CN114710557A - Data transmission method and device and data release equipment - Google Patents

Data transmission method and device and data release equipment Download PDF

Info

Publication number
CN114710557A
CN114710557A CN202210381939.1A CN202210381939A CN114710557A CN 114710557 A CN114710557 A CN 114710557A CN 202210381939 A CN202210381939 A CN 202210381939A CN 114710557 A CN114710557 A CN 114710557A
Authority
CN
China
Prior art keywords
data
rule
proxy
equipment
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202210381939.1A
Other languages
Chinese (zh)
Inventor
谭启超
张健文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rootcloud Technology Co Ltd
Original Assignee
Rootcloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rootcloud Technology Co Ltd filed Critical Rootcloud Technology Co Ltd
Priority to CN202210381939.1A priority Critical patent/CN114710557A/en
Publication of CN114710557A publication Critical patent/CN114710557A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application provides a data transmission method, a data transmission device and data release equipment. The data transmission method is applied to data publishing equipment, the data publishing equipment is connected with proxy subscribing equipment, and the proxy subscribing equipment is connected with user receiving equipment, and the method comprises the following steps: determining a data acquisition mode of each agent subscription device; if the data acquisition mode of the proxy subscription equipment is active acquisition and a data acquisition instruction sent by the proxy subscription equipment is received, performing authorization verification based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction; if the authorization verification is passed or the data acquisition mode of the proxy subscription device is passive push, incremental data corresponding to the source data theme are sent to the proxy subscription device, so that the proxy subscription device converts the incremental data into service data and sends the service data to the user receiving device. By means of the authorization verification mechanism, incremental data corresponding to the source data theme can be safely sent to the proxy subscription device establishing the subscription relationship.

Description

Data transmission method and device and data release equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data transmission method and apparatus, and a data distribution device.
Background
When a user needs to obtain some latest data for presentation or business processing, message queue middleware is usually used to subscribe a corresponding data topic from a data source. According to the method, a user needs to deeply know the data to be acquired so as to find the address of the data source, select a proper data theme from the data source and acquire the required latest data.
The method comprises the steps of adding a proxy subscription device between a data source and a user side, obtaining source data from the data source through the proxy subscription device, and converting the source data into service data which can be directly received by the user side, so that service coupling between the data source and the user side can be removed.
Although the existing proxy subscription method supports data acquisition through subscription proxy equipment, in this link, there is no authorization verification mechanism, and it cannot be guaranteed that the latest data generated by a data source can be safely sent to the proxy subscription equipment establishing a subscription relationship.
Disclosure of Invention
In order to solve the technical problem, the invention provides a data transmission method, a device and data release equipment, and the specific scheme is as follows:
in a first aspect, an embodiment of the present application provides a data transmission method, which is applied to a data publishing device, where the data publishing device is connected to a proxy subscribing device, and the proxy subscribing device is connected to a user receiving device, where the data transmission method includes:
determining a data acquisition mode of each agent subscription device, wherein the data acquisition mode comprises any one of active acquisition and passive push;
if the data acquisition mode of the proxy subscription equipment is active acquisition and a data acquisition instruction sent by the proxy subscription equipment is received, performing authorization verification based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction, wherein the proxy subscription equipment sends the data acquisition instruction to the data publishing equipment when monitoring that a source data topic in a topic address broadcasted by the data publishing equipment is updated;
if the authorization verification is passed or the data acquisition mode of the proxy subscription equipment is passive pushing, incremental data corresponding to a source data theme are sent to the proxy subscription equipment, so that the proxy subscription equipment converts the incremental data into service data and sends the service data to the user receiving equipment.
According to a specific embodiment disclosed in the present application, the authorization verification mechanism includes different first-type preset rules, each of the different first-type preset rules includes different second-type decision data, where the different first-type preset rules include an allowance rule and a rejection rule, and the different second-type decision data includes a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device;
the generation step of the authorization verification mechanism comprises the following steps:
receiving the judgment data sent by the proxy subscription equipment;
combining different judgment data into preset rules according to a selection instruction input by a user, wherein the corresponding second types in the preset rules with the same judgment data quantity are different in composition;
and arranging all the preset rules into the authorization verification mechanism according to a sequencing instruction input by a user.
According to a specific embodiment disclosed in the present application, each data acquisition instruction includes a request time, a real-time IP address corresponding to the proxy subscription device, and a real-time control ID corresponding to a target application running on the proxy subscription device;
the step of performing authorization verification based on the authorization verification mechanism associated with the proxy subscription device and the data acquisition instruction includes:
selecting a preset rule corresponding to the first order as a target rule according to the arrangement sequence of each preset rule in the authorization verification mechanism;
repeatedly executing the step of judging whether the data acquisition instruction is matched with the target rule or not until all the preset rules are matched;
if the data acquisition instruction is matched with the target rule, judging whether the target rule is an allowable rule or not;
if the target rule is an allowable rule, judging that the authorization verification is passed;
and if the target rule is a rejection rule, judging that the authorization verification fails.
According to a specific embodiment disclosed in the present application, after the step of determining whether the data acquisition instruction matches the target rule, the data transmission method further includes:
and if the data acquisition instruction is not matched with the target rule, updating the preset rule corresponding to the next sequence into the target rule.
In a second aspect, an embodiment of the present application provides a data transmission apparatus, which is applied to a data publishing device, where the data publishing device is connected to a proxy subscribing device, and the proxy subscribing device is connected to a user receiving device, where the data transmission apparatus includes:
the determining module is used for determining a data acquisition mode of each agent subscription device, wherein the data acquisition mode comprises any one of active acquisition and passive push;
the verification module is used for performing authorization verification based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction if the data acquisition mode of the proxy subscription equipment is active acquisition and the data acquisition instruction sent by the proxy subscription equipment is received, wherein the proxy subscription equipment sends the data acquisition instruction to the data publishing equipment when monitoring the source data theme update in the theme address broadcast by the data publishing equipment;
and the sending module is used for sending the incremental data corresponding to the source data theme to the proxy subscription equipment if the authorization verification is passed or the data acquisition mode of the proxy subscription equipment is passive pushing, so that the proxy subscription equipment converts the incremental data into service data and sends the service data to the user receiving equipment.
According to a specific embodiment disclosed in the present application, the authorization verification mechanism includes different first-type preset rules, each of the different first-type preset rules includes different second-type decision data, where the different first-type preset rules include an allowance rule and a rejection rule, and the different second-type decision data includes a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device;
the verification module is specifically configured to:
receiving the judgment data sent by the proxy subscription equipment;
combining different judgment data into preset rules according to a selection instruction input by a user, wherein the corresponding second types in the preset rules with the same judgment data quantity are different in composition;
and arranging all the preset rules into the authorization verification mechanism according to a sequencing instruction input by a user.
According to a specific embodiment disclosed in the present application, each data acquisition instruction includes a request time, a real-time IP address corresponding to the proxy subscription device, and a real-time control ID corresponding to a target application running on the proxy subscription device;
the verification module is specifically configured to:
selecting a preset rule corresponding to the first order as a target rule according to the arrangement sequence of each preset rule in the authorization verification mechanism;
repeatedly executing the step of judging whether the data acquisition instruction is matched with the target rule or not until all the preset rules are matched;
if the data acquisition instruction is matched with the target rule, judging whether the target rule is an allowable rule or not;
if the target rule is an allowable rule, judging that the authorization verification is passed;
and if the target rule is a rejection rule, judging that the authorization verification fails.
According to a specific embodiment disclosed in the present application, the data transmission apparatus further includes:
and the updating module is used for updating the preset rule corresponding to the next sequence into the target rule if the data acquisition instruction is not matched with the target rule.
In a third aspect, an embodiment of the present application provides a data distribution apparatus, where the data distribution apparatus includes a processor and a memory, where the memory stores a computer program, and the computer program, when executed on the processor, implements the data transmission method in any embodiment of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, where a computer program is stored, and the computer program, when executed on a processor, implements the data transmission method described in any one of the embodiments of the first aspect.
Compared with the prior art, the method has the following beneficial effects:
the application provides a data transmission method, a data transmission device and data release equipment. The data transmission method is applied to data publishing equipment, the data publishing equipment is connected with proxy subscribing equipment, and the proxy subscribing equipment is connected with user receiving equipment, and the method comprises the following steps: determining a data acquisition mode of each agent subscription device; if the data acquisition mode of the proxy subscription equipment is active acquisition and a data acquisition instruction sent by the proxy subscription equipment is received, performing authorization verification based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction; if the authorization verification is passed or the data acquisition mode of the proxy subscription device is passive push, incremental data corresponding to the source data theme are sent to the proxy subscription device, so that the proxy subscription device converts the incremental data into service data and sends the service data to the user receiving device. By means of the authorization verification mechanism, incremental data corresponding to the source data theme can be safely sent to the agent subscription equipment for establishing the subscription relationship.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention. Like components are numbered similarly in the various figures.
Fig. 1 is a schematic flowchart of a data transmission method according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating an authorization verification mechanism involved in a data transmission method according to an embodiment of the present application;
fig. 3 is a block diagram of a data transmission apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Hereinafter, the terms "including", "having", and their derivatives, which may be used in various embodiments of the present invention, are intended to indicate only specific features, numerals, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the presence of or adding to one or more other features, numerals, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another, and are not to be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flowchart of a data transmission method according to an embodiment of the present application. The data transmission method is applied to data publishing equipment, the data publishing equipment is connected with proxy subscribing equipment, the proxy subscribing equipment is connected with user receiving equipment, and the data transmission method comprises the following steps:
step S101, determining a data acquisition mode of each agent subscription device, wherein the data acquisition mode comprises any one of active acquisition and passive push.
The data publishing device broadcasts the subject address of the publishing source data subject so that the proxy subscribing device listens whether the subject address generates new source data. And if the topic address generates new source data, the corresponding source data topic is indicated to be updated, and after the data acquisition mode corresponding to each agent subscription device is determined, the new source data is sent to each agent subscription device according to the corresponding data acquisition mode.
In specific implementation, different proxy subscription devices may be associated with different data acquisition manners according to user input, and a specific association relationship example is shown in table 1:
TABLE 1
Figure BDA0003592174880000081
Figure BDA0003592174880000091
Table 1 is a correspondence table between the device number and the data acquisition code. In particular, different proxy subscribing devices, such as #0001 and #0002, can be represented by device numbers. Different data acquisition modes can also be represented by different data acquisition codes, wherein 0 can be defined as passive push and 1 can be defined as active acquisition. The specific form of the data acquisition code and the corresponding relationship between different data acquisition codes and data acquisition modes can be customized according to the use requirement of the user and the specific application scene, and are not further limited here.
Step S102, if the data acquisition mode of the agent subscription device is active acquisition and a data acquisition instruction sent by the agent subscription device is received, performing authorization verification based on an authorization verification mechanism associated with the agent subscription device and the data acquisition instruction, wherein the agent subscription device sends the data acquisition instruction to the data publishing device when monitoring that a source data topic in a topic address broadcasted by the data publishing device is updated.
For any agent subscription device, if the data acquisition mode of the agent subscription device is active acquisition and the agent subscription device monitors that the topic address broadcasted by the data publishing device generates new source data, the agent subscription device sends a data acquisition instruction to the data publishing device. If the data publishing device receives the data acquisition instruction sent by the proxy subscribing device, the data publishing device can perform authorization verification based on an authorization verification mechanism associated with the proxy subscribing device and the data acquisition instruction, so that new source data is sent to the proxy subscribing device passing the authorization verification, and the security of data transmission is ensured.
Specifically, the authorization verification mechanism includes different first-type preset rules, each of the different first-type preset rules includes different second-type determination data, where the different first-type preset rules include an allowance rule and a rejection rule, and the different second-type determination data includes a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device;
the generation step of the authorization verification mechanism comprises the following steps:
receiving the judgment data sent by the proxy subscription equipment;
combining different judgment data into preset rules according to a selection instruction input by a user, wherein the corresponding second types in the preset rules with the same judgment data quantity are different in composition;
and arranging all the preset rules into the authorization verification mechanism according to a sequencing instruction input by a user.
Different authorization verification mechanisms may be associated with each proxy subscribing device based on user input. Referring to fig. 2, fig. 2 is a schematic diagram illustrating an authorization verification mechanism involved in a data transmission method according to an embodiment of the present application. Any authorization verification mechanism includes at least two preset rules and the first type of the two preset rules is different. Wherein the different first type of preset rules comprise an allow rule and a deny rule. For example, the line structure S1 with rule number a and the line structure S2 with rule number B are both used to represent a preset rule. The type number 1 or 0 corresponding to the preset rule in each line structure is used to indicate the type of the preset rule, for example, 1 may be used to indicate an allowance rule, and 0 may be used to indicate a denial rule; 0 may be used to indicate an allow rule and 1 may be used to indicate a deny rule.
In addition, a character string with a specific structure may be used to simultaneously indicate the rule number and the type of the preset rule corresponding to the rule number, for example, a0 and B1 are respectively used to indicate two different types of preset rules. The specific corresponding relationship can be customized according to the actual use requirement of the user and the specific application scene, and is not further limited here.
The different first type of preset rules comprise different second type of judgment data, and the different second type of judgment data comprise but are limited to a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device. Different second types and different amounts of decision data are combined through user input, and preset rules of different first types can be obtained. For example:
1. if the user's settings are: any proxy subscription device which communicates with the data publishing device through the preset IP address of 10.255.255.255 can receive newly generated source data in the source data topic. Then the permission rule corresponding to the user setting may be set to "A10.255.255.2551";
2. if the user's settings are: if the proxy subscribing device communicates with the data publishing device through the preset IP address "10.255.255.255" and the preset control ID corresponding to the target application running on the proxy subscribing device is 8888, the proxy subscribing device may receive newly generated source data in the source data topic. Then the permission rule corresponding to the user setting may be set to "B10.255.255.25588881".
In specific implementation, the second type of determination data may also be an account, a password, or the like, and the second type of determination data may be customized according to an actual use requirement of a user or a specific application scenario, which is not further limited herein.
In specific implementation, each data acquisition instruction comprises a request time, a real-time IP address corresponding to the proxy subscription device, and a real-time control ID corresponding to a target application running on the proxy subscription device;
the step of performing authorization verification based on the authorization verification mechanism associated with the proxy subscription device and the data acquisition instruction includes:
selecting a preset rule corresponding to the first order as a target rule according to the arrangement sequence of each preset rule in the authorization verification mechanism;
repeatedly executing the step of judging whether the data acquisition instruction is matched with the target rule or not until all the preset rules are matched;
if the data acquisition instruction is matched with the target rule, judging whether the target rule is an allowable rule or not;
if the target rule is an allowable rule, judging that the authorization verification is passed;
and if the target rule is a rejection rule, judging that the authorization verification fails.
Different first type of preset rules may be set with different priorities for execution or determination. For example, the preset rule a is an allowance rule, and the preset rule B is a denial rule. If the priority of the preset rule a is greater than that of the preset rule B, the preset rule a may be arranged before the preset rule B when the authorization verification mechanism is generated. That is, only when the data acquisition instruction sent by the proxy subscription device does not match all the determination data included in the preset rule a, the determination on the preset rule B is continued. The following is illustrated by way of an example:
the authorization verification mechanism comprises a preset rule A and a preset rule B. The preset rule a is used to indicate that: any one of the proxy subscribing devices communicates with the data publishing device through a preset IP address "10.255.255.255", and if a preset control ID corresponding to a target application running on the proxy subscribing device is 8888, the proxy subscribing device can receive newly generated source data in a source data topic; the preset rule B is used to indicate that: if the preset control ID corresponding to the target application running on the proxy subscription device is not 8888, the proxy subscription device may not receive the newly generated source data in the source data topic. In the corresponding authorization verification mechanism, the preset rule A is arranged before the preset rule B.
If the data acquisition instruction is 12: 0010.255.255.2558800, according to the arrangement sequence of the preset rules in the authorization verification mechanism, selecting the preset rule A corresponding to the first sequence as a target rule, and executing the step of judging whether the data acquisition instruction is matched with the target rule or not. At this time, the preset rule B corresponding to the next sequence is updated to be the target rule, and the step of judging whether the data acquisition instruction is matched with the target rule is executed. The data acquisition instruction matches the determination data in the preset rule B for indicating that "the preset control ID is not 8888". And judging that the verification fails because the preset rule B is a rejection rule.
Through the technical means, the arrangement sequence of the preset rules in the authorization verification mechanism corresponding to each agent subscription device can be adjusted to realize the safety verification of different levels, and the reusability and the adjustable flexibility of the authorization verification mechanism are high.
Step S103, if the authorization verification is passed or the data acquisition mode of the proxy subscription device is passive pushing, incremental data corresponding to a source data theme is sent to the proxy subscription device, so that the proxy subscription device converts the incremental data into service data and sends the service data to the user receiving device.
The incremental data is the source data generated in the subject address. And if the data acquisition mode of the proxy subscription equipment is passive pushing or the data acquisition mode of the proxy subscription equipment is active acquisition and the authorization verification is passed, sending the incremental data corresponding to the source data theme to the proxy subscription equipment. The proxy subscription device may convert the incremental data into service data that the user receiving device may directly receive or process, and then send the service data to the user receiving device.
According to the data transmission method, when the data acquisition mode of the proxy subscription device is active acquisition and a data acquisition instruction sent by the proxy subscription device is received, authorization verification is performed based on an authorization verification mechanism associated with the proxy subscription device and the data acquisition instruction. If the authorization verification is passed or the data acquisition mode of the proxy subscription equipment is passive pushing, incremental data corresponding to the source data theme are sent to the proxy subscription equipment, so that the proxy subscription equipment converts the incremental data into service data and sends the service data to the user receiving equipment. By the authorization verification mechanism, the incremental data corresponding to the source data theme can be safely sent to the proxy subscription equipment which establishes the subscription relationship. Moreover, by adjusting the arrangement sequence of each preset rule in the authorization verification mechanism corresponding to each proxy subscription device, the security verification of different levels can be realized, and the reusability and adjustable flexibility of the authorization verification mechanism are improved.
Corresponding to the above method embodiment, referring to fig. 3, the present invention further provides a data transmission apparatus 300, applied to a data publishing device, where the data publishing device is connected to a proxy subscribing device, and the proxy subscribing device is connected to a user receiving device, and the data transmission apparatus 300 includes:
a determining module 301, configured to determine a data obtaining manner of each proxy subscription device, where the data obtaining manner includes any one of active obtaining and passive pushing;
a verification module 302, configured to perform authorization verification based on an authorization verification mechanism associated with the proxy subscription device and a data acquisition instruction sent by the proxy subscription device if the data acquisition mode of the proxy subscription device is active acquisition and the data acquisition instruction is received, where the proxy subscription device sends the data acquisition instruction to the data publishing device when monitoring that a source data topic in a topic address broadcast by the data publishing device is updated;
a sending module 303, configured to send, if the authorization verification passes or the data acquisition mode of the proxy subscription device is passive push, incremental data corresponding to a source data topic to the proxy subscription device, so that the proxy subscription device converts the incremental data into service data and sends the service data to the user receiving device.
In specific implementation, the authorization verification mechanism includes different first-type preset rules, each of the different first-type preset rules includes different second-type determination data, where the different first-type preset rules include an allowance rule and a rejection rule, and the different second-type determination data includes a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device;
the verification module is specifically configured to:
receiving the judgment data sent by the proxy subscription equipment;
combining different judgment data into preset rules according to a selection instruction input by a user, wherein the corresponding second types in the preset rules with the same judgment data quantity are different in composition;
and arranging all the preset rules into the authorization verification mechanism according to a sequencing instruction input by a user.
In specific implementation, each data acquisition instruction comprises a request time, a real-time IP address corresponding to the proxy subscription device, and a real-time control ID corresponding to a target application running on the proxy subscription device;
the verification module is specifically configured to:
selecting a preset rule corresponding to the first order as a target rule according to the arrangement sequence of each preset rule in the authorization verification mechanism;
repeatedly executing the step of judging whether the data acquisition instruction is matched with the target rule or not until all the preset rules are matched;
if the data acquisition instruction is matched with the target rule, judging whether the target rule is an allowable rule or not;
if the target rule is an allowable rule, judging that the authorization verification is passed;
and if the target rule is a rejection rule, judging that the authorization verification fails.
In specific implementation, the data transmission device further includes:
and the updating module is used for updating the preset rule corresponding to the next sequence into the target rule if the data acquisition instruction is not matched with the target rule.
In addition, a data distribution device is provided, the data distribution device comprises a processor and a memory, the memory stores a computer program, and the computer program realizes the data transmission method when executed on the processor.
Furthermore, a computer-readable storage medium is provided, in which a computer program is stored, which computer program, when being executed on a processor, carries out the above-mentioned data transmission method.
For specific implementation processes of the data transmission device, the data distribution device, and the computer-readable storage medium provided in the present application, reference may be made to the specific implementation processes of the data transmission method provided in the foregoing embodiments, and details are not described here any more.
According to the data transmission device, the data publishing equipment and the computer readable storage medium, when the data acquisition mode of the proxy subscription equipment is active acquisition and a data acquisition instruction sent by the proxy subscription equipment is received, authorization verification is performed based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction. If the authorization verification is passed or the data acquisition mode of the proxy subscription equipment is passive pushing, incremental data corresponding to the source data theme are sent to the proxy subscription equipment, so that the proxy subscription equipment converts the incremental data into service data and sends the service data to the user receiving equipment. By the authorization verification mechanism, incremental data corresponding to the source data theme can be safely sent to the proxy subscription device establishing the subscription relationship. Moreover, by adjusting the arrangement sequence of each preset rule in the authorization verification mechanism corresponding to each proxy subscription device, the security verification of different levels can be realized, and the reusability and adjustable flexibility of the authorization verification mechanism are improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solution of the present invention or a part thereof which contributes to the prior art in essence can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.

Claims (10)

1. A data transmission method is applied to a data publishing device, wherein the data publishing device is connected with a proxy subscribing device, and the proxy subscribing device is connected with a user receiving device, and the data transmission method comprises the following steps:
determining a data acquisition mode of each agent subscription device, wherein the data acquisition mode comprises any one of active acquisition and passive push;
if the data acquisition mode of the proxy subscription equipment is active acquisition and a data acquisition instruction sent by the proxy subscription equipment is received, performing authorization verification based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction, wherein the proxy subscription equipment sends the data acquisition instruction to the data publishing equipment when monitoring that a source data topic in a topic address broadcasted by the data publishing equipment is updated;
if the authorization verification is passed or the data acquisition mode of the proxy subscription equipment is passive pushing, incremental data corresponding to a source data theme are sent to the proxy subscription equipment, so that the proxy subscription equipment converts the incremental data into service data and sends the service data to the user receiving equipment.
2. The data transmission method according to claim 1, wherein the authorization verification mechanism includes different first-type preset rules, each of the different first-type preset rules includes different second-type decision data, wherein the different first-type preset rules include an allowance rule and a denial rule, and the different second-type decision data includes a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device;
the generation step of the authorization verification mechanism comprises the following steps:
receiving the judgment data sent by the proxy subscription equipment;
combining different judgment data into preset rules according to a selection instruction input by a user, wherein the corresponding second types in the preset rules with the same judgment data quantity are different in composition;
and arranging all the preset rules into the authorization verification mechanism according to a sequencing instruction input by a user.
3. The data transmission method according to claim 2, wherein each data acquisition instruction includes a request time, a real-time IP address corresponding to the proxy subscription device, and a real-time control ID corresponding to a target application running on the proxy subscription device;
the step of performing authorization verification based on the authorization verification mechanism associated with the proxy subscription device and the data acquisition instruction includes:
selecting a preset rule corresponding to the first order as a target rule according to the arrangement sequence of each preset rule in the authorization verification mechanism;
repeatedly executing the step of judging whether the data acquisition instruction is matched with the target rule or not until all the preset rules are matched;
if the data acquisition instruction is matched with the target rule, judging whether the target rule is an allowable rule or not;
if the target rule is an allowable rule, judging that the authorization verification is passed;
and if the target rule is a rejection rule, judging that the authorization verification fails.
4. The data transmission method according to claim 3, wherein after the step of determining whether the data acquisition instruction matches the target rule, the data transmission method further comprises:
and if the data acquisition instruction is not matched with the target rule, updating the preset rule corresponding to the next sequence into the target rule.
5. A data transmission apparatus, applied to a data publishing device, where the data publishing device is connected to a proxy subscribing device, and the proxy subscribing device is connected to a user receiving device, the data transmission apparatus comprising:
the determining module is used for determining a data acquisition mode of each agent subscription device, wherein the data acquisition mode comprises any one of active acquisition and passive push;
the verification module is used for performing authorization verification based on an authorization verification mechanism associated with the proxy subscription equipment and the data acquisition instruction if the data acquisition mode of the proxy subscription equipment is active acquisition and the data acquisition instruction sent by the proxy subscription equipment is received, wherein the proxy subscription equipment sends the data acquisition instruction to the data publishing equipment when monitoring that the source data topic in the topic address broadcasted by the data publishing equipment is updated;
and the sending module is used for sending the incremental data corresponding to the source data theme to the proxy subscription equipment if the authorization verification is passed or the data acquisition mode of the proxy subscription equipment is passive pushing, so that the proxy subscription equipment converts the incremental data into service data and sends the service data to the user receiving equipment.
6. The data transmission apparatus according to claim 5, wherein the authorization verification mechanism includes different first type preset rules, each of the different first type preset rules includes different second type decision data, where the different first type preset rules include an allowance rule and a denial rule, and the different second type decision data includes a preset authorization time interval, a preset IP address corresponding to the proxy subscription device, and a preset control ID corresponding to a target application running on the proxy subscription device;
the verification module is specifically configured to:
receiving the judgment data sent by the proxy subscription equipment;
combining different judgment data into preset rules according to a selection instruction input by a user, wherein the corresponding second types in the preset rules with the same judgment data quantity are different in composition;
and arranging all the preset rules into the authorization verification mechanism according to a sequencing instruction input by a user.
7. The data transmission apparatus according to claim 6, wherein each of the data acquisition commands includes a request time, a real-time IP address corresponding to the proxy subscription device, and a real-time control ID corresponding to a target application running on the proxy subscription device;
the verification module is specifically configured to:
selecting a preset rule corresponding to the first order as a target rule according to the arrangement sequence of each preset rule in the authorization verification mechanism;
repeatedly executing the step of judging whether the data acquisition instruction is matched with the target rule or not until all the preset rules are matched;
if the data acquisition instruction is matched with the target rule, judging whether the target rule is an allowable rule or not;
if the target rule is an allowable rule, judging that the authorization verification is passed;
and if the target rule is a rejection rule, judging that the authorization verification fails.
8. The data transmission apparatus according to claim 7, wherein the data transmission apparatus further comprises:
and the updating module is used for updating the preset rule corresponding to the next sequence into the target rule if the data acquisition instruction is not matched with the target rule.
9. A data distribution device, characterized in that it comprises a processor and a memory, said memory storing a computer program which, when executed on said processor, implements the data transmission method of any one of claims 1 to 4.
10. A computer-readable storage medium, characterized in that it stores a computer program which, when executed on a processor, implements the data transmission method of any one of claims 1 to 4.
CN202210381939.1A 2022-04-12 2022-04-12 Data transmission method and device and data release equipment Withdrawn CN114710557A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210381939.1A CN114710557A (en) 2022-04-12 2022-04-12 Data transmission method and device and data release equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210381939.1A CN114710557A (en) 2022-04-12 2022-04-12 Data transmission method and device and data release equipment

Publications (1)

Publication Number Publication Date
CN114710557A true CN114710557A (en) 2022-07-05

Family

ID=82175164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210381939.1A Withdrawn CN114710557A (en) 2022-04-12 2022-04-12 Data transmission method and device and data release equipment

Country Status (1)

Country Link
CN (1) CN114710557A (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060047666A1 (en) * 2004-08-28 2006-03-02 Bedi Bharat V Control of publish/subscribe messaging
US20090182574A1 (en) * 2008-01-16 2009-07-16 International Business Machines Corporation Limiting proxy subscription propagation in a publish/subscribe message broker network
CN101848236A (en) * 2010-05-06 2010-09-29 北京邮电大学 Real-time data distribution system with distributed network architecture and working method thereof
CN101867590A (en) * 2009-04-14 2010-10-20 华为技术有限公司 Subscription method based on session initiation protocol, and device thereof
US20150207862A1 (en) * 2012-08-23 2015-07-23 Telefonaktiebolaget L M Ericsson (Publ) Handling a shared data object in a communication network
US20160112438A1 (en) * 2014-10-17 2016-04-21 Christian Hengstler Secure messaging in message-oriented systems
CN105656847A (en) * 2014-11-13 2016-06-08 中国科学院沈阳计算技术研究所有限公司 SIP (Session Initiation Protocol)/MQTT (Message Queuing Telemetry Transport) protocol conversion gateway system and control method thereof for mobile device
US9444948B1 (en) * 2015-03-11 2016-09-13 Verizon Patent And Licensing Inc. Portal for toll free media subscription campaigns
CN109151043A (en) * 2018-09-06 2019-01-04 北京赛佰特科技有限公司 Message delivery system based on cloud service
CN109874123A (en) * 2017-12-01 2019-06-11 通用汽车环球科技运作有限责任公司 Vehicle communication is carried out using distribution subscription messaging protocol
CN111183619A (en) * 2017-12-28 2020-05-19 西门子股份公司 Method, device and system for transmitting MQTT data through message queue telemetry transmission
CN111770172A (en) * 2020-06-29 2020-10-13 深圳前海微众银行股份有限公司 Message middleware consumption proxy method, device, proxy server and storage medium
US10891282B1 (en) * 2017-11-22 2021-01-12 Amazon Technologies, Inc. Mutations with immediate feedback
CN112804332A (en) * 2021-01-14 2021-05-14 广州虎牙科技有限公司 Message processing system, method, device, equipment and computer readable storage medium
CN113254233A (en) * 2021-06-07 2021-08-13 腾讯科技(深圳)有限公司 Data transmission method, device, equipment and readable storage medium
US20210409393A1 (en) * 2020-06-29 2021-12-30 Sony Group Corporation Access management of publisher nodes for secure access to maas network
CN113872940A (en) * 2021-09-02 2021-12-31 华中科技大学 Access control method, device and equipment based on NC-Link

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060047666A1 (en) * 2004-08-28 2006-03-02 Bedi Bharat V Control of publish/subscribe messaging
US20090182574A1 (en) * 2008-01-16 2009-07-16 International Business Machines Corporation Limiting proxy subscription propagation in a publish/subscribe message broker network
CN101867590A (en) * 2009-04-14 2010-10-20 华为技术有限公司 Subscription method based on session initiation protocol, and device thereof
CN101848236A (en) * 2010-05-06 2010-09-29 北京邮电大学 Real-time data distribution system with distributed network architecture and working method thereof
US20150207862A1 (en) * 2012-08-23 2015-07-23 Telefonaktiebolaget L M Ericsson (Publ) Handling a shared data object in a communication network
US20160112438A1 (en) * 2014-10-17 2016-04-21 Christian Hengstler Secure messaging in message-oriented systems
CN105656847A (en) * 2014-11-13 2016-06-08 中国科学院沈阳计算技术研究所有限公司 SIP (Session Initiation Protocol)/MQTT (Message Queuing Telemetry Transport) protocol conversion gateway system and control method thereof for mobile device
US9444948B1 (en) * 2015-03-11 2016-09-13 Verizon Patent And Licensing Inc. Portal for toll free media subscription campaigns
US10891282B1 (en) * 2017-11-22 2021-01-12 Amazon Technologies, Inc. Mutations with immediate feedback
CN109874123A (en) * 2017-12-01 2019-06-11 通用汽车环球科技运作有限责任公司 Vehicle communication is carried out using distribution subscription messaging protocol
CN111183619A (en) * 2017-12-28 2020-05-19 西门子股份公司 Method, device and system for transmitting MQTT data through message queue telemetry transmission
CN109151043A (en) * 2018-09-06 2019-01-04 北京赛佰特科技有限公司 Message delivery system based on cloud service
CN111770172A (en) * 2020-06-29 2020-10-13 深圳前海微众银行股份有限公司 Message middleware consumption proxy method, device, proxy server and storage medium
US20210409393A1 (en) * 2020-06-29 2021-12-30 Sony Group Corporation Access management of publisher nodes for secure access to maas network
CN112804332A (en) * 2021-01-14 2021-05-14 广州虎牙科技有限公司 Message processing system, method, device, equipment and computer readable storage medium
CN113254233A (en) * 2021-06-07 2021-08-13 腾讯科技(深圳)有限公司 Data transmission method, device, equipment and readable storage medium
CN113872940A (en) * 2021-09-02 2021-12-31 华中科技大学 Access control method, device and equipment based on NC-Link

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
程健等: "面向物联网的闭环全生命周期管理系统中间件设计", 计算机应用与软件 *

Similar Documents

Publication Publication Date Title
JP4685876B2 (en) System and method for providing multiple credential authentication protocols
EP2733909B1 (en) Terminal control method and device, and terminal
CN110855792B (en) Message pushing method, device, equipment and medium
CN101640823B (en) Method and equipment for shunting multi-analysis system
CN111163130A (en) Network service system and data transmission method thereof
CN111510474A (en) Data transmission method based on message middleware and related equipment
US20190098683A1 (en) Method and device for associating user with group
CN108881929B (en) Method and device for setting login prompt of live broadcast room
CN114710557A (en) Data transmission method and device and data release equipment
CN105988949A (en) Terminal equipment and data interactive processing method and system
CN111131324A (en) Login method and device of business system, storage medium and electronic device
KR101010091B1 (en) Method and apparatus to facilitate detection of an unauthorized communication system user
CN109525553B (en) Transmission protection method, intermediate device, server and system for URL (Uniform resource locator) request
CN108595941B (en) Data processing method and system and electronic equipment
CN111092728B (en) User addressing method, addressing platform and strategy issuing system
CN112134856A (en) Method, system, server and storage medium for disabling application program
KR20220032229A (en) Method for controlling data transmission in distributed network and appratuses perfroming the same
CN113852919B (en) Method and device for generating early warning message, storage medium and electronic device
CN109308893A (en) Method for sending information and device, storage medium, electronic device
CN114598561B (en) Group application management method, device, equipment, storage medium and program product
US20110276801A1 (en) Communicating admission decisions and status information to a client
CN114285799A (en) Method, device, terminal and storage medium for processing service
CN111142684B (en) Information synchronization method for on-demand resources among multiple devices of distributed KVM display control system
CN105101141A (en) Control method for intelligent anti-lost device, intelligent anti-lost device and system
CN111212113B (en) Virus sample distribution method, sending end, receiving end and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220705

WW01 Invention patent application withdrawn after publication