CN103442084A - Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system - Google Patents
Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system Download PDFInfo
- Publication number
- CN103442084A CN103442084A CN2013104106585A CN201310410658A CN103442084A CN 103442084 A CN103442084 A CN 103442084A CN 2013104106585 A CN2013104106585 A CN 2013104106585A CN 201310410658 A CN201310410658 A CN 201310410658A CN 103442084 A CN103442084 A CN 103442084A
- Authority
- CN
- China
- Prior art keywords
- service
- data
- data box
- user
- box system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000004044 response Effects 0.000 claims abstract description 51
- 230000006870 function Effects 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 17
- 230000008569 process Effects 0.000 claims description 16
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000013461 design Methods 0.000 claims description 11
- 238000011161 development Methods 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 230000006835 compression Effects 0.000 claims description 4
- 238000007906 compression Methods 0.000 claims description 4
- 230000003190 augmentative effect Effects 0.000 claims description 3
- 235000014510 cooky Nutrition 0.000 claims description 3
- 238000013523 data management Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 claims description 3
- 230000006855 networking Effects 0.000 claims description 3
- 238000007639 printing Methods 0.000 claims description 3
- 238000007619 statistical method Methods 0.000 claims description 3
- 238000013519 translation Methods 0.000 claims description 3
- 230000002155 anti-virotic effect Effects 0.000 claims description 2
- 230000008846 dynamic interplay Effects 0.000 claims description 2
- 230000008447 perception Effects 0.000 claims description 2
- 230000002452 interceptive effect Effects 0.000 abstract description 5
- 230000003993 interaction Effects 0.000 abstract description 3
- 238000012546 transfer Methods 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services or time announcements
- H04M3/493—Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
- H04M3/4931—Directory assistance systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services or time announcements
- H04M3/493—Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
- H04M3/4938—Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals comprising a voice browser which renders and interprets, e.g. VoiceXML
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention belongs to the technical field of networks and particularly relates to a data box system capable of providing mail and catalog type data exchanging, acquiring and sensing service and a use method of the data box system. The data box system can effectively provide catalog type navigation service, integrate different services and provide more convenient and rapider service for users. Data exchange is realized in a way of transmitting mails in an electronic mail box to and fro, and the catalog type service is provided for the users in a way of working by means of an IVR (Interactive Voice Response) voice command. A uniform method is provided for realizing data exchange between providers, between a service provider and a user and between users; data is transmitted and received like mails while the service is used and provided by individuals and enterprises, and the seamless interaction among the data, a private cloud of the data and a business system of the data can also be realized; the catalog type navigation service and the interactive response type service are provided for the users; based on the three points, the service and data on each service provider system are integrated for the users.
Description
Technical Field
The invention belongs to the technical field of networks, and particularly relates to a data box system for exchanging data in a mail mode and a directory mode and acquiring and sensing services and a using method thereof.
Background
The rapid development of the mobile internet and the coming of the cloud computing era lead users to have great trouble while enjoying the cloud services through intelligent devices such as mobile phones and the like, and the data of the users are dispersed in systems of various service providers and cannot be effectively integrated together; the method is inflexible, inconvenient and quick for searching and using the service provider service through intelligent equipment such as a mobile phone and the like, and a more effective method for providing the directory navigation service is urgently needed; meanwhile, how individuals and enterprises can interact with private clouds and business systems of the individuals and the enterprises while using and providing services lacks an effective method; whether the data exchange among the service providers can be realized for the user through a uniform method or not can be realized.
Disclosure of Invention
In order to solve the above problems, the present invention provides a data box system for exchanging data, acquiring and sensing services, which can effectively provide directory-type navigation services and integrate different services, and a method for using the same. More convenient and faster service is provided for users.
Data exchange, acquisition and perception service's data box system, its characterized in that: including the service provider and the user, and,
wherein,
the service provider provides a data box for each user or service provider, and provides at least one data box address for each data box;
the user or the service provider uses the client or logs in the data box of the user or the service provider, appoints the address of the data box of the user or the other party, exchanges data with the appointed data box through a protocol which is followed by the user or the service provider together, and acquires and senses the service.
The service providers are multiple, trust relationships are realized among the service providers through digital certificates or RSA/DES/HASH security algorithms or passwords, or the trust relationships are established through the trust service providers, and users of different service providers or the service providers exchange data and acquire and sense services mutually through data box addresses provided by different service providers.
The user or the service provider can bind the data box addresses for the user or the service provider through an account provided by the trust service provider, and simultaneously select a strategy to set whether all or a plurality of the bound data box addresses are disclosed, so that other users or the service provider can conveniently obtain the data box addresses through the account.
The user or the service provider may log into the data box through a portal provided by the service provider or through a client.
All clients capable of accessing the data box can exchange data, acquire and sense services with the data box, and the clients are systems, software or programs.
The data box system provides a directory describing services for each data box.
The service is a service program provided by the data box system together with other systems, software or programs.
The service program is extended or hung on the data box through the adapter, and is configured or dynamically registered on the directory of the data box description service.
The service comprises the following steps: mailbox service, message service, chat or message service, status notification service, data management and statistical analysis or chart service, e-commerce or shopping or group purchase service, online survey service, question and answer service, web navigation service, web disk or archive service, document service, file service such as format conversion or compression or download or thumbnail, data sharing service such as page or component or application or file or album, subscription and publication service such as RSS, advertisement service, blog or microblog service, encyclopedia service, post service, forum service, social networking service such as chat and friend making, video and audio service, financial or news information service, pictorial service, dictionary service, translation service, hosting service, directory service, public service such as seeker or donation, online intermediary and rent service, game service, cooperative office management service, cooperative development service, The system comprises one or more of remote control service, mobile phone or short message or multimedia message or address book or voice or office service, photographing service, voice service, comment and comment service, template service, consultation or design or car sharing or lottery or charging or repayment or payment living service, printing service, online payment service, business machine service, antivirus service, search service, desktop service, travel plan or CRM or purchase and stock cloud application service, remote education service, remote conference service, remote medical service, voice mailbox service, computing service, storage service, sensor service, map and satellite remote sensing service, location service, virtual reality service and augmented reality service.
The expansion format of the data box address is data box address/service name/sub-service name/…, and the data box system quickly locates the service program to process the request according to the expansion format of the data box address.
The data of one request and response in the data box is called a data piece, and the data box system packages and stores the data of each transmission and response into the data piece according to the format.
One data element is composed of two parts of data for transmitting and responding, the data content of the two parts comprises one or more of directory service Services, data Message related to the service, data UI related to the UI interface, or none of the two parts, and the data content of the responding part comprises data of Status describing the responding state.
In addition, the invention also provides a using method of the data box system for exchanging data, acquiring and sensing service.
The use method of the data box system for exchanging data, acquiring and sensing service is characterized in that: the method comprises the following steps:
1. a user logs in a data box of the user or passes through a client, and the user comprises a service provider;
2. the user specifies the address of the data box of the other party, wherein the other party refers to the user, other users or a service provider;
3. the data box system or the client where the user data box is located analyzes the address of the data box of the opposite side, is connected with the data box system where the data box of the opposite side is located, and sends a service request, and meanwhile, if the data box system or the client where the user data box is located has a function of locally storing data pieces, the data of the service request can be stored in the data box or the client of the user locally;
4. after receiving the request, the data box system of the opposite side data box firstly confirms whether the received data box address is correct and whether the identity of the user is valid or credible, and if the identity is invalid or credible, whether the response is refused is selected according to a strategy; receiving the data of the service request and storing the data in a data box; the data box system of the opposite side data box judges whether the data box system provides service programs for the service requests, if so, the service programs are operated for processing, and data describing response state, directory service, processing result, Ui and the like are responded to the data box system of the data box, and if not, the data describing response state, directory service, UI and the like are directly responded to the data box system or client side of the user data box; a data box; the response data is also stored in the other side data box;
5. and the data box system or the client where the user data box is located receives the response data, and meanwhile, if the data box system or the client where the user data box is located has a function of locally storing the data piece, the response data is stored in the corresponding data piece, namely, the process of completing the request and the response is shown.
The data box system marks whether the identity of the sender is valid or credible for the data piece, and the user can check and manage the data piece in the data box.
The data box system or client may provide a UI interface for the user to further select services and to correlate the returned processing results data.
If the data element contains Services, Ui and other data, or the data box system provides a Ui program for the data format, the user may perform step 2-5 to start running again according to the Ui interface of the directory service and data, where the address of the data box specified in step 2 may be in an extended format with a service name.
The step 2 comprises the following steps: 1) a user specifies an account number on a trust service provider of an opposite party; 2) a data box system or a client where a user data box is located sends a request for searching a data box address bound by an opposite account to a trust service provider; 3) and after the data box address bound by the opposite account is acquired, the default specified data box address of the opposite account is used, or the user directly selects the data box address.
The client can access the address of the data box of the opposite side under the condition of no login, the data box system where the data box of the opposite side is located directly confirms that the identity of the sender is unknown or untrustworthy after receiving the request, and whether the response is rejected is selected according to the strategy.
The client side can use a trust token generated by the data box system where the user is located and the data box system of the other side for user contract or dynamic interaction, when the client side holds the trust token to access the data box of the other side, the trust token can indicate the identity of the data box owned by the user, and the trust token is a certificate issued by the data box system where the user is located and the data box system of the other side together, or a password, or a specific session cookie value.
The design ideas of the system and the method are derived from widely applied electronic mailboxes, IVR voice navigation and the like. Data exchange is realized by using a mode of transmitting email to and from an email box, and directory service is provided for users by using a mode of working by using IVR voice instructions. The technical effects achieved are as follows:
1. providing a uniform method to realize data exchange among service providers, between service providers and users and between users;
2. when an individual or an enterprise uses and provides services, data are sent and received like mails, and the data can seamlessly interact with a private cloud and a business system of the individual or the enterprise;
3. providing a simple access mode, combining seamless interaction capability of data and own private cloud and service system, and providing directory navigation service and interactive response service for users, just like IVR voice instruction key 1, key 2 …, then key 1 and key 2 … are visual and convenient;
4. and integrating the services and data on various service provider systems for the user based on the three points.
Drawings
FIG. 1A, B establishes trust relationships between service providers.
The facilitator of FIG. 2A, B trusts the service provider to establish a trust relationship through C.
FIG. 3A illustrates a data box address for a service provider.
Fig. 4 the user owns the data box of the a service provider.
FIG. 5 the user owns the account of the C trusted service provider and binds multiple data box addresses.
FIG. 6 is a directory-like service provided by the data box address, similar in structure to IVR voice navigation.
Fig. 7 operation example of REST.
Fig. 8 runs the mechanism.
FIG. 9 is an extended data processing program.
FIG. 10 illustrates a direct trust relationship between service providers.
FIG. 11 illustrates an indirect establishment of a trust relationship between service providers through a trust service provider.
FIG. 12 directory services UI interface.
FIG. 13 directory services photo's UI interface.
FIG. 14 directory service photo's "latest photo" operation interface.
FIG. 15 supports other servlets through adapter extensions.
FIG. 16 is a schematic diagram of a user using a data box.
FIG. 17 shows the steps for a client to access a data box without logging in.
FIG. 18 the user uses the client locally stored schema.
FIG. 19 is a flowchart of a mode for a user to use the counterpart data box proxy storage.
Detailed Description
The design idea of the DataBox data box is derived from widely applied electronic mailboxes, IVR voice navigation and the like. The DataBox data box acquires and senses service and data exchanged between two parties by using a mode of delivering mails to the mailbox address of the other party or accessing the mailbox of the data box to acquire the mails, and simultaneously provides directory-type convenient service for customers by combining a mode similar to IVR voice instruction work.
In the network, the electronic mailbox can automatically receive the electronic mails sent by any electronic mailbox in the network and can store electronic files with various formats such as a specified size and the like. It features that people can send and receive information at any place, so greatly increasing working efficiency.
IVR (Interactive Voice Response) is Interactive Voice Response, you can enter the service center by only using a telephone, and listen to the mobile phone entertainment product according to the operation prompt. The related information may be played according to the content input by the user. IVR can provide 24 hours per day all-weather service 7 days a week. IVR handles a large amount of daily business for enterprises without going through a business representative. The customer inputs information to the enterprise host through key or voice selection, accesses various enterprise databases (through ODBC) within an allowable range, and obtains various services by self-service, so that business representatives have more time to service the customers with special requirements.
The DataBox data box design is as follows:
2.1. data box facilitator, trust service provider
A service provider that provides the service of the data box. In view of security, confidentiality, certainty of identity of both exchange parties, non-repudiation and non-modifiability of transmitted data, a trust relationship can be realized between service providers through technical means such as a digital certificate, an RSA/DES/HASH security algorithm or a password (FIG. 1). Meanwhile, considering that there will be a plurality of service providers on the huge internet, the service providers can be trusted to establish a trust relationship (fig. 2).
2.2. User' s
A service using a data box service is called a user and at least one data box address is provided by the service provider that it serves. In the internet, the format of the data item address emulating (but distinct from) the mailbox address may be: user name | hostname. For example databox | onegid. Meanwhile, the service provider itself also has a data box address (fig. 3), which may be: | host name, e.g. | onegorid. In addition, a user on the Internet typically has multiple data box addresses, such as databox! A facilitator (FIG. 4), databox! B facilitator. To implement single sign-on, network ID, etc. functions between trust providers, a user may apply to register an account with a trust provider, and the account will bind these data box addresses to the user (FIG. 5).
2.3. Data box address
The service provider provides the data box service for the user through the data box system. These services are typically associated with their own traffic, system functionality, or operational policies, etc. For example, a mail system operator may provide mail service as a facilitator, a blog system operator may provide blog service as a facilitator, an archive system operator may provide archive service as a facilitator, an e-commerce enterprise may provide e-commerce service as a facilitator, and so on. At least one directory service exists for a data box system of a facilitator. At the same time, these services form a tree directory. In order to facilitate the user to quickly locate the service, the address format of the data box can be expanded into:
data box address/service name/sub-service name/. cndot.
For example (fig. 6):
an onegorid.cn service provider offers:
cn/register provides registration services
Cn/product provides product directory service
Cn/product/databox provide data box product service
Cn product/databox/order provides ordering service for data box products
Wherein, register, product, database and order are all service names, and database is the sub-service name of product, and order is the sub-service name of database
databox | onegd.cn (user databox on onegd.cn service provider) provides
directory service for photos provided by databox, once, cn/phones
directory! onegid.cn/phones/family provides a photo browsing service
directory! onegorid.cn/leaveword provides a message service
Wherein, the phones, family, and leaveword are all service names, and family is the sub-service name of the phones
If the data box address does not carry any service name, then the indication points to a default directory service.
2.4. Data box data transfer protocol and format
The data transmission of the data box adopts widely applied protocols such as HTTP (S), S-HTTP and the like, and refers to the design and development mode of REST. Different from the design of mailbox systems:
first, not only data transfer between data boxes, but also clients (systems, software, programs, etc.) that have access to the data boxes can transfer data with the data boxes.
Second, the requested service name may be piggybacked onto the designated data box address.
Third, as with the format of the e-mail existence standard (RFC822), the data of the data box transmission and response also exists in the standard format and is defined using XML (markup language). XML is defined as follows:
data format of transmission:
description of the drawings:
(1) the functions of group sending, copying, secret sending, replying, forwarding and the like are supported;
(2) not all transfers have Service, Message, UI, etc. For example, when a photo of the other party is requested to be acquired, the Service part and the UI part are not needed; if the opposite side is requested to browse the photos sent by the user, a UI part is often needed so as to facilitate the opposite side to browse the my photos; if the other party is requested to use the Services provided by the user, the Services part is often needed so as to facilitate browsing the directory-type Services;
(3) the custom information starts with X-like mailbox.
Data format of response:
description of the drawings:
(1) when Code of Status is-1 (reject) and 0 (wait for user to confirm), data such as Services, messages, UI and the like are not responded; when the Code of Status is 0 (waiting for user confirmation), the user can check and receive the data piece and manually respond or reply the data piece; when the Code of Status is 1 (allowed), not all of them respond to Services, messages, UI, and the like, and only one or more of them may be responded. E.g., a mailed data box service, responds only to status permissions;
(2) the custom information starts with X-like mailbox.
Fourth, unlike mail systems, data box systems may provide data processing programs for standard data format extensions. For example, for the mail service with service/email, a mail processing program is provided to transfer the mail to the mailbox system; aiming at the message leaving service with the service of/leave word, a message processing program is provided to store the message in a website message system; aiming at the message service with service of/products/order, providing an order processing program to store the order into the online sales system of the enterprise;
fifth, referring to the style of REST development design (FIG. 7), the REST URL specification for the data box service request is
HTTP (s)// hostname/username/service name/.
Meanwhile, a set of unified modes (or methods) GET, POST, PUT and DELETE are used for simply operating service resources.
Applied to a data box, if:
sixth, like the mail in the mailbox, the data in the data box is called as a data element, and the functions of group sending, copy, secret sending, forwarding and the like are also supported. That is, the format of the data element is composed of two parts, transmission and response.
2.5. Principle of operation
2.5.1. When accessing a data box of a certain service provider or user, the data box address of the other party must be specified, as when sending an e-mail, the mail address of the other party must be input. While the data box may be accessed by the client software program as if the mailbox were accessed by the Foxmail client software.
2.5.2. Operation mechanism
First, preparation phase. The client (system, software, program, etc.) accessing the data box specifies the data box address of the other party, the service that needs to be requested, and the data to be transferred. The system can provide a catalogue type selection service, a tabular writing environment for data, or can be automatically generated by a system, software, a program and the like according to requirements.
Second, sending stage. And according to the address of the data box of the other party, sending the data to the data box system of the service provider of the other party through the network through a data transmission protocol.
And the third, authentication phase. After receiving the request, the data box system of the opposite service provider firstly confirms whether the data box address designated by the sender is correct and whether the identity of the sender is valid (whether the identity of the sender is authenticated can be selected according to a strategy).
And fourthly, receiving. The data is received and saved to a data box (called a data element). Meanwhile, it is determined whether the data box system provides processing programs for the data extensions, and if so, the programs are run to perform processing. Here, the user can set the data reception policy according to the human configuration service provided by the data box system.
And fifthly, responding. And finally, responding the received and processed result to the client.
Specifically, as shown in FIG. 8
A. Validating a data box address
Confirm whether the requested data box address exists, and if not respond to a rejection.
B. Confirming sender identity
A. Directly sending the request if the sender is not logged on to the data box facilitator and the trust provider
A.1. Data box system of opposite side service provider confirms that sender identity is unknown or not credible
B. If the sender logs on to the data box service provider and sends the request
B.1. And if the sender data box service provider is the same service provider, confirming that the identity of the sender is credible.
B.2. If the data box service provider of the sender is a trusted service provider, whether the identity of the sender is trusted can be confirmed by a security technical means trusted by the two parties.
B.3. And if the data box service provider of the sending party is an untrusted service provider, confirming that the identity of the sending party is not trusted.
C. If the sender logs on to the trust provider and then sends the request
C.1. Whether the identity of the sender is trusted can be confirmed through a security technical means between the service provider and the trust providing service provider.
D. If the sender uses the trust provider account number to perform single sign-on to the data box service provider and then sends the request
D.1. And if the sender data box service provider is the same service provider, confirming that the identity of the sender is credible.
D.2. If the sender sends the request in the data box address role, the identity process of the sender is confirmed to be the same as the process B
D.3. If the sender sends the request in the account role of the trust provider, the identity of the sender can be confirmed to be credible through a security technical means of three-party trust. In addition, under certain application requirements, whether the account of the trust provider is trusted or not needs to be further confirmed. The confirmation strategy can select the following processes:
D.3.1. and the access trust providing service provider verifies whether the address of the data box of the sender is matched with the account number, if not, the sender identity is confirmed to be forged, and the response is rejected.
D.3.2. And the access trust providing service provider verifies that the data box service provider of the sender is the service provider passing the authentication, and then confirms that the identity of the sender is trusted. If not, the sender is required to manually verify under the trust provider's website domain that the current request is from oneself, similar to an online payment process for online shopping.
C. Data receiving strategy of user
The service provider data box system should provide a humanized configuration interface, so that a user can conveniently set a data receiving strategy. Global policies may be set, such as in using a facilitator's data box system, or special policies for certain data box addresses or to trust the account number of the providing facilitator. These policies may be such that if the sender identity is unknown or not trusted, the user must manually confirm and choose whether to use the same policy at a later time; if the sender identity is trusted, immediate response, etc.
D. Extended data processing program
A data box system is different from a mail system, and not only receives mail, but also it is more important that the data box is connected with a service or service system provided by a service provider. For example, a service provider provides hosting service of a website for a user, a data box of the user can provide message leaving service to the outside, and message leaving data from the data box is processed and automatically enters a message leaving system of the website; the service provider sells the product and has the purchase-sale-stock system, so that the data box of the service provider can provide the product ordering service to the outside, and the order from the data box is processed and automatically enters the purchase-sale-stock system. As shown in fig. 9.
E. Responsive to the result
Unlike mailbox systems, response processing is typically real-time to ensure continuity of the data box service, interactivity with clients. And the data content of the response contains the results of the processing of the program in addition to the results of the received data.
2.5.3. Working process
In fig. 10 and 11, user a registers and uses data boxes a | s0.com, a | s1.com at service provider s0.com, service provider s1.com, respectively, and user b registers and uses data box b | s1.com at service provider s 1.com.
In fig. 11, user a registers an account ca with the trusted service provider c and binds the data boxes a | s0.com, a | s1.com he uses, and user b registers an account cb with the trusted service provider c and binds the data boxes b | s1.com he uses.
In fig. 10, a trust relationship is directly established between the facilitator s0.com, the facilitator s1.com. In fig. 11, the facilitator s0.com, the facilitator s1.com indirectly establish a trust relationship through the trust service provider c.
An example of a procedure for attempting to access user a's data box a after user b has accessed its data box b | s1.com is as follows:
first, the data box address a! s0.com is specified
And secondly, the data box system s1.com sends a request for acquiring the directory service to the service provider s0.com where the target data box address is located. At the same time, the system will save the request to the data box.
A. The technology used by the scheme is that a service provider s0.com provides directory service in a REST mode.
REST defines a set of architectural principles according to which you can design Web services that are system resource-centric, including how clients written in different languages handle and transmit resource states over HTTP. REST has become the most prominent Web service design model in recent years if the number of Web services using it is considered.
User a is at service provider s0.com's data box address a | s0.com, then service provider s1.com can consider service provider s0.com's REST URL http:// s0.com/a, method: and (6) GET.
B. The technology used by the scheme is based on the HTTPS protocol to realize trust authentication of both parties.
HTTPS (fully known as Hypertext Transfer Protocol over Secure Socket Layer) is an HTTP channel targeted for security, and simply a Secure version of HTTP. Namely, an SSL layer is added under HTTP, and the security base of HTTPS is SSL. The SSL protocol is positioned between the TCP/IP protocol and various application layer protocols and provides safety support for data communication. The SSL protocol can be divided into two layers: SSL recording Protocol (SSL Record Protocol): it is built on top of reliable transmission protocol (such as TCP), and provides basic functions of data encapsulation, compression, encryption and the like for higher-layer protocol. SSL Handshake Protocol (SSL Handshake Protocol): it is established on SSL record protocol, and is used for making identity authentication, negotiation encryption algorithm and exchange encryption key, etc. by two communication parties before actual data transmission is started.
The work flow of the SSL protocol is as follows: 1) the client sends a start message "Hello" to the server to start a new session connection; 2) the server determines whether a new master key needs to be generated according to the information of the client, and if so, the server contains the information required for generating the master key when responding to the Hello information of the client; 3) the client generates a master key according to the received server response information, encrypts the master key by using the public key of the server and transmits the encrypted master key to the server; 4) the server recovers the master key and returns to the client a message that is authenticated with the master key, thereby allowing the client to authenticate the server.
The server s1.com makes a request to the server s0.com, then the server s1.com is the client and the server s0.com is the server. The SSL handshake is performed between the facilitator s1.com and the facilitator s0.com through digital certificates that trust each other. In fig. 7-1, digital certificates that trust each other may be issued by a root certificate of a trusted service provider c (including root certificates provided by an authority). Through the handshake, the authentication of the trust relationship is completed, and the service provider s0.com can also determine whether the identity of the sender is trusted.
The identity of the sender is credible, and the role of the sender is to describe the credibility of the sender, so that a user can define a strategy or a process conveniently. It cannot be fully assumed that the request was sent by the sender himself. Because there is inevitably the possibility of other risks, such as the facilitator s1.com actively spoofing, or being blacked out, causing the identity of the user b to be falsified in an attempt to access.
There are often several situations that require further authentication of the identity of the visitor.
1. Judging whether the identity of the sender can obtain more services or data than the anonymous user or other member users;
2. judging whether the identity of the sender is a certain member in the system; (currently many systems use OAuth's technology to support single sign-on)
The OAUTH protocol provides a secure, open and easy standard for authorization of user resources. The difference from the former authorization method is that the authorization of OAUTH does not make the third party reach the account information (such as user name and password) of the user, i.e. the third party can apply for obtaining the authorization of the user resource without using the user name and password, so the OAUTH is safe.
3. Other possible scenarios
The technology adopted by the scheme is consistent with the current mainstream strategy for realizing single sign-on, an authentication WEB page of a service provider s0.com is popped up, and a sender is informed to input more safety information such as a picture verification code and the like on the page for confirmation.
Thirdly, the service provider s0.com confirms whether the data box address of the receiver exists or not, and after confirming the identity of the sender, receives the requested data according to the strategy, and runs a corresponding program to return the data such as the directory service and the like. At the same time, the received, responsive data will also be saved to the data box.
The scheme defines the strategy of receiving the request data as follows by default:
selection of permission, waiting for user confirmation, rejection policy for certain services + for certain data box addresses +
The waiting for the user to confirm the strategy means that the request response needs manual operation response of the user, and is similar to a prompt strategy when a webpage loads some unknown or unsafe controls.
For example:
service: directory service
Target data box address: all of
Strategy: allow for
And returning data such as directory service and the like according to the standard format of the data box response data. Data for a directory service is exemplified as follows:
and fourthly, the service provider s1.com receives the response data and stores the data into a corresponding data piece, namely, the process of finishing the request and the response is shown. To ensure continuity of the data box service, interactivity with the client, the data box system typically provides the user with a UI interface to further select the service. For example, a user can make a voice call, a voice prompt presses a 1 key to obtain a photo service, and presses a 2 key to obtain a message service, and the like, which require keyboard operation. As illustrated in fig. 12.
Fifthly, the user further selects the service as if the user presses the 1 key to obtain the photo service according to the voice prompt.
And sixthly, operating according to the processes from the first step to the fourth step. But the address of the data box of this request carries the service name, such as:
data box address: a | s0. com/phones
REST URL:http(s)://s0.com/a/photos
The method comprises the following steps: GET (GET tool)
Meanwhile, in the third step, data of directory service, photos and the like are returned according to the standard format of the data box response data.
Data for a directory service is exemplified as follows:
the data for the photographs are as follows:
meanwhile, the service provider s0.com provides UI data for the above data, as exemplified below:
the package is a form in the UI specification, and is a component for displaying the latest photo, similar to a control on a web page, and when the data box system of the service provider does not have this component, it can be downloaded through a specified plugin path.
In the fourth step, the UI interface of the directory service changes to the form illustrated in fig. 13 as follows.
For example, after the user dials and presses the 1 key of the voice prompt, the voice prompts to press the 1 key to obtain a home photo service, and presses the 2 key to obtain a personal photo service, etc.
Com, based on the data and UI, the data box system of the service provider s1.com displays the operation interface as shown in fig. 14.
Seventh, the user can further select the service as if the user continues to push the button down to obtain the service according to the voice prompt.
If a specific photo of "happy family" is viewed:
data box address: a | s0.com/photos/family/f0
REST URL:http(s)://s0.com/a/photos/family/f0
The method comprises the following steps: GET (GET tool)
Browsing personal photos:
data box address: a | s0. com/phos/person
REST URL:http(s)://s0.com/a/photos/person
The method comprises the following steps: GET (GET tool)
Etc. of
And step eight, repeating the process from the step one to the step four.
2.6. Several essential functions of the data box system are critical:
several essential functions of the data box system are critical:
(1) providing one or more data boxes for a user, each data box having at least one data box address;
(2) analyzing the address and the expanded format of the data box, interactively communicating with other data box systems, supporting the sending of data for a user, confirming whether the received address of the data box is correct and the identity of the sender is valid or credible for each request, selecting a response according to a strategy, receiving the data and storing a data piece;
(3) analyzing the data format of the data piece transmission and response, and providing a UI (user interface) for a user to realize interactivity;
(4) providing a data piece storage function for each data box and marking whether the identity of the sender is valid or credible;
(5) the method comprises the steps that a user is supported to log in a data box of the user, and the user is supported to manage data pieces in the data box;
(6) providing a directory function for describing services for each data box, and supporting the request and response of different service directory data for different data box addresses and the extended format thereof;
(7) support to expand or attach other service programs, and support to forward the service request to the corresponding service program for processing and responding, (8) support these expanded service programs to configure or dynamically register on the directory of the data box description service;
(9) supporting user to access data box by using client
Several key expansion functions are as follows:
(1) the function of interactively communicating with other data box systems to generate a trust token for the client;
(2) a proxy store data element function;
2.7. extending support for other service programs
The scheme uses the adapter to realize the expansion or the hooking of other service programs. The key role of the adapter is to realize the conversion between the data format of the data element and the data format required and responded by the service program. The adapter is used between the data box system and the service program as shown in FIG. 15.
When the service is requested, the data box system transmits the data transmitted by the data piece to the adapter, and the adapter converts the data into the data required by the service program according to the format protocol, thereby meeting the data processing requirement of the service program.
After the service program is processed, the result data is converted into data element response data through the adapter, and then the data box system encapsulates the response service request.
Typically, adapters are designed according to service program development. Since the format of the data element is a standard protocol format, the scheme can be extended to support any form of service program. Such as mailbox service, message service, chat or message service, status notification service, data management and statistical analysis or chart service, e-commerce or shopping or group purchase service, online survey service, question and answer service, web navigation service, web or archive service, document service, file service such as format conversion or compression or download or thumbnail, data sharing service such as page or component or application or file or album, subscription and publication service such as RSS, advertisement service, blog or microblog service, encyclopedia service, post service, forum service, social networking service such as chat and friend making, video and audio service, financial or news information service, pictorial service, dictionary service, translation service, hosting service, directory service, public service such as seeker or donation, online intermediary and rent game service, cooperative office management service, cooperative development service, The system comprises a remote control service, a mobile phone or a short message or a multimedia message or an address book or a voice or an office service, a photographing service, a voice service, a comment and comment service, a template service, a consultation or design or car sharing or lottery or charging or repayment or payment service and other living services, a printing service, an online payment service, a business machine service, a virus killing service, a search service, a desktop service, a travel plan or CRM or purchase and stock and other cloud application services, a remote education service, a remote conference service, a remote medical service, a voice mailbox service, a computing service, a storage service, a sensor service, a map and satellite remote sensing service, a position service, a virtual reality service, an augmented reality service and the like.
The data box system provides directory functionality describing services. These extended services are configured or dynamically registered with a directory of the data box description services.
2.8. Trust service provider extension applications
In addition to establishing a trust relationship between the facilitator s0.com and the facilitator s1.com in the above process, the trust service provider c may also be extended to:
A. single sign-on of user a and user b
The trust relationship established between the trust service provider c and the service providers s0.com and s1.com is fully used, and the users a and b can automatically switch and log in the data box system of the service provider after logging in the trust service provider c.
Meanwhile, by combining the OAuth technology, the service provider s0.com and the service provider s1.com can log in by using the account number of the trust service provider c.
B. User b, when accessing user a's data box, replaces the input user a's data box address with "user a's account ca on trusted service provider c". Since user a is likely to have a data box address on many service providers and is difficult to remember. Thus, the data box system may implement this functionality based on the services provided by the trusted service provider c.
First, an account ca of user a on a trusted service provider c is specified
In the second step, the data box system s1.com sends a request to the trusted service provider c for the data box address bound to the account ca.
Com with the trusted service provider c can still perform handshake authentication by SSL here, which is one. Second, user a may trust service provider c to set an account disclosure policy:
selecting open policy allowance, waiting for user confirmation, denying for certain data box addresses, certain accounts +
As defined by default:
data box address: all of
Account: all of
Strategy: allow for
And thirdly, after the data box address is acquired, preferably providing a default data box address designated by the account ca of the user b, and certainly supporting the user b to select the data box address.
And step four, operating according to the processes from the step one to the step four mentioned in the working process of the step 2.5.3.
Service provided by default by data box
For better application of the data box to serve work and life, the following should be provided by default: mailbox, message, status notification, etc.
For example, user b may use the data box address a! s0.com:
service description: sending mail to user a
Data box address: a | s0.com/email
REST URL:http(s)://s0.com/a/email
The method comprises the following steps: POST (positive position transducer)
Service description: leave a message for user a
Data box address: a | s0.com/leaveword
REST URL:http(s)://s0.com/a/leaveword
The method comprises the following steps: POST (positive position transducer)
Service description: messaging user a
Data box address: a! s0.com/message
REST URL:http(s)://s0.com/a/message
The method comprises the following steps: POST (positive position transducer)
2.8. Trust service provider, data box facilitator basic functions to implement
2.8.1. Trusted service provider
A. Registration, audit data box facilitator and credit rating functionality
B. Function for issuing digital certificate of data box service provider
C. Function for authenticating data box service provider and credit level
D. Function for registering user account and binding data box address
E. Function for authenticating user account and data box address
F. Function for searching user account and data box address
G. Other basic functions
2.8.2. Trusted service provider
A. Function of registering and using data box
B. Function for authenticating identity of sender
C. Function for searching user account and data box address by proxy access trust service provider
D. Realize the function of packaging the data box transmission and response data according to the data standard format of the data box
E. UI (user interface) function for realizing data box response directory service and data
F. Single sign-on of a trusted service provider account via OAuth
G. Enabling automatic switch login from a trusted service provider login user
H. Realizing the functions of data box data element operation such as batch marking state, replying, responding, forwarding, group sending, deleting and the like
I. Realizing data box expansion or hanging service program and configuring or dynamically registering directory function of description service
J. Function for realizing interaction with other data boxes to generate trust token for user
K. Functionality to support client access to a data box
Other basic functions
Third, login to data box using step
As shown in fig. 16:
3.1. based on data box address
Step one, a user logs in a data box of the user; either: user logs in his mailbox
i. The user can access the data box system provided by the service provider through a browser or client software;
can be an automatic login to a service provider provided data box system using a client (system, software, program, etc.);
other ways in which login to the service provider's data box system can be made;
describing the way in which the user is the data box owner identity;
step two, appointing the address of the data box of the other side; either: specifying the mailbox address of the other party
Step three, the data box system where the data box is located analyzes the address of the data box of the other side, and is connected with the data box system where the data box of the other side is located for transmission, and meanwhile, the system stores the data transmitted this time into the data box;
either: the mail server of sender is connected with the receiving electronic mail server of receiver mailbox for sending
And step four, after the data box system where the opposite data box is located receives the request, firstly, whether the received data box address is correct and whether the identity of the sender is valid or credible are confirmed, and if the received data box address is invalid or credible, whether the response is rejected is selected according to a strategy. Receiving data, storing the data in a data box, judging whether the data extensions provide processing programs or not, and if so, operating the programs for processing. And finally, responding data such as the result of the directory service and processing, Ui and the like describing the response state to the client. At the same time, the received and responded data is also stored in the other data box.
Either: the mailbox system (1) does not confirm the identity of a sender, (2) does not support an extended processing program for mail content, and (3) only responds to the state of description receiving, which is greatly related to different application scenes.
And step five, the data box system where the data box is located receives the response data and stores the data into the corresponding data piece, namely, the process of completing the current request and response is shown. To ensure continuity of the data box service, interactivity with the client, the data box system may provide the user with a UI interface for further selection of services and related to the returned processing result data.
Either: and the mailbox system is ended after receiving the response data.
Either: the voice telephone, the voice prompt press 1 key to obtain the photo service, press 2 keys to obtain the message service, and the like, need keyboard operation.
Step six, the user further selects the service and operates again from step two, and the specified data box address usually carries the service name.
Either: and (4) voice telephone, wherein the user presses the 1 key to obtain the photo service according to the voice prompt.
3.2. Account based on trusted service provider
Step one, a user logs in a data box of the user;
step two, an account number on a trust service provider of the other side is appointed;
and step three, the data box system where the data box is located sends a request for searching the data box address bound by the account of the other party to the trust service provider.
And step four, after the data box address bound by the opposite account is obtained, the default specified data box address of the opposite account is preferably used, and the user is certainly supported to select the data box address.
Step five, repeating the step 3.1, and the step three to the step six based on the address of the data box
3.3. Handling data pieces in a data box
Step one, a user logs in a data box of the user;
checking and receiving and managing the data pieces in the data box, for example, performing operations such as marking state, replying, responding, forwarding, mass sending and the like;
step three, if the data piece contains Services, UI and other data, or the data box system provides a UI program for the data format, the user can perform the step 3.1 according to the directory service and the UI interface of the data, and the step three to the step six based on the address of the data box;
step four, the client accesses the data box without logging in
The data box system supports clients to access data boxes through agreed protocols. The specified data box address can be accessed without logging in. And directly confirming that the identity of the sender is unknown or untrustworthy after the data box system where the other data box is positioned receives the request, and selecting whether to reject the response according to the strategy. As in figure 17 using steps.
Fifthly, using steps of the client based on the trust token
The data box system in which the user data box is located may contract or dynamically interact with the other data box system to generate a trust token for the user. The token is used for indicating the identity of the data box owned by the user when the client used by the user holds the trust token to access the other data box. The token may be a certificate issued by the data box system where the user data box is located along with the other's data box system, or a password, or a specific session cookie value.
The user uses the mode of local storage of the client, and the using steps are as shown in fig. 18, in this mode, the client has the capability of local storage, so the client is generally a thick client.
The user uses the mode stored by the opposite data box proxy, and the using steps are as shown in fig. 19, and the mode has limited or no capacity of local storage of the client, so the client is usually a thin client, such as a browser.
Claims (19)
1. Data exchange, acquisition and perception service's data box system, its characterized in that: including the service provider and the user, and,
wherein,
the service provider provides a data box for each user or service provider, and provides at least one data box address for each data box;
the user or the service provider uses the client or logs in the data box of the user or the service provider, appoints the address of the data box of the user or the other party, exchanges data with the appointed data box through a protocol which is followed by the user or the service provider together, and acquires and senses the service.
2. The data box system for exchanging data, acquiring and sensing services according to claim 1, wherein: the service providers are multiple, trust relationships are realized among the service providers through digital certificates or RSA/DES/HASH security algorithms or passwords, or the trust relationships are established through the trust service providers, and users of different service providers or the service providers exchange data and acquire and sense services mutually through data box addresses provided by different service providers.
3. The data box system for exchanging data, acquiring and sensing services according to claim 1, wherein: the user or the service provider can bind the data box addresses for the user or the service provider through an account provided by the trust service provider, and simultaneously select a strategy to set whether all or a plurality of the bound data box addresses are disclosed, so that other users or the service provider can conveniently obtain the data box addresses through the account.
4. The data box system for exchanging data, acquiring and sensing services according to claim 1, wherein: the user or the service provider may log into the data box through a portal provided by the service provider or through a client.
5. The data box system for exchanging data, acquiring and sensing services according to claim 1 or 4, wherein: all clients capable of accessing the data box can exchange data, acquire and sense services with the data box, and the clients are systems, software or programs.
6. The data box system for exchanging data, acquiring and sensing services according to claim 1, wherein: the data box system provides a directory describing services for each data box.
7. The data box system for exchanging data, acquiring and sensing services according to claim 6, wherein: the service is a service program provided by the data box system together with other systems, software or programs.
8. The data box system for exchanging data, acquiring and sensing services according to claim 7, wherein: the service program is extended or hung on the data box through the adapter, and is configured or dynamically registered on the directory of the data box description service.
9. Data box system for exchanging data, acquiring and perceiving services according to claim 6 or 7 or 8, characterized in that: the service comprises the following steps: mailbox service, message service, chat or message service, status notification service, data management and statistical analysis or chart service, e-commerce or shopping or group purchase service, online survey service, question and answer service, web navigation service, web disk or archive service, document service, file service such as format conversion or compression or download or thumbnail, data sharing service such as page or component or application or file or album, subscription and publication service such as RSS, advertisement service, blog or microblog service, encyclopedia service, post service, forum service, social networking service such as chat and friend-making, video and audio service, financial or news information service, pictorial service, dictionary service, translation service, hosting service, directory service, public service such as seeker or donation, online intermediary and rental service, game service, cooperative office management service, cooperative development service, web service, The system comprises one or more of remote control service, mobile phone or short message or multimedia message or address book or voice or office service, photographing service, voice service, comment and comment service, template service, consultation or design or car sharing or lottery or charging or repayment or payment living service, printing service, online payment service, business machine service, antivirus service, search service, desktop service, travel plan or CRM or purchase and stock cloud application service, remote education service, remote conference service, remote medical service, voice mailbox service, computing service, storage service, sensor service, map and satellite remote sensing service, location service, virtual reality service and augmented reality service.
10. Data box system for exchanging data, acquiring and perceiving services according to claim 6 or 7 or 8, characterized in that: the expansion format of the data box address is data box address/service name/sub-service name/…, and the data box system quickly locates the service program to process the request according to the expansion format of the data box address.
11. The data box system for exchanging data, acquiring and sensing services according to claim 1, wherein: the data of one request and response in the data box is called a data piece, and the data box system packages and stores the data of each transmission and response into the data piece according to the format.
12. The data box system for exchanging data, acquiring and sensing services of claim 11, wherein: one data element is composed of two parts of data for transmitting and responding, the data content of the two parts comprises one or more of directory service Services, data Message related to the service, data UI related to the UI interface, or none of the two parts, and the data content of the responding part comprises data of Status describing the responding state.
13. The method of using a data box system for exchanging data, acquiring and sensing services as claimed in claim 1, wherein: the method comprises the following steps:
1. a user logs in a data box of the user or passes through a client, and the user comprises a service provider;
2. the user specifies the address of the data box of the other party, wherein the other party refers to the user, other users or a service provider;
3. the data box system or the client where the user data box is located analyzes the address of the data box of the opposite side, is connected with the data box system where the data box of the opposite side is located, and sends a service request, and meanwhile, if the data box system or the client where the user data box is located has a function of locally storing data pieces, the data of the service request can be stored in the data box or the client of the user locally;
4. after receiving the request, the data box system of the opposite side data box firstly confirms whether the received data box address is correct and whether the identity of the user is valid or credible, and if the identity is invalid or credible, whether the response is refused is selected according to a strategy; receiving the data of the service request and storing the data in a data box; the data box system of the opposite side data box judges whether the data box system provides service programs for the service requests, if so, the service programs are operated for processing, and data describing response state, directory service, processing result, Ui and the like are responded to the data box system of the data box, and if not, the data describing response state, directory service, UI and the like are directly responded to the data box system or client side of the user data box; a data box; the response data is also stored in the other side data box;
5. and the data box system or the client where the user data box is located receives the response data, and meanwhile, if the data box system or the client where the user data box is located has a function of locally storing the data piece, the response data is stored in the corresponding data piece, namely, the process of completing the request and the response is shown.
14. The method of using a data box system for exchanging data, acquiring and sensing services according to claim 13, wherein: the data box system marks whether the identity of the sender is valid or credible for the data piece, and the user can check and manage the data piece in the data box.
15. The method of using a data box system for exchanging data, acquiring and sensing services according to claim 13, wherein: the data box system or client may provide a UI interface for the user to further select services and to correlate the returned processing results data.
16. The method of using a data box system for exchanging data, acquiring and sensing services according to claim 13, wherein: if the data element contains Services, Ui and other data, or the data box system provides a Ui program for the data format, the user may perform step 2-5 to start running again according to the Ui interface of the directory service and data, where the address of the data box specified in step 2 may be in an extended format with a service name.
17. The method of using a data box system for exchanging data, acquiring and sensing services according to claim 13, wherein: the step 2 comprises the following steps: 1) a user specifies an account number on a trust service provider of an opposite party; 2) a data box system or a client where a user data box is located sends a request for searching a data box address bound by an opposite account to a trust service provider; 3) and after the data box address bound by the opposite account is acquired, the default specified data box address of the opposite account is used, or the user directly selects the data box address.
18. The method of using a data box system for exchanging data, acquiring and sensing services according to claim 13, wherein: the client can access the address of the data box of the opposite side under the condition of no login, the data box system where the data box of the opposite side is located directly confirms that the identity of the sender is unknown or untrustworthy after receiving the request, and whether the response is rejected is selected according to the strategy.
19. The method of using a data box system for exchanging data, acquiring and sensing services according to claim 13, wherein: the client side can use a trust token generated by the data box system where the user is located and the data box system of the other side for user contract or dynamic interaction, when the client side holds the trust token to access the data box of the other side, the trust token can indicate the identity of the data box owned by the user, and the trust token is a certificate issued by the data box system where the user is located and the data box system of the other side together, or a password, or a specific session cookie value.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310410658.5A CN103442084B (en) | 2013-09-10 | 2013-09-10 | Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system |
PCT/CN2014/086202 WO2015035907A1 (en) | 2013-09-10 | 2014-09-10 | Databox system for data exchanges and service acquirement and sensing, and operation method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310410658.5A CN103442084B (en) | 2013-09-10 | 2013-09-10 | Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103442084A true CN103442084A (en) | 2013-12-11 |
CN103442084B CN103442084B (en) | 2017-02-22 |
Family
ID=49695749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310410658.5A Active CN103442084B (en) | 2013-09-10 | 2013-09-10 | Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103442084B (en) |
WO (1) | WO2015035907A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015035907A1 (en) * | 2013-09-10 | 2015-03-19 | 杭州万格网络科技有限公司 | Databox system for data exchanges and service acquirement and sensing, and operation method thereof |
CN106911797A (en) * | 2017-04-01 | 2017-06-30 | 成都你我他科技有限公司 | A kind of server of social gaming dating site |
CN107403398A (en) * | 2017-07-18 | 2017-11-28 | 广州市沃迩德文化教育咨询服务有限公司 | A kind of English education internet platform and its application method |
CN108600223A (en) * | 2018-04-24 | 2018-09-28 | 四川精工伟达智能技术股份有限公司 | Identification device, method based on NB-IoT networks and storage medium |
CN108833553A (en) * | 2018-06-21 | 2018-11-16 | 郑州云海信息技术有限公司 | Catalogue processing method and relevant device |
CN111917632A (en) * | 2020-07-31 | 2020-11-10 | 北京明朝万达科技股份有限公司 | Method and device for analyzing mail, nonvolatile storage medium and electronic device |
CN113360206A (en) * | 2021-05-31 | 2021-09-07 | 珠海大横琴科技发展有限公司 | Data processing method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1361609A (en) * | 2000-12-28 | 2002-07-31 | 廖建克 | Network data exchange method and system |
US20080270559A1 (en) * | 2005-12-21 | 2008-10-30 | Nxp B.V. | Mobile Device and Method for Sending a Message from a Mobile Device |
CN101447999A (en) * | 2008-10-31 | 2009-06-03 | 神州数码金程(北京)科技有限公司 | Security exchange system and realization method thereof |
CN101588308A (en) * | 2008-05-23 | 2009-11-25 | 国际商业机器公司 | Method and device for sharing data through emails |
CN101964739A (en) * | 2009-07-22 | 2011-02-02 | 中国移动通信集团公司 | Data transmission method, device and system |
CN103152249A (en) * | 2013-03-27 | 2013-06-12 | 李良 | Method and system for realizing mail receiving and sending and instant communication functions at clients |
US20130212194A1 (en) * | 2010-04-15 | 2013-08-15 | Australian Postal Corporation | Communication system and method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE602005000990T2 (en) * | 2005-03-17 | 2008-01-17 | Alcatel Lucent | Procedure for exchanging data packets |
CN102904796B (en) * | 2012-09-12 | 2014-07-09 | 盈世信息科技(北京)有限公司 | Mailbox sharing method and mail server |
CN103442084B (en) * | 2013-09-10 | 2017-02-22 | 杭州万格网络科技有限公司 | Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system |
-
2013
- 2013-09-10 CN CN201310410658.5A patent/CN103442084B/en active Active
-
2014
- 2014-09-10 WO PCT/CN2014/086202 patent/WO2015035907A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1361609A (en) * | 2000-12-28 | 2002-07-31 | 廖建克 | Network data exchange method and system |
US20080270559A1 (en) * | 2005-12-21 | 2008-10-30 | Nxp B.V. | Mobile Device and Method for Sending a Message from a Mobile Device |
CN101588308A (en) * | 2008-05-23 | 2009-11-25 | 国际商业机器公司 | Method and device for sharing data through emails |
CN101447999A (en) * | 2008-10-31 | 2009-06-03 | 神州数码金程(北京)科技有限公司 | Security exchange system and realization method thereof |
CN101964739A (en) * | 2009-07-22 | 2011-02-02 | 中国移动通信集团公司 | Data transmission method, device and system |
US20130212194A1 (en) * | 2010-04-15 | 2013-08-15 | Australian Postal Corporation | Communication system and method |
CN103152249A (en) * | 2013-03-27 | 2013-06-12 | 李良 | Method and system for realizing mail receiving and sending and instant communication functions at clients |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015035907A1 (en) * | 2013-09-10 | 2015-03-19 | 杭州万格网络科技有限公司 | Databox system for data exchanges and service acquirement and sensing, and operation method thereof |
CN106911797A (en) * | 2017-04-01 | 2017-06-30 | 成都你我他科技有限公司 | A kind of server of social gaming dating site |
CN107403398A (en) * | 2017-07-18 | 2017-11-28 | 广州市沃迩德文化教育咨询服务有限公司 | A kind of English education internet platform and its application method |
CN108600223A (en) * | 2018-04-24 | 2018-09-28 | 四川精工伟达智能技术股份有限公司 | Identification device, method based on NB-IoT networks and storage medium |
CN108833553A (en) * | 2018-06-21 | 2018-11-16 | 郑州云海信息技术有限公司 | Catalogue processing method and relevant device |
CN111917632A (en) * | 2020-07-31 | 2020-11-10 | 北京明朝万达科技股份有限公司 | Method and device for analyzing mail, nonvolatile storage medium and electronic device |
CN113360206A (en) * | 2021-05-31 | 2021-09-07 | 珠海大横琴科技发展有限公司 | Data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2015035907A1 (en) | 2015-03-19 |
CN103442084B (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103442084B (en) | Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system | |
JP6754809B2 (en) | Use credentials stored in different directories to access a common endpoint | |
US9043886B2 (en) | Relying party platform/framework for access management infrastructures | |
US7346923B2 (en) | Federated identity management within a distributed portal server | |
KR102205941B1 (en) | Actively federated mobile authentication | |
CN100568256C (en) | The method that is used for runtime user account creation operation | |
US8751586B2 (en) | Domain name control based social website account authentication | |
US7971060B2 (en) | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems | |
US8412156B2 (en) | Managing automatic log in to internet target resources | |
CN101127108B (en) | Method for accessing a information source via a computer system | |
US20130179941A1 (en) | Identifying guests in web meetings | |
US20120291109A1 (en) | User information utilization system, device, method, and program | |
US20110055911A1 (en) | Business validation based social website account authentication | |
KR20010085380A (en) | System and method of associating devices to secure commercial transactions performed over the internet | |
US11936639B2 (en) | Using client certificates to communicate trusted information | |
JP2015529905A (en) | Authorization method, apparatus, and system | |
WO2006118558A1 (en) | Method and system for connecting users | |
JP2005538434A (en) | Method and system for user-based authentication in a federated environment | |
TW200810460A (en) | Authentication of a principal in a federation | |
US20070174193A1 (en) | System and method for providing single sign-on functionality | |
CN113922982B (en) | Login method, electronic equipment and computer readable storage medium | |
US20160094528A1 (en) | Authenticating Redirection Service | |
US7519812B2 (en) | Architecture and design for central authentication and authorization in an on-demand utility environment | |
US9094391B2 (en) | Dynamic trust federation | |
CN111008888A (en) | Electricity selling platform management system based on master control service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |