 2, wherein the plurality of first systems are located in a first network, wherein the second system is located in a second network, wherein the first network and the second network comprise a quarantine zone (DMZ) therebetween, wherein a portion of the file transfer system is deployed in the first network, and wherein a portion other than the portion is deployed on the DMZ.
4. The method of claim 3, wherein the configuration parameter comprises a second parameter indicating encryption information for transmitting the target transmission file, and the method further comprises:
encrypting the target transmission file by using the encryption information;
accordingly, sending the target transfer file to the second system using a first transfer protocol, comprising:
and sending the encrypted target transmission file to the second system by using a first transmission protocol.
5. The method of claim 4, wherein the configuration parameters comprise a third parameter indicating that the target transmission file is to be transmitted at a specified time.
6. The method according to any of claims 1 to 5, wherein the first transport protocol comprises any of: file transfer protocol FTP, secure file transfer protocol SFTP, hypertext transfer protocol HTTP and hypertext transfer security protocol HTTPs.
7. A file transfer apparatus, characterized in that the apparatus comprises means for performing the method according to any one of claims 1 to 6.
8. A file transfer apparatus, comprising: a memory and a processor;
the memory is to store program instructions;
the processor is configured to invoke program instructions in the memory to perform the method of any of claims 1 to 6.
9. A computer-readable medium, characterized in that the computer-readable medium stores program code for computer execution, the program code comprising instructions for performing the method of any of claims 1 to 6.
10. A computer program product comprising computer program code which, when run on a computer, causes the computer to carry out the method according to any one of claims 1 to 6.
CN202110693766.2A 2021-06-22 2021-06-22 File transmission method and transmission device Pending CN113438299A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110693766.2A CN113438299A (en) 2021-06-22 2021-06-22 File transmission method and transmission device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110693766.2A CN113438299A (en) 2021-06-22 2021-06-22 File transmission method and transmission device

Publications (1)

Publication Number Publication Date
CN113438299A true CN113438299A (en) 2021-09-24

Family

ID=77757149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110693766.2A Pending CN113438299A (en) 2021-06-22 2021-06-22 File transmission method and transmission device

Country Status (1)

Country Link
CN (1) CN113438299A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426349A (en) * 2022-08-30 2022-12-02 中国银行股份有限公司 Configurable file transmission device and method
CN116366333A (en) * 2023-03-30 2023-06-30 中国农业银行股份有限公司 Data transmission method, system, electronic equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968276A (en) * 2006-11-24 2007-05-23 清华大学 Dynamic optimization method for data transmission between services in service oriented architecture environment
CN101399706A (en) * 2008-10-27 2009-04-01 中兴通讯股份有限公司 Method for information transmission through standard communication interface
CN102164115A (en) * 2010-02-22 2011-08-24 中国电信股份有限公司 Method and system for multisource mixing file transmission
CN102546769A (en) * 2011-12-23 2012-07-04 福建升腾资讯有限公司 Method for automatically transmitting files of USB (universal serial bus) flash disk of user based on Telnet protocol
CN104426880A (en) * 2013-09-03 2015-03-18 中国银联股份有限公司 Network-based centralized automatic file collection and distribution device
CN104967663A (en) * 2015-05-12 2015-10-07 无锡天脉聚源传媒科技有限公司 File transmission method and system, file sending device, and file receiving device
CN106657269A (en) * 2016-11-16 2017-05-10 西安诺瓦电子科技有限公司 File transmission method
CN109561124A (en) * 2017-09-27 2019-04-02 深圳市创易联合科技有限公司 A kind of method, system and the terminal device of file transmission
CN110708338A (en) * 2019-11-05 2020-01-17 江苏税软软件科技有限公司 Internal and external network data interaction system and method based on three-layer network architecture
CN112073442A (en) * 2020-11-11 2020-12-11 杭州云嘉云计算有限公司 Data transmission method and monitoring system based on double one-way protocol mutual conversion channel

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968276A (en) * 2006-11-24 2007-05-23 清华大学 Dynamic optimization method for data transmission between services in service oriented architecture environment
CN101399706A (en) * 2008-10-27 2009-04-01 中兴通讯股份有限公司 Method for information transmission through standard communication interface
CN102164115A (en) * 2010-02-22 2011-08-24 中国电信股份有限公司 Method and system for multisource mixing file transmission
CN102546769A (en) * 2011-12-23 2012-07-04 福建升腾资讯有限公司 Method for automatically transmitting files of USB (universal serial bus) flash disk of user based on Telnet protocol
CN104426880A (en) * 2013-09-03 2015-03-18 中国银联股份有限公司 Network-based centralized automatic file collection and distribution device
CN104967663A (en) * 2015-05-12 2015-10-07 无锡天脉聚源传媒科技有限公司 File transmission method and system, file sending device, and file receiving device
CN106657269A (en) * 2016-11-16 2017-05-10 西安诺瓦电子科技有限公司 File transmission method
CN109561124A (en) * 2017-09-27 2019-04-02 深圳市创易联合科技有限公司 A kind of method, system and the terminal device of file transmission
CN110708338A (en) * 2019-11-05 2020-01-17 江苏税软软件科技有限公司 Internal and external network data interaction system and method based on three-layer network architecture
CN112073442A (en) * 2020-11-11 2020-12-11 杭州云嘉云计算有限公司 Data transmission method and monitoring system based on double one-way protocol mutual conversion channel

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426349A (en) * 2022-08-30 2022-12-02 中国银行股份有限公司 Configurable file transmission device and method
CN116366333A (en) * 2023-03-30 2023-06-30 中国农业银行股份有限公司 Data transmission method, system, electronic equipment and storage medium
CN116366333B (en) * 2023-03-30 2025-09-05 中国农业银行股份有限公司 Data transmission method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US10587415B2 (en) Systems and methods for controlling email access
CA2736582C (en) Authorization of server operations
EP2425370B1 (en) Method and apparatus to create a secure web browsing environment with privilege signing
US9727739B2 (en) Decrypting files for data leakage protection in an enterprise network
KR101387600B1 (en) Electronic file sending method
CN102469080A (en) Method for pass user to realize safety login application client and system thereof
US20170169234A1 (en) System and method for removing internet attack surface from internet connected devices
US11128588B2 (en) Apparatus, method and computer-readable recording medium storing computer program for restricting electronic file viewing utilizing antivirus software
CN113438299A (en) File transmission method and transmission device
JP5939953B2 (en) Electronic file transmission system, program, and electronic file transmission method
US8281123B2 (en) Apparatus and method for managing and protecting information during use of semi-trusted interfaces
CN112073366B (en) Data processing method for railway financial system and data center
EP3219081A1 (en) Secure network request anonymization
CN113243093B (en) System and method for message transmission and retrieval using blockchain
US20250086276A1 (en) Mail security processing device of mail access security system that provides access management and blocking function based on email communication protocol, and operation method thereof
CN119853935A (en) Data transmission method, device, storage medium and equipment
CN115623013B (en) A strategy information synchronization method, system and related products
WO2021146801A1 (en) Secure data transfer system
JP5417026B2 (en) Password notification device and password notification system
CN112136119A (en) Data processing system, data processing method, and program
CN118784259A (en) Data transmission method, gateway component, device, equipment and storage medium
JP2020086834A (en) Information processing system, program, and information processing method used in virtual desktop environment
JP2005073051A (en) Relay device and relay program thereof
Al-Zakwani Mobile Devices Evolution and Revolution: A Cause for Security Concern.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210924

RJ01 Rejection of invention patent application after publication