Acquisition methods, device, system, storage medium and the electronic equipment of content-data
Technical field
The invention relates to Internet technical field more particularly to a kind of acquisition methods of content-data, device, it is
System, storage medium and electronic equipment.
Background technique
Currently, internet content is often crawled by rival, search engine or other users by web crawlers.
Web crawlers (abbreviation crawler) is a kind of chained address searching webpage by webpage, and according to certain rules, automatic to obtain
The program of web page contents.Specifically, by the rule of setting, crawler can crawl some content numbers in webpage source code easily
According to.However, these content-datas are exactly competitiveness for networking products, once these content-datas are largely crawled, this
The competitive advantage of a networking products will weaken significantly.In addition, the performance for returning associated server brings some pressure.
The existing anti-technology that crawls is that addition access key, content service provider are connect using this in content data request
The relevant information for entering key and content service access side carries out legitimate verification to content data request.However, in content-data
The access key added in request is easy to be cracked by rival, search engine or other users, thus cannot be effectively
The content-data of content service provider is prevented to be crawled.
Summary of the invention
A kind of acquisition methods for being designed to provide content-data of the embodiment of the present application, device, system, storage medium and
Electronic equipment is crawled with to solve the content-data existing in the prior art that cannot be effectively prevented content service provider
Problem.
According to the embodiment of the present application in a first aspect, providing a kind of acquisition methods of content-data.The described method includes:
Using current time stamp, cryptographic operation is executed to the requests verification information in content data request, obtains encrypted content number
According to request;The encrypted content data request is sent to content service provider, so that the content service provider couple
The encrypted content data request executes decryption oprerations, and the content-data of request is returned according to decrypted result.
According to the second aspect of the embodiment of the present application, a kind of acquisition methods of content-data are provided.The described method includes:
The content data request that reception content service access side is sent;Using current time stamp, to being encrypted in the content data request
Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request;Based on the content
Requests verification information in request of data sends the content-data of request to the content service access side.
According to the third aspect of the embodiment of the present application, a kind of acquisition device of content-data is provided.Described device includes:
First encrypting module executes cryptographic operation to the requests verification information in content data request, obtains for utilizing current time stamp
Obtain encrypted content data request;First sending module, for sending the encrypted content to content service provider
Request of data, so that the content service provider executes decryption oprerations to the encrypted content data request, and according to
Decrypted result returns to the content-data of request.
According to the fourth aspect of the embodiment of the present application, a kind of acquisition device of content-data is provided.Described device includes:
Receiving module, the content data request sent for reception content service access side;First deciphering module, when for utilizing current
Between stab, decryption oprerations are executed to the requests verification information that encrypts in the content data request, obtain the content data request
In requests verification information;Second sending module, for based on the requests verification information in the content data request, to described
Content service access side sends the content-data of request.
According to the 5th of the embodiment of the present application the aspect, a kind of acquisition system of content-data is provided, the system comprises:
Content service access side and the content service provider being connect with the content service access side;The content service accesses Fang Li
With current time stamp, cryptographic operation is executed to the requests verification information in content data request, obtains encrypted content-data
Request, and the encrypted content data request is sent to the content service provider;The content service provider connects
The content data request that sends of content service access side is received, and using current time stamp, to encrypting in the content data request
Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request, then based in described
Hold the requests verification information in request of data, the content-data of request is sent to the content service access side.
According to the 6th of the embodiment of the present application the aspect, a kind of storage medium is provided, meter is stored on the storage medium
Calculation machine executable instruction, the computer executable instructions execute following steps when being processed by the processor: utilizing current time
Stamp executes cryptographic operation to the requests verification information in content data request, obtains encrypted content data request;To content
Service provider sends the encrypted content data request, so that the content service provider is to described encrypted interior
Hold request of data and execute decryption oprerations, and returns to the content-data of request according to decrypted result.
According to the 7th of the embodiment of the present application the aspect, a kind of storage medium is provided, meter is stored on the storage medium
Calculation machine executable instruction, the computer executable instructions execute following steps when being processed by the processor: reception content service
The content data request that access side is sent;Using current time stamp, the requests verification encrypted in the content data request is believed
Breath executes decryption oprerations, obtains the requests verification information in the content data request;Based in the content data request
Requests verification information sends the content-data of request to the content service access side.
According to the eighth aspect of the embodiment of the present application, a kind of electronic equipment is provided, the equipment includes: one or more
Processor;Memory, for storing one or more programs;When one or more of programs are by one or more of processing
Device executes, so that one or more of processors realize the content as described in the embodiment of the present application first aspect or second aspect
The acquisition methods of data.
The technical solution obtained by content-data provided by the embodiments of the present application, using current time stamp, to content number
Cryptographic operation is executed according to the requests verification information in request, obtains encrypted content data request, and provide to content service
Side sends encrypted content data request, and content service provider executes decryption oprerations to encrypted content data request,
And content-data is asked using timestamp compared with existing other way according to the content-data that decrypted result returns to request
Requests verification information in asking executes cryptographic operation, and the requests verification information that can be effectively prevent in content data request is let out
Dew, and then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively content be avoided to take
Pressure caused by performance when the content-data of business provider is crawled to content service provider.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in application embodiment can also obtain according to these attached drawings for those of ordinary skill in the art
Obtain other attached drawings.
Fig. 1 is the step flow chart according to a kind of acquisition methods of content-data of the embodiment of the present application one;
Fig. 2 is the step flow chart according to a kind of acquisition methods of content-data of the embodiment of the present application two;
Fig. 3 is the step flow chart according to a kind of acquisition methods of content-data of the embodiment of the present application three;
Fig. 4 is the structural block diagram according to a kind of acquisition device of content-data of the embodiment of the present application four;
Fig. 5 is the structural block diagram according to a kind of acquisition device of content-data of the embodiment of the present application five;
Fig. 6 is the structural block diagram according to a kind of acquisition device of content-data of the embodiment of the present application six;
Fig. 7 is the structural schematic diagram according to a kind of acquisition system of content-data of the embodiment of the present application seven;
Fig. 8 is the structural schematic diagram according to a kind of electronic equipment of the embodiment of the present application eight.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present application, below in conjunction with the application
Attached drawing in embodiment, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described reality
Applying example only is the embodiment of the present application a part of the embodiment, instead of all the embodiments.Based on the implementation in the embodiment of the present application
The range of the embodiment of the present application protection all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
Embodiment one
Referring to Fig.1, a kind of step flow chart of the acquisition methods of content-data of the embodiment of the present application one is shown.
The acquisition methods of the content-data of the present embodiment the following steps are included:
In step s101, using current time stamp, encryption behaviour is executed to the requests verification information in content data request
Make, obtains encrypted content data request.
In the embodiment of the present application, the current time stamp can be for since on January 1st, 1970 (00:00:00GMT)
Number of seconds, the content data request is used to access direction content service provider request content data for content service, described to ask
Seeking verification information may include that the content service provider is supplied to the access mark of content service access side and/or authorization is compiled
Code.It is understood that above description is exemplary only, the embodiment of the present application does not do any restriction to this.
In some optional embodiments, current time stamp is being utilized, the requests verification information in content data request is being held
When row cryptographic operation, intercept operation is executed to the current time stamp, the timestamp after being intercepted;After the interception
Timestamp executes cryptographic operation to the requests verification information in the content data request, obtains the encrypted content number
According to request.Wherein, the encrypted content data request includes the length information of the timestamp after the interception.Take this, no
The requests verification information that can only effectively prevent in content data request is leaked, and also can ensure that encrypted content number
Having in limit effectively according to request, and then the content-data that can be effectively prevented content service provider is crawled.It can be with
Understand, using current time stamp, any implementation of cryptographic operation is executed to the requests verification information in content data request
Mode may be applicable to this, and the embodiment of the present application does not do any restriction to this.
In a specific example, content service can be reached from content service access side according to content data request and provided
The use length of the delay adjustment current time stamp of side, then the use length based on current time stamp, to the current time stamp
Execute intercept operation, the timestamp after being intercepted.Specifically, the length of current time stamp is the digit of current time stamp, example
Such as, the length of current time stamp " 1504323599 " is 10, and its precision is the second.If using first nine of current time stamp,
Timestamp after then intercepting is " 150432359 ", and using the timestamp after the interception to the request in content data request
After verification information executes cryptographic operation, the effective time of the encrypted content data request is 10 seconds.If encrypted
Content data request is more than 10 seconds from the duration for reaching content service provider is encrypted to, and content service provider cannot utilize
Current time stamp, which is obtained, executes decryption oprerations with the content data request after the identical key pair encryption in content service access side, from
And lead to the failure of encrypted content data request.If the timestamp using the first eight bits of current time stamp, after interception
For " 15043235 ", and encryption behaviour is executed to the requests verification information in content data request using the timestamp after the interception
After work, the effective time of the encrypted content data request is 100 seconds.In some optional embodiments, interception is being utilized
Timestamp afterwards in content data request requests verification information execute cryptographic operation when, can by symmetry encryption technology,
Cryptographic operation is executed to the requests verification information in content data request using the timestamp after interception, for example, DES, IDEA,
RC2, RC4, SKIPJACK, RC5, aes algorithm etc..In some optional embodiments, the content service access side is integrated with
Encryption Algorithm library, there are many symmetry encryption algorithms as described above for Encryption Algorithm library preservation.The content service access side
One of Encryption Algorithm library symmetry encryption algorithm can be called, using the timestamp after interception to asking in content data request
Verification information is asked to execute cryptographic operation.It is understood that above description is exemplary only, the embodiment of the present application does not do this
Any restriction.
In a specific example, when the requests verification information in content data request is the content service provider
When being supplied to the access mark of content service access side, content service access side asks content-data using the timestamp after interception
Access mark in asking executes cryptographic operation, obtains encrypted content data request.In some optional embodiments, described to add
Content data request after close may include the length for accessing mark, the authorize coding of unencryption and the timestamp after interception of encryption
Information.Alternatively, the access mark and the timestamp after interception that the encrypted content data request may include encryption
Length information.When the requests verification information in content data request is that the content service provider is supplied to content service access
When the access mark and authorize coding of side, content service access side is using the timestamp after interception to connecing in content data request
Inlet identity and authorize coding execute cryptographic operation, obtain encrypted content data request.Wherein, the encrypted content number
The length information of timestamp after the authorize coding and interception that identified according to the access that request may include encryption, encrypt.When content number
It is interior when being supplied to the authorize coding of content service access side according to the requests verification information in request for the content service provider
Hold service access side and cryptographic operation is executed to the authorize coding in content data request using the timestamp after interception, is encrypted
Content data request afterwards.In some optional embodiments, the encrypted content data request may include connecing for unencryption
The length information of timestamp after inlet identity, the authorize coding of encryption and interception.Alternatively, the encrypted content-data
Request may include the length information of the timestamp after the authorize coding and interception of encryption.Why encrypted content data request
Length information including the timestamp after interception is because content service provider needs the length using the timestamp after interception
Information executes intercept operation to current time stamp, obtains and the identical key in content service access side.It is understood that with
Upper description is exemplary only, and the embodiment of the present application does not do any restriction to this.
In step s 102, the encrypted content data request is sent to content service provider, so that in described
Hold service provider and decryption oprerations are executed to the encrypted content data request, and is returned in request according to decrypted result
Hold data.
In the embodiment of the present application, the content-data may include text data, audio data, video data and image data
One of or it is a variety of.It is understood that above description is exemplary only, the embodiment of the present application does not do any limit to this
It is fixed.
In a particular embodiment, content service access direction content service provider sends encrypted content-data
Request, content service provider execute decryption oprerations to the requests verification information encrypted in encrypted content data request, obtain
The requests verification information in content data request is obtained, and is connect based on the requests verification information in content data request to content service
The side of entering returns to the content-data of request.
The technical solution obtained by content-data provided by the embodiments of the present application, using current time stamp, to content number
Cryptographic operation is executed according to the requests verification information in request, obtains encrypted content data request, and provide to content service
Side sends encrypted content data request, and content service provider executes decryption oprerations to encrypted content data request,
And content-data is asked using timestamp compared with existing other way according to the content-data that decrypted result returns to request
Requests verification information in asking executes cryptographic operation, and the requests verification information that can be effectively prevent in content data request is let out
Dew, and then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively content be avoided to take
Pressure caused by performance when the content-data of business provider is crawled to content service provider.
The acquisition methods of the content-data of the present embodiment can be taken by any suitable content with data-handling capacity
Be engaged in access side execution, including but not limited to: camera, terminal, mobile terminal, PC machine, server, mobile unit, amusement equipment,
Advertising equipment, personal digital assistant (PDA), tablet computer, laptop, handheld device, smart glasses, smart watches,
Wearable device, virtual display device or display enhancing equipment (such as Google Glass, Oculus Rift, Hololens,
Gear VR) etc..
Embodiment two
Referring to Fig. 2, a kind of step flow chart of the acquisition methods of content-data of the embodiment of the present application two is shown.
The acquisition methods of the content-data of the present embodiment the following steps are included:
In step s 201, the content data request that reception content service access side is sent.
In the embodiment of the present application, the content data request that content service provider reception content service access side is sent.
Requests verification information in the content data request is by encryption.It is understood that above description is merely illustrative
, the embodiment of the present application does not do any restriction to this.
In step S202, using current time stamp, the requests verification information encrypted in the content data request is held
Row decryption oprerations obtain the requests verification information in the content data request.
In some optional embodiments, the prolonging from content service access side to content service provider when content data request
It is described to utilize current time stamp when time span caused by late is no more than one second, it is asked to what is encrypted in the content data request
Verification information is asked to execute decryption oprerations, comprising: the length of the timestamp after the interception for including based on the content data request is believed
Breath carries out intercept operation to the current time stamp, the timestamp after obtaining the interception;Utilize the time after the interception
Stamp executes decryption oprerations to the requests verification information encrypted in the content data request, obtains in the content data request
The first requests verification information.Take this, can decrypt to obtain the requests verification information in content data request.It is understood that
It is, using current time stamp, any reality of decryption oprerations to be executed to the requests verification information encrypted in the content data request
The mode of applying may be applicable to this, and the embodiment of the present application does not do any restriction to this.
In some optional embodiments, the prolonging from content service access side to content service provider when content data request
It is described to utilize current time stamp, the request to encrypting in the content data request when time span caused by late is more than one second
Verification information executes decryption oprerations, comprising: the length information of the timestamp after the interception for including based on the content data request,
Intercept operation is carried out to the current time stamp, the timestamp after obtaining the interception;Timestamp after the interception is executed
Subtraction, the timestamp after being subtracted;Request using the timestamp after described subtract, to being encrypted in the content data request
Verification information executes decryption oprerations, obtains the second requests verification information in the content data request.Take this, can not only keep away
Exempt from content data request from content service access side to time span caused by the delay of content service provider to decryption oprerations
Influence, but also can decrypt to obtain the requests verification information in content data request.It is understood that using it is current when
Between stab, any embodiment for executing decryption oprerations to the requests verification information that encrypts in the content data request is applicable
In this, the embodiment of the present application does not do any restriction to this.
In a specific example, the current time stamp of content service access side is " 1504323599 ", and guarantees to add
The effective time of content data request after close is 100 seconds, then content service access side uses the first eight bits of current time stamp
" 15043235 " encrypt the requests verification information in content data request.It is taken when encrypted content data request reaches
When business provider, when encrypted content data request is from content service access side to caused by the delay of content service provider
Between span be more than one second, then the current time stamp that content service provider receives encrypted content data request is
"1504323600".If interception current time stamp first eight bits, interception after timestamp be " 15043236 ", this with it is interior
Timestamp " 15043235 " after holding the interception of service access side is not identical.That is, the key of content service provider with
The key of content service access side is not identical, and content service provider cannot decrypt to obtain correct requests verification information.Therefore,
It needs the timestamp " 15043236 " after the interception of content service provider subtracting 1, the timestamp after being subtracted
"15043235".In this way, the key of content service provider is identical as the key of content service access side, content service provider
It can decrypt to obtain correct requests verification information, be taken to solve content data request from content service access side to content
Time span problem caused by the delay of business provider.Wherein, subtracted timestamp in utilization, to what is encrypted in content data request
When requests verification information executes decryption oprerations, content-data can be asked using timestamp is subtracted by the inverse operation of Encryption Algorithm
The requests verification information of middle encryption is asked to execute decryption oprerations.For example, DES, IDEA, RC2, RC4, SKIPJACK, RC5, aes algorithm
Inverse operation.It is understood that above description is exemplary only, the embodiment of the present application does not do any restriction to this.
In a specific example, since prior and uncertain content data request is from content service access side to content
Time span caused by the delay of service provider, using above two embodiment respectively to being encrypted in content data request
Requests verification information execute decryption oprerations, obtain two kinds of requests verification information.Certainly, one of requests verification information is just
True requests verification information, another requests verification information are the requests verification information of mistake.Then, both requests are utilized
Verification information respectively verifies the validity of content data request, if two kinds of verification results be content data request without
Effect, then illustrate that the content data request is invalid.If wherein having a kind of verification result is that content data request is effective, say
The bright content data request is effective.It is understood that above description is exemplary only, the embodiment of the present application to this not
Do any restriction.
In step S203, based on the requests verification information in the content data request, accessed to the content service
Side sends the content-data of request.
In some optional embodiments, based on the requests verification information in the content data request, to the content
When servicing the content-data of access side's transmission request, it is based on the first requests verification information, the content data request is held
The first verification operation of row;Do not pass through if the content data request is verified, is based on the second requests verification information, it is right
The content data request executes the second verification operation;Pass through if the content data request is verified, to the content
Service the content-data that access side sends request.It is understood that based on the requests verification letter in the content data request
Breath, any embodiment for sending the content-data of request to the content service access side may be applicable to this, and the application is real
It applies example and does not do any restriction to this.
In a specific example, it is being based on the first requests verification information, the content data request is being executed
When the first verification operation, pass through if the content data request is verified, illustrates that the first requests verification information is positive
True requests verification information, the content data request is effectively request, and sends request to the content service access side
Content-data.Do not pass through if the content data request is verified, illustrates that the first requests verification information is wrong
Requests verification information or the content data request are invalidation request.It is being based on the second requests verification information, to described
When content data request executes the second verification operation, passes through if the content data request is verified, illustrate described second
Requests verification information is correct requests verification information, and the content data request is effectively request, and to the content service
Access side sends the content-data of request.Do not pass through if the content data request is verified, illustrates the content-data
Request is invalidation request.It is understood that above description is exemplary only, the embodiment of the present application does not do any limit to this
It is fixed.
The technical solution obtained by content-data provided by the embodiments of the present application, reception content service access side are sent
Content data request, and current time stamp is utilized, decryption oprerations are executed to the requests verification information encrypted in content data request,
Obtain the requests verification information in content data request;Again based on the requests verification information in content data request, taken to content
Business access side sends the content-data of request, compared with existing other way, is added using timestamp in content data request
Close requests verification information executes decryption oprerations, and the requests verification information that can be effectively prevent in content data request is leaked,
And then the content-data that can be effectively prevented content service provider is crawled.Additionally it is possible to effectively avoid content service
To pressure caused by the performance of content service provider when the content-data of provider is crawled.
The acquisition methods of the content-data of the present embodiment can be taken by any suitable content with data-handling capacity
Be engaged in provider execute, including but not limited to: camera, terminal, mobile terminal, PC machine, server, mobile unit, amusement equipment,
Advertising equipment, personal digital assistant (PDA), tablet computer, laptop, handheld device, smart glasses, smart watches,
Wearable device, virtual display device or display enhancing equipment (such as Google Glass, Oculus Rift, Hololens,
Gear VR) etc..
Embodiment three
Referring to Fig. 3, a kind of step flow chart of the acquisition methods of content-data of the embodiment of the present application three is shown.
The acquisition methods of the content-data of the present embodiment the following steps are included:
In step S301, reception content services the content data request that access side is sent.
Since step S301 is similar with above-mentioned steps S201, details are not described herein.
In step s 302, using current time stamp, the requests verification information encrypted in the content data request is held
Row decryption oprerations obtain the requests verification information in the content data request.
Since step S302 is similar with above-mentioned steps S202, details are not described herein.
In step S303, when the requests verification information is that content service provider is supplied to the content service access
When the access mark of side, if it is determined that the access is identified as the access mark being locally stored, it is determined that the content-data is asked
It asks to be verified and pass through, and send the content-data of request to the content service access side.
In a specific example, when the requests verification information is that content service provider is supplied to the content clothes
The access mark of business access side, and the content data request does not include that content service provider is supplied to the content service
When the authorize coding of access side, if it is determined that the access is identified as the access mark being locally stored, it is determined that the content number
It is verified and passes through according to request, and send the content-data of request to the content service access side.If it is determined that the access mark
Know the access mark not to be locally stored, it is determined that the content data request, which is verified, not to be passed through.More than it is understood that
Describe exemplary only, the embodiment of the present application does not do any restriction to this.
In some optional embodiments, when the requests verification information is that content service provider is supplied to the content clothes
The be engaged in access of access side identifies, and the content data request includes that content service provider is supplied to the content service and connects
When the authorize coding for the side of entering, if it is determined that it is described access mark and the authorize coding be respectively be locally stored access mark and
Authorize coding, then based on the access mark and the corresponding relationship of authorize coding being locally stored, determine the access identify with it is described
Whether authorize coding matches;If it is determined that the access mark is matched with the authorize coding, it is determined that the content-data is asked
It asks to be verified and pass through, and send the content-data of request to the content service access side.If it is determined that the access mark is not
It is not the authorize coding being locally stored for the access mark being locally stored or the authorize coding, it is determined that the content number
It is verified according to request and does not pass through.If it is determined that the access mark is unpaired with the authorize coding, it is determined that the content number
It is verified according to request and does not pass through.Take this, can be improved the verification the verifying results of content data request.It is understood that above description
Exemplary only, the embodiment of the present application does not do any restriction to this.
In some optional embodiments, when the requests verification information is that content service provider is supplied to the content clothes
When the access mark and authorize coding of business access side, if it is determined that the access mark and the authorize coding are respectively locally deposited
The access mark and authorize coding of storage, then based on the access mark and the corresponding relationship of authorize coding being locally stored, determine described in
Whether access mark matches with the authorize coding;If it is determined that the access mark is matched with the authorize coding, it is determined that
The content data request, which is verified, to be passed through, and the content-data of request is sent to the content service access side.If it is determined that
The access mark is not the authorize coding being locally stored for the access mark being locally stored or the authorize coding, then
It determines that the content data request is verified not passing through.If it is determined that the access mark is unpaired with the authorize coding, then
It determines that the content data request is verified not passing through.Take this, can be improved the verification the verifying results of content data request.It is understood that
, above description is exemplary only, and the embodiment of the present application does not do any restriction to this.
In some optional embodiments, when the requests verification information is that content service provider is supplied to the content clothes
It is engaged in the authorize coding of access side, and the content data request includes that content service provider is supplied to the content service and connects
The side of entering access mark when, if it is determined that it is described access mark and the authorize coding be respectively be locally stored access mark and
Authorize coding, then based on the access mark and the corresponding relationship of authorize coding being locally stored, determine the access identify with it is described
Whether authorize coding matches;If it is determined that the access mark is matched with the authorize coding, it is determined that the content-data is asked
It asks to be verified and pass through, and send the content-data of request to the content service access side.If it is determined that the access mark is not
It is not the authorize coding being locally stored for the access mark being locally stored or the authorize coding, it is determined that the content number
It is verified according to request and does not pass through.If it is determined that the access mark is unpaired with the authorize coding, it is determined that the content number
It is verified according to request and does not pass through.Take this, can be improved the verification the verifying results of content data request.It is understood that above description
Exemplary only, the embodiment of the present application does not do any restriction to this.
The acquisition methods of the content-data of the present embodiment can be taken by any suitable content with data-handling capacity
Be engaged in provider execute, including but not limited to: camera, terminal, mobile terminal, PC machine, server, mobile unit, amusement equipment,
Advertising equipment, personal digital assistant (PDA), tablet computer, laptop, handheld device, smart glasses, smart watches,
Wearable device, virtual display device or display enhancing equipment (such as Google Glass, Oculus Rift, Hololens,
Gear VR) etc..
Example IV
Referring to Fig. 4, a kind of structural block diagram of the acquisition device of content-data according to the embodiment of the present application four is shown.
The acquisition device of the content-data of the present embodiment includes: the first encrypting module 401, for utilizing current time stamp,
Cryptographic operation is executed to the requests verification information in content data request, obtains encrypted content data request;First sends
Module 402, for sending the encrypted content data request to content service provider, so that the content service provides
Side executes decryption oprerations to the encrypted content data request, and the content-data of request is returned according to decrypted result.
Optionally, first encrypting module 401, comprising: interception module 4011, for being executed to the current time stamp
Intercept operation, the timestamp after being intercepted;Second encrypting module 4012, for the timestamp after the utilization interception, to institute
The requests verification information stated in content data request executes cryptographic operation, obtains the encrypted content data request.
Optionally, the encrypted content data request includes the length information of the timestamp after the interception.
Optionally, the requests verification information includes that the content service provider is supplied to connecing for content service access side
Inlet identity and/or authorize coding.
The acquisition device of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method
According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Another embodiment of the application also provides a kind of storage medium, is stored thereon with computer executable instructions, the meter
Calculation machine executable instruction executes following steps when being processed by the processor: current time stamp is utilized, in content data request
Requests verification information executes cryptographic operation, obtains encrypted content data request;Described add is sent to content service provider
Content data request after close, so that the content service provider executes decryption behaviour to the encrypted content data request
Make, and returns to the content-data of request according to decrypted result.
Another embodiment of the application also provides a kind of electronic equipment, comprising: one or more processors;Memory is used for
Store one or more programs;When one or more of programs are executed by one or more of processors, so that described one
A or multiple processors realize the acquisition methods of content-data as described above.
Embodiment five
Referring to Fig. 5, a kind of structural block diagram of the acquisition device of content-data according to the embodiment of the present application five is shown.
The acquisition device of the content-data of the present embodiment includes: receiving module 501, for reception content service access side hair
The content data request sent;First deciphering module 502, for utilizing current time stamp, to being encrypted in the content data request
Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request;Second sending module
503, for being sent in request to the content service access side based on the requests verification information in the content data request
Hold data.
The acquisition device of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method
According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Embodiment six
Referring to Fig. 6, a kind of structural block diagram of the acquisition device of content-data according to the embodiment of the present application six is shown.
The acquisition device of the content-data of the present embodiment includes: receiving module 601, for reception content service access side hair
The content data request sent;First deciphering module 602, for utilizing current time stamp, to being encrypted in the content data request
Requests verification information execute decryption oprerations, obtain the requests verification information in the content data request;Second sending module
603, for being sent in request to the content service access side based on the requests verification information in the content data request
Hold data.
Optionally, first deciphering module 602, is specifically used for: after the interception for including based on the content data request
Timestamp length information, intercept operation, timestamp after obtaining the interception are carried out to the current time stamp;Using institute
Timestamp after stating interception executes decryption oprerations to the requests verification information that encrypts in the content data request, described in acquisition
The first requests verification information in content data request.
Optionally, described device further include: subtraction block 6021, for executing subtraction fortune to the timestamp after the interception
It calculates, the timestamp after being subtracted;Second deciphering module 6022, for the timestamp after subtracting described in utilizing, to the content-data
The requests verification information encrypted in request executes decryption oprerations, obtains the second requests verification letter in the content data request
Breath.
Optionally, second sending module 603, is specifically used for: the first requests verification information is based on, to described interior
Hold request of data and executes the first verification operation;Do not pass through if the content data request is verified, is asked based on described second
Verification information is sought, the second verification operation is executed to the content data request;Pass through if the content data request is verified,
The content-data of request is then sent to the content service access side.
Optionally, when the requests verification information is that content service provider is supplied to connecing for the content service access side
When inlet identity, second sending module 603 is specifically used for: if it is determined that the access is identified as the access mark being locally stored
Know, it is determined that the content data request, which is verified, to be passed through, and the content-data of request is sent to the content service access side.
Optionally, when the requests verification information is that content service provider is supplied to connecing for the content service access side
When inlet identity and authorize coding, second sending module 603 is specifically used for: if it is determined that access mark is awarded with described
Power coding is respectively the access mark and authorize coding being locally stored, then based on the access mark and authorize coding being locally stored
Corresponding relationship, determines whether the access mark matches with the authorize coding;If it is determined that the access mark is awarded with described
Power coding pairing, it is determined that the content data request, which is verified, to be passed through, and sends request to the content service access side
Content-data.
The acquisition device of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method
According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Another embodiment of the application also provides a kind of storage medium, is stored thereon with computer executable instructions, the meter
Calculation machine executable instruction executes following steps when being processed by the processor: the content-data that reception content service access side is sent is asked
It asks;Using current time stamp, decryption oprerations are executed to the requests verification information encrypted in the content data request, described in acquisition
Requests verification information in content data request;Based on the requests verification information in the content data request, to the content
Service the content-data that access side sends request.
Another embodiment of the application also provides a kind of electronic equipment, comprising: one or more processors;Memory is used for
Store one or more programs;When one or more of programs are executed by one or more of processors, so that described one
A or multiple processors realize the acquisition methods of content-data as described above.
Embodiment seven
Referring to Fig. 7, a kind of structural schematic diagram of the acquisition system of content-data according to the embodiment of the present application seven is shown.
The acquisition system of the content-data of the present embodiment includes: content service access side 702 and connects with the content service
The content service provider 701 that the side of entering 702 connects;The content service access side 702 utilizes current time stamp, to content-data
Requests verification information in request executes cryptographic operation, obtains encrypted content data request, and mention to the content service
Supplier 701 sends the encrypted content data request;701 reception content of content service provider services access side
702 content data requests sent, and current time stamp is utilized, to the requests verification information encrypted in the content data request
Decryption oprerations are executed, obtain the requests verification information in the content data request, then based in the content data request
Requests verification information sends the content-data of request to the content service access side 702.
In the present embodiment, content service provider 701 can be referred to as content-data center again, be specifically as follows a PC
Machine, and content service access side 702 can be smart phone, function machine, network printer etc..
The acquisition system of the content-data of the present embodiment is for realizing content number corresponding in aforesaid plurality of embodiment of the method
According to acquisition methods, and with corresponding embodiment of the method beneficial effect, details are not described herein.
Embodiment eight
Fig. 8 is the structural schematic diagram according to a kind of electronic equipment of the embodiment of the present application eight.As shown in figure 8, the equipment packet
It includes: one or more processors 81 and memory 82, in Fig. 8 by taking a processor 81 as an example.The equipment for executing the above method
It can also include: input unit 83 and output device 84.Processor 81, memory 82, input unit 83 and output device 84 can
To be connected by bus or other modes, in Fig. 8 for being connected by bus.
Memory 82 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey
Sequence, non-volatile computer executable program and module, as the corresponding program instruction of the above method in the embodiment of the present application/
Module.Non-volatile software program, instruction and the module that processor 81 is stored in memory 82 by operation, thereby executing
The various function application and data processing of server, the i.e. above method in realization above method embodiment.
Memory 82 may include storing program area and storage data area, wherein storing program area can storage program area,
Application program required at least one function;Storage data area can store the content-data etc. of acquisition.In addition, memory 82 can
It can also include nonvolatile memory 82, for example, at least a magnetic disk storage to include high-speed random access memory 82
Part, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 82 it is optional include relative to
The remotely located memory 82 of processor 81, these remote memories 82 can pass through network connection to client.Above-mentioned network
Example include but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Input unit 83 can receive the number or character information of input, and generate the user setting and function with client
It can control related key signals input.Input unit 83 may include by equipment such as pressing mold groups.
One or more of modules are stored in the memory 82, when by one or more of processors 81
When execution, the above method in above-mentioned any means embodiment is executed.
Method provided by the embodiment of the present application can be performed in the said goods, has the corresponding functional module of execution method and has
Beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to method provided by the embodiment of the present application.
The electronic equipment of the embodiment of the present application exists in a variety of forms, including but not limited to:
(1) mobile communication equipment: the characteristics of this kind of equipment is that have mobile communication function, and to provide speech, data
Communication is main target.This Terminal Type includes: smart phone (such as iPhone), multimedia handset, functional mobile phone and low
Hold mobile phone etc..
(2) super mobile personal computer equipment: this kind of equipment belongs to the scope of personal computer, there is calculating and processing function
Can, generally also have mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind of equipment can show and play multimedia content.Such equipment include: audio,
Video player (such as iPod), handheld device, e-book and intelligent toy and portable car-mounted navigation equipment.
(4) server: the equipment of the service of calculating is provided, the composition of server includes processor 71, hard disk, memory, system
Bus etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, in processing energy
Power, stability, reliability, safety, scalability, manageability etc. are more demanding.
(5) other electronic devices with data interaction function.
The apparatus embodiments described above are merely exemplary, wherein described, module can as illustrated by the separation member
It is physically separated with being or may not be, the component shown as module may or may not be physics mould
Block, it can it is in one place, or may be distributed on multiple network modules.It can be selected according to the actual needs
In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness
Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, the computer readable recording medium include for
Any mechanism of the readable form storage of computer (such as computer) or transmission information.For example, machine readable media includes only
Read memory (ROM), random access memory (RAM), magnetic disk storage medium, optical storage media, flash medium, electricity, light,
Sound or the transmitting signal (for example, carrier wave, infrared signal, digital signal etc.) of other forms etc., which includes
Some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes respectively
Method described in certain parts of a embodiment or embodiment.
It will be understood by those skilled in the art that the embodiments of the present application may be provided as method, apparatus (equipment) or
Computer program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine soft
The form of the embodiment of part and hardware aspect.Moreover, it wherein includes to calculate that the embodiment of the present application, which can be used in one or more,
Computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, the optical memory of machine usable program code
Deng) on the form of computer program product implemented.
The embodiment of the present application is referring to the method, apparatus (equipment) and computer program product according to the embodiment of the present application
Flowchart and/or the block diagram describes.It should be understood that can be realized by computer program instructions every in flowchart and/or the block diagram
The combination of process and/or box in one process and/or box and flowchart and/or the block diagram.It can provide these computers
Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices
To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute
In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram
It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the embodiment of the present application, rather than it is limited
System;Although the application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: its
It is still possible to modify the technical solutions described in the foregoing embodiments, or part of technical characteristic is equal
Replacement;And these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution
Spirit and scope.