CN109376539A - Acquisition methods, device, system, storage medium and the electronic equipment of content-data - Google Patents

Acquisition methods, device, system, storage medium and the electronic equipment of content-data Download PDF

Info

Publication number
CN109376539A
CN109376539A CN201811046084.7A CN201811046084A CN109376539A CN 109376539 A CN109376539 A CN 109376539A CN 201811046084 A CN201811046084 A CN 201811046084A CN 109376539 A CN109376539 A CN 109376539A
Authority
CN
China
Prior art keywords
content
data request
request
verification information
content data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811046084.7A
Other languages
Chinese (zh)
Inventor
刘承诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Guangzhou Shenma Mobile Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shenma Mobile Information Technology Co Ltd filed Critical Guangzhou Shenma Mobile Information Technology Co Ltd
Priority to CN201811046084.7A priority Critical patent/CN109376539A/en
Publication of CN109376539A publication Critical patent/CN109376539A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides acquisition methods, device, system, storage medium and the electronic equipment of a kind of content-data.Wherein, the acquisition methods of the content-data include: and execute cryptographic operation using current time stamp to the requests verification information in content data request, obtain encrypted content data request;The encrypted content data request is sent to content service provider, so that the content service provider executes decryption oprerations to the encrypted content data request, and returns to the content-data of request according to decrypted result.By the embodiment of the present application, the requests verification information that can be effectively prevent in content data request is leaked, and then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively avoid the content-data of content service provider when being crawled to pressure caused by the performance of content service provider.

Description

Acquisition methods, device, system, storage medium and the electronic equipment of content-data
Technical field
The invention relates to Internet technical field more particularly to a kind of acquisition methods of content-data, device, it is System, storage medium and electronic equipment.
Background technique
Currently, internet content is often crawled by rival, search engine or other users by web crawlers. Web crawlers (abbreviation crawler) is a kind of chained address searching webpage by webpage, and according to certain rules, automatic to obtain The program of web page contents.Specifically, by the rule of setting, crawler can crawl some content numbers in webpage source code easily According to.However, these content-datas are exactly competitiveness for networking products, once these content-datas are largely crawled, this The competitive advantage of a networking products will weaken significantly.In addition, the performance for returning associated server brings some pressure.
The existing anti-technology that crawls is that addition access key, content service provider are connect using this in content data request The relevant information for entering key and content service access side carries out legitimate verification to content data request.However, in content-data The access key added in request is easy to be cracked by rival, search engine or other users, thus cannot be effectively The content-data of content service provider is prevented to be crawled.
Summary of the invention
A kind of acquisition methods for being designed to provide content-data of the embodiment of the present application, device, system, storage medium and Electronic equipment is crawled with to solve the content-data existing in the prior art that cannot be effectively prevented content service provider Problem.
According to the embodiment of the present application in a first aspect, providing a kind of acquisition methods of content-data.The described method includes: Using current time stamp, cryptographic operation is executed to the requests verification information in content data request, obtains encrypted content number According to request;The encrypted content data request is sent to content service provider, so that the content service provider couple The encrypted content data request executes decryption oprerations, and the content-data of request is returned according to decrypted result.
According to the second aspect of the embodiment of the present application, a kind of acquisition methods of content-data are provided.The described method includes: The content data request that reception content service access side is sent;Using current time stamp, to being encrypted in the content data request Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request;Based on the content Requests verification information in request of data sends the content-data of request to the content service access side.
According to the third aspect of the embodiment of the present application, a kind of acquisition device of content-data is provided.Described device includes: First encrypting module executes cryptographic operation to the requests verification information in content data request, obtains for utilizing current time stamp Obtain encrypted content data request;First sending module, for sending the encrypted content to content service provider Request of data, so that the content service provider executes decryption oprerations to the encrypted content data request, and according to Decrypted result returns to the content-data of request.
According to the fourth aspect of the embodiment of the present application, a kind of acquisition device of content-data is provided.Described device includes: Receiving module, the content data request sent for reception content service access side;First deciphering module, when for utilizing current Between stab, decryption oprerations are executed to the requests verification information that encrypts in the content data request, obtain the content data request In requests verification information;Second sending module, for based on the requests verification information in the content data request, to described Content service access side sends the content-data of request.
According to the 5th of the embodiment of the present application the aspect, a kind of acquisition system of content-data is provided, the system comprises: Content service access side and the content service provider being connect with the content service access side;The content service accesses Fang Li With current time stamp, cryptographic operation is executed to the requests verification information in content data request, obtains encrypted content-data Request, and the encrypted content data request is sent to the content service provider;The content service provider connects The content data request that sends of content service access side is received, and using current time stamp, to encrypting in the content data request Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request, then based in described Hold the requests verification information in request of data, the content-data of request is sent to the content service access side.
According to the 6th of the embodiment of the present application the aspect, a kind of storage medium is provided, meter is stored on the storage medium Calculation machine executable instruction, the computer executable instructions execute following steps when being processed by the processor: utilizing current time Stamp executes cryptographic operation to the requests verification information in content data request, obtains encrypted content data request;To content Service provider sends the encrypted content data request, so that the content service provider is to described encrypted interior Hold request of data and execute decryption oprerations, and returns to the content-data of request according to decrypted result.
According to the 7th of the embodiment of the present application the aspect, a kind of storage medium is provided, meter is stored on the storage medium Calculation machine executable instruction, the computer executable instructions execute following steps when being processed by the processor: reception content service The content data request that access side is sent;Using current time stamp, the requests verification encrypted in the content data request is believed Breath executes decryption oprerations, obtains the requests verification information in the content data request;Based in the content data request Requests verification information sends the content-data of request to the content service access side.
According to the eighth aspect of the embodiment of the present application, a kind of electronic equipment is provided, the equipment includes: one or more Processor;Memory, for storing one or more programs;When one or more of programs are by one or more of processing Device executes, so that one or more of processors realize the content as described in the embodiment of the present application first aspect or second aspect The acquisition methods of data.
The technical solution obtained by content-data provided by the embodiments of the present application, using current time stamp, to content number Cryptographic operation is executed according to the requests verification information in request, obtains encrypted content data request, and provide to content service Side sends encrypted content data request, and content service provider executes decryption oprerations to encrypted content data request, And content-data is asked using timestamp compared with existing other way according to the content-data that decrypted result returns to request Requests verification information in asking executes cryptographic operation, and the requests verification information that can be effectively prevent in content data request is let out Dew, and then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively content be avoided to take Pressure caused by performance when the content-data of business provider is crawled to content service provider.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application embodiment can also obtain according to these attached drawings for those of ordinary skill in the art Obtain other attached drawings.
Fig. 1 is the step flow chart according to a kind of acquisition methods of content-data of the embodiment of the present application one;
Fig. 2 is the step flow chart according to a kind of acquisition methods of content-data of the embodiment of the present application two;
Fig. 3 is the step flow chart according to a kind of acquisition methods of content-data of the embodiment of the present application three;
Fig. 4 is the structural block diagram according to a kind of acquisition device of content-data of the embodiment of the present application four;
Fig. 5 is the structural block diagram according to a kind of acquisition device of content-data of the embodiment of the present application five;
Fig. 6 is the structural block diagram according to a kind of acquisition device of content-data of the embodiment of the present application six;
Fig. 7 is the structural schematic diagram according to a kind of acquisition system of content-data of the embodiment of the present application seven;
Fig. 8 is the structural schematic diagram according to a kind of electronic equipment of the embodiment of the present application eight.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present application, below in conjunction with the application Attached drawing in embodiment, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described reality Applying example only is the embodiment of the present application a part of the embodiment, instead of all the embodiments.Based on the implementation in the embodiment of the present application The range of the embodiment of the present application protection all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
Embodiment one
Referring to Fig.1, a kind of step flow chart of the acquisition methods of content-data of the embodiment of the present application one is shown.
The acquisition methods of the content-data of the present embodiment the following steps are included:
In step s101, using current time stamp, encryption behaviour is executed to the requests verification information in content data request Make, obtains encrypted content data request.
In the embodiment of the present application, the current time stamp can be for since on January 1st, 1970 (00:00:00GMT) Number of seconds, the content data request is used to access direction content service provider request content data for content service, described to ask Seeking verification information may include that the content service provider is supplied to the access mark of content service access side and/or authorization is compiled Code.It is understood that above description is exemplary only, the embodiment of the present application does not do any restriction to this.
In some optional embodiments, current time stamp is being utilized, the requests verification information in content data request is being held When row cryptographic operation, intercept operation is executed to the current time stamp, the timestamp after being intercepted;After the interception Timestamp executes cryptographic operation to the requests verification information in the content data request, obtains the encrypted content number According to request.Wherein, the encrypted content data request includes the length information of the timestamp after the interception.Take this, no The requests verification information that can only effectively prevent in content data request is leaked, and also can ensure that encrypted content number Having in limit effectively according to request, and then the content-data that can be effectively prevented content service provider is crawled.It can be with Understand, using current time stamp, any implementation of cryptographic operation is executed to the requests verification information in content data request Mode may be applicable to this, and the embodiment of the present application does not do any restriction to this.
In a specific example, content service can be reached from content service access side according to content data request and provided The use length of the delay adjustment current time stamp of side, then the use length based on current time stamp, to the current time stamp Execute intercept operation, the timestamp after being intercepted.Specifically, the length of current time stamp is the digit of current time stamp, example Such as, the length of current time stamp " 1504323599 " is 10, and its precision is the second.If using first nine of current time stamp, Timestamp after then intercepting is " 150432359 ", and using the timestamp after the interception to the request in content data request After verification information executes cryptographic operation, the effective time of the encrypted content data request is 10 seconds.If encrypted Content data request is more than 10 seconds from the duration for reaching content service provider is encrypted to, and content service provider cannot utilize Current time stamp, which is obtained, executes decryption oprerations with the content data request after the identical key pair encryption in content service access side, from And lead to the failure of encrypted content data request.If the timestamp using the first eight bits of current time stamp, after interception For " 15043235 ", and encryption behaviour is executed to the requests verification information in content data request using the timestamp after the interception After work, the effective time of the encrypted content data request is 100 seconds.In some optional embodiments, interception is being utilized Timestamp afterwards in content data request requests verification information execute cryptographic operation when, can by symmetry encryption technology, Cryptographic operation is executed to the requests verification information in content data request using the timestamp after interception, for example, DES, IDEA, RC2, RC4, SKIPJACK, RC5, aes algorithm etc..In some optional embodiments, the content service access side is integrated with Encryption Algorithm library, there are many symmetry encryption algorithms as described above for Encryption Algorithm library preservation.The content service access side One of Encryption Algorithm library symmetry encryption algorithm can be called, using the timestamp after interception to asking in content data request Verification information is asked to execute cryptographic operation.It is understood that above description is exemplary only, the embodiment of the present application does not do this Any restriction.
In a specific example, when the requests verification information in content data request is the content service provider When being supplied to the access mark of content service access side, content service access side asks content-data using the timestamp after interception Access mark in asking executes cryptographic operation, obtains encrypted content data request.In some optional embodiments, described to add Content data request after close may include the length for accessing mark, the authorize coding of unencryption and the timestamp after interception of encryption Information.Alternatively, the access mark and the timestamp after interception that the encrypted content data request may include encryption Length information.When the requests verification information in content data request is that the content service provider is supplied to content service access When the access mark and authorize coding of side, content service access side is using the timestamp after interception to connecing in content data request Inlet identity and authorize coding execute cryptographic operation, obtain encrypted content data request.Wherein, the encrypted content number The length information of timestamp after the authorize coding and interception that identified according to the access that request may include encryption, encrypt.When content number It is interior when being supplied to the authorize coding of content service access side according to the requests verification information in request for the content service provider Hold service access side and cryptographic operation is executed to the authorize coding in content data request using the timestamp after interception, is encrypted Content data request afterwards.In some optional embodiments, the encrypted content data request may include connecing for unencryption The length information of timestamp after inlet identity, the authorize coding of encryption and interception.Alternatively, the encrypted content-data Request may include the length information of the timestamp after the authorize coding and interception of encryption.Why encrypted content data request Length information including the timestamp after interception is because content service provider needs the length using the timestamp after interception Information executes intercept operation to current time stamp, obtains and the identical key in content service access side.It is understood that with Upper description is exemplary only, and the embodiment of the present application does not do any restriction to this.
In step s 102, the encrypted content data request is sent to content service provider, so that in described Hold service provider and decryption oprerations are executed to the encrypted content data request, and is returned in request according to decrypted result Hold data.
In the embodiment of the present application, the content-data may include text data, audio data, video data and image data One of or it is a variety of.It is understood that above description is exemplary only, the embodiment of the present application does not do any limit to this It is fixed.
In a particular embodiment, content service access direction content service provider sends encrypted content-data Request, content service provider execute decryption oprerations to the requests verification information encrypted in encrypted content data request, obtain The requests verification information in content data request is obtained, and is connect based on the requests verification information in content data request to content service The side of entering returns to the content-data of request.
The technical solution obtained by content-data provided by the embodiments of the present application, using current time stamp, to content number Cryptographic operation is executed according to the requests verification information in request, obtains encrypted content data request, and provide to content service Side sends encrypted content data request, and content service provider executes decryption oprerations to encrypted content data request, And content-data is asked using timestamp compared with existing other way according to the content-data that decrypted result returns to request Requests verification information in asking executes cryptographic operation, and the requests verification information that can be effectively prevent in content data request is let out Dew, and then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively content be avoided to take Pressure caused by performance when the content-data of business provider is crawled to content service provider.
The acquisition methods of the content-data of the present embodiment can be taken by any suitable content with data-handling capacity Be engaged in access side execution, including but not limited to: camera, terminal, mobile terminal, PC machine, server, mobile unit, amusement equipment, Advertising equipment, personal digital assistant (PDA), tablet computer, laptop, handheld device, smart glasses, smart watches, Wearable device, virtual display device or display enhancing equipment (such as Google Glass, Oculus Rift, Hololens, Gear VR) etc..
Embodiment two
Referring to Fig. 2, a kind of step flow chart of the acquisition methods of content-data of the embodiment of the present application two is shown.
The acquisition methods of the content-data of the present embodiment the following steps are included:
In step s 201, the content data request that reception content service access side is sent.
In the embodiment of the present application, the content data request that content service provider reception content service access side is sent. Requests verification information in the content data request is by encryption.It is understood that above description is merely illustrative , the embodiment of the present application does not do any restriction to this.
In step S202, using current time stamp, the requests verification information encrypted in the content data request is held Row decryption oprerations obtain the requests verification information in the content data request.
In some optional embodiments, the prolonging from content service access side to content service provider when content data request It is described to utilize current time stamp when time span caused by late is no more than one second, it is asked to what is encrypted in the content data request Verification information is asked to execute decryption oprerations, comprising: the length of the timestamp after the interception for including based on the content data request is believed Breath carries out intercept operation to the current time stamp, the timestamp after obtaining the interception;Utilize the time after the interception Stamp executes decryption oprerations to the requests verification information encrypted in the content data request, obtains in the content data request The first requests verification information.Take this, can decrypt to obtain the requests verification information in content data request.It is understood that It is, using current time stamp, any reality of decryption oprerations to be executed to the requests verification information encrypted in the content data request The mode of applying may be applicable to this, and the embodiment of the present application does not do any restriction to this.
In some optional embodiments, the prolonging from content service access side to content service provider when content data request It is described to utilize current time stamp, the request to encrypting in the content data request when time span caused by late is more than one second Verification information executes decryption oprerations, comprising: the length information of the timestamp after the interception for including based on the content data request, Intercept operation is carried out to the current time stamp, the timestamp after obtaining the interception;Timestamp after the interception is executed Subtraction, the timestamp after being subtracted;Request using the timestamp after described subtract, to being encrypted in the content data request Verification information executes decryption oprerations, obtains the second requests verification information in the content data request.Take this, can not only keep away Exempt from content data request from content service access side to time span caused by the delay of content service provider to decryption oprerations Influence, but also can decrypt to obtain the requests verification information in content data request.It is understood that using it is current when Between stab, any embodiment for executing decryption oprerations to the requests verification information that encrypts in the content data request is applicable In this, the embodiment of the present application does not do any restriction to this.
In a specific example, the current time stamp of content service access side is " 1504323599 ", and guarantees to add The effective time of content data request after close is 100 seconds, then content service access side uses the first eight bits of current time stamp " 15043235 " encrypt the requests verification information in content data request.It is taken when encrypted content data request reaches When business provider, when encrypted content data request is from content service access side to caused by the delay of content service provider Between span be more than one second, then the current time stamp that content service provider receives encrypted content data request is "1504323600".If interception current time stamp first eight bits, interception after timestamp be " 15043236 ", this with it is interior Timestamp " 15043235 " after holding the interception of service access side is not identical.That is, the key of content service provider with The key of content service access side is not identical, and content service provider cannot decrypt to obtain correct requests verification information.Therefore, It needs the timestamp " 15043236 " after the interception of content service provider subtracting 1, the timestamp after being subtracted "15043235".In this way, the key of content service provider is identical as the key of content service access side, content service provider It can decrypt to obtain correct requests verification information, be taken to solve content data request from content service access side to content Time span problem caused by the delay of business provider.Wherein, subtracted timestamp in utilization, to what is encrypted in content data request When requests verification information executes decryption oprerations, content-data can be asked using timestamp is subtracted by the inverse operation of Encryption Algorithm The requests verification information of middle encryption is asked to execute decryption oprerations.For example, DES, IDEA, RC2, RC4, SKIPJACK, RC5, aes algorithm Inverse operation.It is understood that above description is exemplary only, the embodiment of the present application does not do any restriction to this.
In a specific example, since prior and uncertain content data request is from content service access side to content Time span caused by the delay of service provider, using above two embodiment respectively to being encrypted in content data request Requests verification information execute decryption oprerations, obtain two kinds of requests verification information.Certainly, one of requests verification information is just True requests verification information, another requests verification information are the requests verification information of mistake.Then, both requests are utilized Verification information respectively verifies the validity of content data request, if two kinds of verification results be content data request without Effect, then illustrate that the content data request is invalid.If wherein having a kind of verification result is that content data request is effective, say The bright content data request is effective.It is understood that above description is exemplary only, the embodiment of the present application to this not Do any restriction.
In step S203, based on the requests verification information in the content data request, accessed to the content service Side sends the content-data of request.
In some optional embodiments, based on the requests verification information in the content data request, to the content When servicing the content-data of access side's transmission request, it is based on the first requests verification information, the content data request is held The first verification operation of row;Do not pass through if the content data request is verified, is based on the second requests verification information, it is right The content data request executes the second verification operation;Pass through if the content data request is verified, to the content Service the content-data that access side sends request.It is understood that based on the requests verification letter in the content data request Breath, any embodiment for sending the content-data of request to the content service access side may be applicable to this, and the application is real It applies example and does not do any restriction to this.
In a specific example, it is being based on the first requests verification information, the content data request is being executed When the first verification operation, pass through if the content data request is verified, illustrates that the first requests verification information is positive True requests verification information, the content data request is effectively request, and sends request to the content service access side Content-data.Do not pass through if the content data request is verified, illustrates that the first requests verification information is wrong Requests verification information or the content data request are invalidation request.It is being based on the second requests verification information, to described When content data request executes the second verification operation, passes through if the content data request is verified, illustrate described second Requests verification information is correct requests verification information, and the content data request is effectively request, and to the content service Access side sends the content-data of request.Do not pass through if the content data request is verified, illustrates the content-data Request is invalidation request.It is understood that above description is exemplary only, the embodiment of the present application does not do any limit to this It is fixed.
The technical solution obtained by content-data provided by the embodiments of the present application, reception content service access side are sent Content data request, and current time stamp is utilized, decryption oprerations are executed to the requests verification information encrypted in content data request, Obtain the requests verification information in content data request;Again based on the requests verification information in content data request, taken to content Business access side sends the content-data of request, compared with existing other way, is added using timestamp in content data request Close requests verification information executes decryption oprerations, and the requests verification information that can be effectively prevent in content data request is leaked, And then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively avoid content service To pressure caused by the performance of content service provider when the content-data of provider is crawled.
The acquisition methods of the content-data of the present embodiment can be taken by any suitable content with data-handling capacity Be engaged in provider execute, including but not limited to: camera, terminal, mobile terminal, PC machine, server, mobile unit, amusement equipment, Advertising equipment, personal digital assistant (PDA), tablet computer, laptop, handheld device, smart glasses, smart watches, Wearable device, virtual display device or display enhancing equipment (such as Google Glass, Oculus Rift, Hololens, Gear VR) etc..
Embodiment three
Referring to Fig. 3, a kind of step flow chart of the acquisition methods of content-data of the embodiment of the present application three is shown.
The acquisition methods of the content-data of the present embodiment the following steps are included:
In step S301, reception content services the content data request that access side is sent.
Since step S301 is similar with above-mentioned steps S201, details are not described herein.
In step s 302, using current time stamp, the requests verification information encrypted in the content data request is held Row decryption oprerations obtain the requests verification information in the content data request.
Since step S302 is similar with above-mentioned steps S202, details are not described herein.
In step S303, when the requests verification information is that content service provider is supplied to the content service access When the access mark of side, if it is determined that the access is identified as the access mark being locally stored, it is determined that the content-data is asked It asks to be verified and pass through, and send the content-data of request to the content service access side.
In a specific example, when the requests verification information is that content service provider is supplied to the content clothes The access mark of business access side, and the content data request does not include that content service provider is supplied to the content service When the authorize coding of access side, if it is determined that the access is identified as the access mark being locally stored, it is determined that the content number It is verified and passes through according to request, and send the content-data of request to the content service access side.If it is determined that the access mark Know the access mark not to be locally stored, it is determined that the content data request, which is verified, not to be passed through.More than it is understood that Describe exemplary only, the embodiment of the present application does not do any restriction to this.
In some optional embodiments, when the requests verification information is that content service provider is supplied to the content clothes The be engaged in access of access side identifies, and the content data request includes that content service provider is supplied to the content service and connects When the authorize coding for the side of entering, if it is determined that it is described access mark and the authorize coding be respectively be locally stored access mark and Authorize coding, then based on the access mark and the corresponding relationship of authorize coding being locally stored, determine the access identify with it is described Whether authorize coding matches;If it is determined that the access mark is matched with the authorize coding, it is determined that the content-data is asked It asks to be verified and pass through, and send the content-data of request to the content service access side.If it is determined that the access mark is not It is not the authorize coding being locally stored for the access mark being locally stored or the authorize coding, it is determined that the content number It is verified according to request and does not pass through.If it is determined that the access mark is unpaired with the authorize coding, it is determined that the content number It is verified according to request and does not pass through.Take this, can be improved the verification the verifying results of content data request.It is understood that above description Exemplary only, the embodiment of the present application does not do any restriction to this.
In some optional embodiments, when the requests verification information is that content service provider is supplied to the content clothes When the access mark and authorize coding of business access side, if it is determined that the access mark and the authorize coding are respectively locally deposited The access mark and authorize coding of storage, then based on the access mark and the corresponding relationship of authorize coding being locally stored, determine described in Whether access mark matches with the authorize coding;If it is determined that the access mark is matched with the authorize coding, it is determined that The content data request, which is verified, to be passed through, and the content-data of request is sent to the content service access side.If it is determined that The access mark is not the authorize coding being locally stored for the access mark being locally stored or the authorize coding, then It determines that the content data request is verified not passing through.If it is determined that the access mark is unpaired with the authorize coding, then It determines that the content data request is verified not passing through.Take this, can be improved the verification the verifying results of content data request.It is understood that , above description is exemplary only, and the embodiment of the present application does not do any restriction to this.
In some optional embodiments, when the requests verification information is that content service provider is supplied to the content clothes It is engaged in the authorize coding of access side, and the content data request includes that content service provider is supplied to the content service and connects The side of entering access mark when, if it is determined that it is described access mark and the authorize coding be respectively be locally stored access mark and Authorize coding, then based on the access mark and the corresponding relationship of authorize coding being locally stored, determine the access identify with it is described Whether authorize coding matches;If it is determined that the access mark is matched with the authorize coding, it is determined that the content-data is asked It asks to be verified and pass through, and send the content-data of request to the content service access side.If it is determined that the access mark is not It is not the authorize coding being locally stored for the access mark being locally stored or the authorize coding, it is determined that the content number It is verified according to request and does not pass through.If it is determined that the access mark is unpaired with the authorize coding, it is determined that the content number It is verified according to request and does not pass through.Take this, can be improved the verification the verifying results of content data request.It is understood that above description Exemplary only, the embodiment of the present application does not do any restriction to this.
The acquisition methods of the content-data of the present embodiment can be taken by any suitable content with data-handling capacity Be engaged in provider execute, including but not limited to: camera, terminal, mobile terminal, PC machine, server, mobile unit, amusement equipment, Advertising equipment, personal digital assistant (PDA), tablet computer, laptop, handheld device, smart glasses, smart watches, Wearable device, virtual display device or display enhancing equipment (such as Google Glass, Oculus Rift, Hololens, Gear VR) etc..
Example IV
Referring to Fig. 4, a kind of structural block diagram of the acquisition device of content-data according to the embodiment of the present application four is shown.
The acquisition device of the content-data of the present embodiment includes: the first encrypting module 401, for utilizing current time stamp, Cryptographic operation is executed to the requests verification information in content data request, obtains encrypted content data request;First sends Module 402, for sending the encrypted content data request to content service provider, so that the content service provides Side executes decryption oprerations to the encrypted content data request, and the content-data of request is returned according to decrypted result.
Optionally, first encrypting module 401, comprising: interception module 4011, for being executed to the current time stamp Intercept operation, the timestamp after being intercepted;Second encrypting module 4012, for the timestamp after the utilization interception, to institute The requests verification information stated in content data request executes cryptographic operation, obtains the encrypted content data request.
Optionally, the encrypted content data request includes the length information of the timestamp after the interception.
Optionally, the requests verification information includes that the content service provider is supplied to connecing for content service access side Inlet identity and/or authorize coding.
The acquisition device of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Another embodiment of the application also provides a kind of storage medium, is stored thereon with computer executable instructions, the meter Calculation machine executable instruction executes following steps when being processed by the processor: current time stamp is utilized, in content data request Requests verification information executes cryptographic operation, obtains encrypted content data request;Described add is sent to content service provider Content data request after close, so that the content service provider executes decryption behaviour to the encrypted content data request Make, and returns to the content-data of request according to decrypted result.
Another embodiment of the application also provides a kind of electronic equipment, comprising: one or more processors;Memory is used for Store one or more programs;When one or more of programs are executed by one or more of processors, so that described one A or multiple processors realize the acquisition methods of content-data as described above.
Embodiment five
Referring to Fig. 5, a kind of structural block diagram of the acquisition device of content-data according to the embodiment of the present application five is shown.
The acquisition device of the content-data of the present embodiment includes: receiving module 501, for reception content service access side hair The content data request sent;First deciphering module 502, for utilizing current time stamp, to being encrypted in the content data request Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request;Second sending module 503, for being sent in request to the content service access side based on the requests verification information in the content data request Hold data.
The acquisition device of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Embodiment six
Referring to Fig. 6, a kind of structural block diagram of the acquisition device of content-data according to the embodiment of the present application six is shown.
The acquisition device of the content-data of the present embodiment includes: receiving module 601, for reception content service access side hair The content data request sent;First deciphering module 602, for utilizing current time stamp, to being encrypted in the content data request Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request;Second sending module 603, for being sent in request to the content service access side based on the requests verification information in the content data request Hold data.
Optionally, first deciphering module 602, is specifically used for: after the interception for including based on the content data request Timestamp length information, intercept operation, timestamp after obtaining the interception are carried out to the current time stamp;Using institute Timestamp after stating interception executes decryption oprerations to the requests verification information that encrypts in the content data request, described in acquisition The first requests verification information in content data request.
Optionally, described device further include: subtraction block 6021, for executing subtraction fortune to the timestamp after the interception It calculates, the timestamp after being subtracted;Second deciphering module 6022, for the timestamp after subtracting described in utilizing, to the content-data The requests verification information encrypted in request executes decryption oprerations, obtains the second requests verification letter in the content data request Breath.
Optionally, second sending module 603, is specifically used for: the first requests verification information is based on, to described interior Hold request of data and executes the first verification operation;Do not pass through if the content data request is verified, is asked based on described second Verification information is sought, the second verification operation is executed to the content data request;Pass through if the content data request is verified, The content-data of request is then sent to the content service access side.
Optionally, when the requests verification information is that content service provider is supplied to connecing for the content service access side When inlet identity, second sending module 603 is specifically used for: if it is determined that the access is identified as the access mark being locally stored Know, it is determined that the content data request, which is verified, to be passed through, and the content-data of request is sent to the content service access side.
Optionally, when the requests verification information is that content service provider is supplied to connecing for the content service access side When inlet identity and authorize coding, second sending module 603 is specifically used for: if it is determined that access mark is awarded with described Power coding is respectively the access mark and authorize coding being locally stored, then based on the access mark and authorize coding being locally stored Corresponding relationship, determines whether the access mark matches with the authorize coding;If it is determined that the access mark is awarded with described Power coding pairing, it is determined that the content data request, which is verified, to be passed through, and sends request to the content service access side Content-data.
The acquisition device of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Another embodiment of the application also provides a kind of storage medium, is stored thereon with computer executable instructions, the meter Calculation machine executable instruction executes following steps when being processed by the processor: the content-data that reception content service access side is sent is asked It asks;Using current time stamp, decryption oprerations are executed to the requests verification information encrypted in the content data request, described in acquisition Requests verification information in content data request;Based on the requests verification information in the content data request, to the content Service the content-data that access side sends request.
Another embodiment of the application also provides a kind of electronic equipment, comprising: one or more processors;Memory is used for Store one or more programs;When one or more of programs are executed by one or more of processors, so that described one A or multiple processors realize the acquisition methods of content-data as described above.
Embodiment seven
Referring to Fig. 7, a kind of structural schematic diagram of the acquisition system of content-data according to the embodiment of the present application seven is shown.
The acquisition system of the content-data of the present embodiment includes: content service access side 702 and connects with the content service The content service provider 701 that the side of entering 702 connects;The content service access side 702 utilizes current time stamp, to content-data Requests verification information in request executes cryptographic operation, obtains encrypted content data request, and mention to the content service Supplier 701 sends the encrypted content data request;701 reception content of content service provider services access side 702 content data requests sent, and current time stamp is utilized, to the requests verification information encrypted in the content data request Decryption oprerations are executed, obtain the requests verification information in the content data request, then based in the content data request Requests verification information sends the content-data of request to the content service access side 702.
In the present embodiment, content service provider 701 can be referred to as content-data center again, be specifically as follows a PC Machine, and content service access side 702 can be smart phone, function machine, network printer etc..
The acquisition system of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Embodiment eight
Fig. 8 is the structural schematic diagram according to a kind of electronic equipment of the embodiment of the present application eight.As shown in figure 8, the equipment packet It includes: one or more processors 81 and memory 82, in Fig. 8 by taking a processor 81 as an example.The equipment for executing the above method It can also include: input unit 83 and output device 84.Processor 81, memory 82, input unit 83 and output device 84 can To be connected by bus or other modes, in Fig. 8 for being connected by bus.
Memory 82 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey Sequence, non-volatile computer executable program and module, as the corresponding program instruction of the above method in the embodiment of the present application/ Module.Non-volatile software program, instruction and the module that processor 81 is stored in memory 82 by operation, thereby executing The various function application and data processing of server, the i.e. above method in realization above method embodiment.
Memory 82 may include storing program area and storage data area, wherein storing program area can storage program area, Application program required at least one function;Storage data area can store the content-data etc. of acquisition.In addition, memory 82 can It can also include nonvolatile memory 82, for example, at least a magnetic disk storage to include high-speed random access memory 82 Part, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 82 it is optional include relative to The remotely located memory 82 of processor 81, these remote memories 82 can pass through network connection to client.Above-mentioned network Example include but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Input unit 83 can receive the number or character information of input, and generate the user setting and function with client It can control related key signals input.Input unit 83 may include by equipment such as pressing mold groups.
One or more of modules are stored in the memory 82, when by one or more of processors 81 When execution, the above method in above-mentioned any means embodiment is executed.
Method provided by the embodiment of the present application can be performed in the said goods, has the corresponding functional module of execution method and has Beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to method provided by the embodiment of the present application.
The electronic equipment of the embodiment of the present application exists in a variety of forms, including but not limited to:
(1) mobile communication equipment: the characteristics of this kind of equipment is that have mobile communication function, and to provide speech, data Communication is main target.This Terminal Type includes: smart phone (such as iPhone), multimedia handset, functional mobile phone and low Hold mobile phone etc..
(2) super mobile personal computer equipment: this kind of equipment belongs to the scope of personal computer, there is calculating and processing function Can, generally also have mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind of equipment can show and play multimedia content.Such equipment include: audio, Video player (such as iPod), handheld device, e-book and intelligent toy and portable car-mounted navigation equipment.
(4) server: the equipment of the service of calculating is provided, the composition of server includes processor 71, hard disk, memory, system Bus etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, in processing energy Power, stability, reliability, safety, scalability, manageability etc. are more demanding.
(5) other electronic devices with data interaction function.
The apparatus embodiments described above are merely exemplary, wherein described, module can as illustrated by the separation member It is physically separated with being or may not be, the component shown as module may or may not be physics mould Block, it can it is in one place, or may be distributed on multiple network modules.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, the computer readable recording medium include for Any mechanism of the readable form storage of computer (such as computer) or transmission information.For example, machine readable media includes only Read memory (ROM), random access memory (RAM), magnetic disk storage medium, optical storage media, flash medium, electricity, light, Sound or the transmitting signal (for example, carrier wave, infrared signal, digital signal etc.) of other forms etc., which includes Some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes respectively Method described in certain parts of a embodiment or embodiment.
It will be understood by those skilled in the art that the embodiments of the present application may be provided as method, apparatus (equipment) or Computer program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine soft The form of the embodiment of part and hardware aspect.Moreover, it wherein includes to calculate that the embodiment of the present application, which can be used in one or more, Computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, the optical memory of machine usable program code Deng) on the form of computer program product implemented.
The embodiment of the present application is referring to the method, apparatus (equipment) and computer program product according to the embodiment of the present application Flowchart and/or the block diagram describes.It should be understood that can be realized by computer program instructions every in flowchart and/or the block diagram The combination of process and/or box in one process and/or box and flowchart and/or the block diagram.It can provide these computers Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the embodiment of the present application, rather than it is limited System;Although the application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: its It is still possible to modify the technical solutions described in the foregoing embodiments, or part of technical characteristic is equal Replacement;And these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution Spirit and scope.

Claims (22)

1. a kind of acquisition methods of content-data, which is characterized in that the described method includes:
Using current time stamp, cryptographic operation is executed to the requests verification information in content data request, is obtained in encrypted Hold request of data;
The encrypted content data request is sent to content service provider, so that the content service provider is to described Encrypted content data request executes decryption oprerations, and the content-data of request is returned according to decrypted result.
2. the method according to claim 1, wherein described utilize current time stamp, in content data request Requests verification information execute cryptographic operation, comprising:
Intercept operation is executed to the current time stamp, the timestamp after being intercepted;
Using the timestamp after the interception, cryptographic operation is executed to the requests verification information in the content data request, is obtained Obtain the encrypted content data request.
3. according to the method described in claim 2, it is characterized in that, the encrypted content data request includes the interception The length information of timestamp afterwards.
4. method described in any one of -3 claims according to claim 1, which is characterized in that the requests verification information The access mark and/or authorize coding of content service access side are supplied to including the content service provider.
5. a kind of acquisition methods of content-data, which is characterized in that the described method includes:
The content data request that reception content service access side is sent;
Using current time stamp, decryption oprerations are executed to the requests verification information encrypted in the content data request, obtain institute State the requests verification information in content data request;
Based on the requests verification information in the content data request, the content number of request is sent to the content service access side According to.
6. according to the method described in claim 5, it is characterized in that, it is described utilize current time stamp, the content-data is asked The requests verification information of middle encryption is asked to execute decryption oprerations, comprising:
The length information of timestamp after the interception for including based on the content data request cuts the current time stamp Extract operation, the timestamp after obtaining the interception;
Using the timestamp after the interception, decryption behaviour is executed to the requests verification information encrypted in the content data request Make, obtains the first requests verification information in the content data request.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Subtraction is executed to the timestamp after the interception, the timestamp after being subtracted;
Using the timestamp after described subtract, decryption oprerations are executed to the requests verification information encrypted in the content data request, Obtain the second requests verification information in the content data request.
8. the method according to the description of claim 7 is characterized in that the requests verification based in the content data request Information sends the content-data of request to the content service access side, comprising:
Based on the first requests verification information, the first verification operation is executed to the content data request;
Do not pass through if the content data request is verified, the second requests verification information is based on, to the content number The second verification operation is executed according to request;
Pass through if the content data request is verified, the content-data of request is sent to the content service access side.
9. the method according to claim 1, wherein when the requests verification information is that content service provider mentions When supplying the access mark of the content service access side, the requests verification information based in the content data request, The content-data of request is sent to the content service access side, comprising:
If it is determined that the access is identified as the access mark being locally stored, it is determined that the content data request is verified logical It crosses, and sends the content-data of request to the content service access side.
10. the method according to claim 1, wherein when the requests verification information is content service provider It is described based on asking in the content data request when being supplied to the access mark and authorize coding of the content service access side Verification information is sought, the content-data of request is sent to the content service access side, comprising:
If it is determined that the access mark and the authorize coding are respectively the access mark and authorize coding that are locally stored, then base In the corresponding relationship of the access mark and authorize coding that are locally stored, determine whether the access mark matches with the authorize coding It is right;
If it is determined that the access mark is matched with the authorize coding, it is determined that the content data request, which is verified, to be passed through, And the content-data of request is sent to the content service access side.
11. a kind of acquisition device of content-data, which is characterized in that described device includes:
First encrypting module executes encryption behaviour to the requests verification information in content data request for utilizing current time stamp Make, obtains encrypted content data request;
First sending module, for sending the encrypted content data request to content service provider, so that in described Hold service provider and decryption oprerations are executed to the encrypted content data request, and is returned in request according to decrypted result Hold data.
12. device according to claim 11, which is characterized in that first encrypting module, comprising:
Interception module, for executing intercept operation to the current time stamp, the timestamp after being intercepted;
Second encrypting module, for believing the requests verification in the content data request using the timestamp after the interception Breath executes cryptographic operation, obtains the encrypted content data request.
13. a kind of acquisition device of content-data, which is characterized in that described device includes:
Receiving module, the content data request sent for reception content service access side;
First deciphering module holds the requests verification information encrypted in the content data request for utilizing current time stamp Row decryption oprerations obtain the requests verification information in the content data request;
Second sending module, for being accessed to the content service based on the requests verification information in the content data request Side sends the content-data of request.
14. device according to claim 13, which is characterized in that first deciphering module is specifically used for:
The length information of timestamp after the interception for including based on the content data request cuts the current time stamp Extract operation, the timestamp after obtaining the interception;
Using the timestamp after the interception, decryption behaviour is executed to the requests verification information encrypted in the content data request Make, obtains the first requests verification information in the content data request.
15. device according to claim 14, which is characterized in that described device further include:
Subtraction block, for executing subtraction to the timestamp after the interception, the timestamp after being subtracted;
Second deciphering module, for the timestamp after subtracting described in utilizing, to the requests verification encrypted in the content data request Information executes decryption oprerations, obtains the second requests verification information in the content data request.
16. device according to claim 15, which is characterized in that second sending module is specifically used for:
Based on the first requests verification information, the first verification operation is executed to the content data request;
Do not pass through if the content data request is verified, the second requests verification information is based on, to the content number The second verification operation is executed according to request;
Pass through if the content data request is verified, the content-data of request is sent to the content service access side.
17. device according to claim 13, which is characterized in that when the requests verification information is content service provider When being supplied to the access mark of the content service access side, second sending module is specifically used for:
If it is determined that the access is identified as the access mark being locally stored, it is determined that the content data request is verified logical It crosses, and sends the content-data of request to the content service access side.
18. device according to claim 13, which is characterized in that when the requests verification information is content service provider When being supplied to the access mark and authorize coding of the content service access side, second sending module is specifically used for:
If it is determined that the access mark and the authorize coding are respectively the access mark and authorize coding that are locally stored, then base In the corresponding relationship of the access mark and authorize coding that are locally stored, determine whether the access mark matches with the authorize coding It is right;
If it is determined that the access mark is matched with the authorize coding, it is determined that the content data request, which is verified, to be passed through, And the content-data of request is sent to the content service access side.
19. a kind of acquisition system of content-data, which is characterized in that the system comprises:
Content service access side and the content service provider being connect with the content service access side;
The content service access side utilizes current time stamp, executes encryption behaviour to the requests verification information in content data request Make, obtains encrypted content data request, and send the encrypted content-data to the content service provider and ask It asks;
The content data request that content service provider reception content service access side is sent, and current time stamp is utilized, Decryption oprerations are executed to the requests verification information encrypted in the content data request, obtain asking in the content data request Verification information is sought, then based on the requests verification information in the content data request, sends and asks to the content service access side The content-data asked.
20. a kind of storage medium, which is characterized in that be stored thereon with computer executable instructions, the computer is executable to be referred to Order executes following steps when being processed by the processor:
Using current time stamp, cryptographic operation is executed to the requests verification information in content data request, is obtained in encrypted Hold request of data;
The encrypted content data request is sent to content service provider, so that the content service provider is to described Encrypted content data request executes decryption oprerations, and the content-data of request is returned according to decrypted result.
21. a kind of storage medium, which is characterized in that be stored thereon with computer executable instructions, the computer is executable to be referred to Order executes following steps when being processed by the processor:
The content data request that reception content service access side is sent;
Using current time stamp, decryption oprerations are executed to the requests verification information encrypted in the content data request, obtain institute State the requests verification information in content data request;
Based on the requests verification information in the content data request, the content number of request is sent to the content service access side According to.
22. a kind of electronic equipment characterized by comprising
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now acquisition methods of the content-data as described in any one of claim 1-10 claim.
CN201811046084.7A 2018-09-07 2018-09-07 Acquisition methods, device, system, storage medium and the electronic equipment of content-data Pending CN109376539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811046084.7A CN109376539A (en) 2018-09-07 2018-09-07 Acquisition methods, device, system, storage medium and the electronic equipment of content-data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811046084.7A CN109376539A (en) 2018-09-07 2018-09-07 Acquisition methods, device, system, storage medium and the electronic equipment of content-data

Publications (1)

Publication Number Publication Date
CN109376539A true CN109376539A (en) 2019-02-22

Family

ID=65404639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811046084.7A Pending CN109376539A (en) 2018-09-07 2018-09-07 Acquisition methods, device, system, storage medium and the electronic equipment of content-data

Country Status (1)

Country Link
CN (1) CN109376539A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117633326A (en) * 2023-12-04 2024-03-01 北京曜志科技有限公司 Data monitoring method for Internet mass data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685739A (en) * 2011-12-08 2012-09-19 北京高森明晨信息科技有限公司 Authentication method and system for Android enterprise applications
CN102710776A (en) * 2012-06-05 2012-10-03 天津兆民云计算科技有限公司 Method for preventing repeatedly requesting API server in short time
US20160170733A1 (en) * 2014-12-10 2016-06-16 Ford Global Technologies, Llc Encryption for telematics flashing of a vehicle
CN108292994A (en) * 2015-09-30 2018-07-17 诺基亚技术有限公司 Information authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685739A (en) * 2011-12-08 2012-09-19 北京高森明晨信息科技有限公司 Authentication method and system for Android enterprise applications
CN102710776A (en) * 2012-06-05 2012-10-03 天津兆民云计算科技有限公司 Method for preventing repeatedly requesting API server in short time
US20160170733A1 (en) * 2014-12-10 2016-06-16 Ford Global Technologies, Llc Encryption for telematics flashing of a vehicle
CN108292994A (en) * 2015-09-30 2018-07-17 诺基亚技术有限公司 Information authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117633326A (en) * 2023-12-04 2024-03-01 北京曜志科技有限公司 Data monitoring method for Internet mass data

Similar Documents

Publication Publication Date Title
CN110995737B (en) Gradient fusion method and device for federal learning and electronic equipment
US10635790B2 (en) Systems and methods for providing identity assurance for decentralized applications
EP3779717A1 (en) Multiparty secure computing method, device, and electronic device
CN110992027B (en) Efficient transaction method and device for realizing privacy protection in block chain
CN108322469B (en) Information processing system, method and apparatus
CN111008228A (en) Method and device for inquiring account privacy information in block chain
US8850206B2 (en) Client-server system with security for untrusted server
CN109729041B (en) Method and device for issuing and acquiring encrypted content
US20130142331A1 (en) Binding of protected video content to video player with encryption key
US20130142330A1 (en) Binding of protected video content to video player with block cipher hash
CN103716330A (en) Method and device for encryption and decryption of digital content
CN110457898A (en) Operation note storage method, device and equipment based on credible performing environment
CN105468940B (en) Method for protecting software and device
CN109891907A (en) Using credible platform module verifying to the rendering of video content at client device
KR20190010251A (en) A method and apparatus of lpes for security enhancement in cloud storage transport phase
CN109361512A (en) Data transmission method
WO2018227471A1 (en) Secure processing method and apparatus for biometric feature data, sensor, and terminal device
CN112927077B (en) Method and device for realizing contract calling based on FPGA
CN110688341B (en) Method and device for realizing efficient contract calling on FPGA (field programmable Gate array)
Yang et al. A lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform
CN109376539A (en) Acquisition methods, device, system, storage medium and the electronic equipment of content-data
US11133926B2 (en) Attribute-based key management system
CN117061105A (en) Data processing method and device, readable medium and electronic equipment
Amanullah et al. An Effective double verification-based method for certifying information safety in cloud computing
CN116010401A (en) Information hiding trace query method and system based on block chain and careless transmission expansion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200604

Address after: 310051 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Alibaba (China) Co.,Ltd.

Address before: 510627 Guangdong city of Guangzhou province Whampoa Tianhe District Road No. 163 Xiping Yun Lu Yun Ping square B radio tower 12 layer self unit 01

Applicant before: GUANGZHOU SHENMA MOBILE INFORMATION TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222