CN105407097B - Based on third-party data furnishing method and device - Google Patents

Based on third-party data furnishing method and device Download PDF

Info

Publication number
CN105407097B
CN105407097B CN201510844397.7A CN201510844397A CN105407097B CN 105407097 B CN105407097 B CN 105407097B CN 201510844397 A CN201510844397 A CN 201510844397A CN 105407097 B CN105407097 B CN 105407097B
Authority
CN
China
Prior art keywords
data
party
request
information
home
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510844397.7A
Other languages
Chinese (zh)
Other versions
CN105407097A (en
Inventor
汤奇峰
王臻培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZAMPLUS ADVERTISING (SHANGHAI) CO Ltd
Original Assignee
ZAMPLUS ADVERTISING (SHANGHAI) CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZAMPLUS ADVERTISING (SHANGHAI) CO Ltd filed Critical ZAMPLUS ADVERTISING (SHANGHAI) CO Ltd
Priority to CN201510844397.7A priority Critical patent/CN105407097B/en
Publication of CN105407097A publication Critical patent/CN105407097A/en
Application granted granted Critical
Publication of CN105407097B publication Critical patent/CN105407097B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Abstract

One kind being based on third-party data furnishing method and device, includes: the data inquiry request for receiving party in request based on third-party data furnishing method, the data inquiry request includes the first id information of the data for supplier's data to be transmitted to party in request;ID mapping is carried out according to first id information, obtains the second id information of the data;The data of the supplier are called according to second id information;The data are encrypted;The encrypted data and first id information are sent to the party in request after home-delivery center's cache key.It is described to be based on third-party data furnishing method and device, the safety of supplier and the transmission of party in request's data among systems are improved, and expand the range that data are transmitted between supplier and demand method, system.

Description

Based on third-party data furnishing method and device
Technical field
The present invention relates to Internet technical fields, more particularly to one kind to be based on third-party data furnishing method and device.
Background technique
With being continuously increased for information sharing demand, the interaction and data transmission between original each system are more and more necessary.? Between large-scale distributed application system in data transmission procedure, the uniformity of safety and data standard is to influence big data supply With the key factor of transmission.And in the current social situation, every profession and trade, department are in development system all seldom in view of whole Thus planning problem causes to lack unified data standard between each system.
In the prior art, in order to make smoothly realize information sharing between not homologous ray, realize that information is total between system The mode enjoyed is, between the application systems such as local area network, intranet, usually between the two systems, using the independent number of exploitation Data transmission is completed according to transfer program and is shared.Data transmission system is write according to the demand and feature of respective application system Dedicated transmitting software develops individual data distributing program, keeps application system compatible.When each application system networking transport data When, point-to-point data transmission is carried out using respectively different transmission and secure certification architecture.
But data transmission method in the prior art, it individually develops program and causes implementation close with service logic Binding, the system degree of coupling is high, and transmission demand consideration is relatively simple, does not have generally applicable ability;In addition, when system transmits data Using point-to-point connection, not only increases a large amount of exploitation and co-ordination, increase the complexity and unstability of system, reduce Data transmission security is low, and causes data transmission difficult.
Summary of the invention
Present invention solves the technical problem that being how to improve the safety of inter-system data transmission, expand the suitable of data transmission Use range.
In order to solve the above technical problems, the embodiment of the present invention, which provides one kind, is based on third-party data furnishing method, it is described Include: based on third-party data furnishing method
The data inquiry request of party in request is received, the data inquiry request includes the first id information of the data;
ID mapping is carried out according to first id information, obtains the second id information of the data;
The data of the supplier are called according to second id information;
The data are encrypted;
The encrypted data and first id information are sent to the need after home-delivery center's cache key The side of asking.
Optionally, after the data inquiry request for receiving party in request, further includes: verify ordering for the data inquiry request The ID of single ID and the party in request;Verify the IP of the party in request and the white list IP of the home-delivery center.
Optionally, described to be based on third-party data furnishing method further include: the party in request receives encrypted institute After stating data, confirmation message is sent to the home-delivery center.
Optionally, described to be based on third-party data furnishing method further include: the home-delivery center receives the confirmation After information, by the cipher key delivery to the party in request;After the party in request receives the key, decrypted according to the key The data.
Optionally, described to be based on third-party data furnishing method further include: to record the data inquiry request and described Send the number of confirmation message.
Optionally, after the data that the supplier is called according to second id information, the data are deposited Storage is in NoSQL database.
Optionally, described to encrypt the data, comprising: by the data by agreement key and random key into The secondary encryption of row.
In order to solve the above technical problems, the embodiment of the invention also discloses one kind to be based on third-party data feeding mechanism, Including supplier, party in request and home-delivery center, the home-delivery center includes:
First interface, suitable for the transmission of communication and data between the home-delivery center and the party in request, the data are looked into Asking request includes the first id information;
Map unit is suitable for carrying out ID mapping according to first id information, obtains the second id information;
Call unit calls the data of the supplier according to second id information;
Second interface, the transmission suitable for data between the home-delivery center and the supplier;
Encryption unit, suitable for encrypting the data.
Optionally, described to be based on third-party data feeding mechanism further include: authentication unit is looked into suitable for verifying the data Ask the order ID of request and the ID of the party in request;Verify the IP of the party in request and the white list IP of the home-delivery center.
Optionally, after the party in request receives the encrypted data, confirmation message is sent to the home-delivery center; After the home-delivery center receives the confirmation message, by cipher key delivery to the party in request;The party in request receives described After key, the data are decrypted according to the key.
Optionally, described to be based on third-party data feeding mechanism further include: statistic unit records the data query and asks The number for the transmission confirmation message of summing.
Compared with prior art, the technical solution of the embodiment of the present invention has the advantages that
For the embodiment of the present invention by the data inquiry request of reception party in request, the data inquiry request includes that the first ID believes Breath;ID mapping is carried out according to first id information, obtains the second id information;The supply is called according to second id information The data of side;The data are encrypted, and the encrypted data and first id information are passed through into home-delivery center The party in request is sent to after caching.Pass through home-delivery center supplier according to first id information progress ID invoking upon mapping Data, and the encrypted data are sent to the party in request, improve supplier and party in request's data among systems The safety of transmission, and expand the range that data are transmitted between supplier and demand method, system.
Detailed description of the invention
Fig. 1 is a kind of tripartite's data supply schematic diagram of the embodiment of the present invention;
Fig. 2 is that one kind of the embodiment of the present invention is based on third-party data furnishing method flow chart;
Fig. 3 is that another kind of the embodiment of the present invention is based on third-party data furnishing method flow chart;
Fig. 4 is that one kind of the embodiment of the present invention is based on third-party data feeding mechanism structural schematic diagram.
Specific embodiment
As described in the background art, data transmission method in the prior art, individually develop program cause implementation with Service logic tight binding, the system degree of coupling is high, and transmission demand consideration is relatively simple, does not have generally applicable ability;In addition, being Using excessive point-to-point connection when system transmission data, not only increases a large amount of exploitation and co-ordination, increase answering for system It is low to reduce data transmission security for polygamy and unstability, and cause data transmission difficult.
For the embodiment of the present invention by the data inquiry request of reception party in request, the data inquiry request includes that the first ID believes Breath;ID mapping is carried out according to first id information, obtains the second id information;The supply is called according to second id information The data of side;The data are encrypted, and the encrypted data and first id information are passed through into home-delivery center The party in request is sent to after caching.Pass through home-delivery center supplier according to first id information progress ID invoking upon mapping Data, and the encrypted data are sent to the party in request, improve supplier and party in request's data among systems The safety of transmission, and expand the range that data are transmitted between supplier and demand method, system.
To make the above purposes, features and advantages of the invention more obvious and understandable, with reference to the accompanying drawing to the present invention Specific embodiment be described in detail.
Fig. 1 is a kind of tripartite's data supply schematic diagram of the embodiment of the present invention.
Fig. 1 is please referred to, the tripartite includes supplier 101, home-delivery center 102 and party in request 103.Supplier 101 prepares The data of supply, and supply data are stored to database, the data volume that the type of the database is supplied according to supplier 101 Size and business size determine.It wherein, include the relevant id information of data in the supply data that supplier 101 provides.
Database described in 101 scheduled maintenance update of supplier keeps the validity for the data supplied in database;Wherein, The validity of the data of supply is determined according to the type of service of supplier 101.Home-delivery center 102 is established by query service interface Communication between database, inquiry or the data for calling supplier 101 to supply, and the data query of side 103 is asked according to demand It asks, data will be supplied accordingly in database and are transmitted to party in request 103.
In the present embodiment, the query service interface can be based on hypertext transfer protocol (Hyper Text Transfer Protocol, HTTP) definition use, it is also possible to be defined based on any other enforceable agreement.
In the present embodiment, home-delivery center 102 is data transfer platform, and home-delivery center 102 formulates data transmission standard, can be with Compatible every profession and trade, the data of the various formats of department expand the model of supplier 101 and the transmission of 103 data among systems of party in request It encloses.
Fig. 2 is that one kind of the embodiment of the present invention is based on third-party data furnishing method flow chart.
Referring to figure 2., together referring to Fig.1, described to include: based on third-party data furnishing method
Step S201 receives the data inquiry request of party in request.
In the present embodiment, the data according to needed for itself of party in request 103 send data inquiry request, the data inquiry request The first id information including the data;First id information can be the cookie ID of data inquiry request;Party in request Data needed for 103 include at least two identity (Identity, ID) information associated with the data, and the first id information is wherein A kind of id information, the second id information are the relevant another id information of data needed for party in request 103;Home-delivery center 102, which receives, to be needed The data inquiry request of the side of asking 103.
In the present embodiment, home-delivery center 102 records the number that party in request 103 sends the data inquiry request.
Step S202 carries out ID mapping according to the first id information, obtains the second id information of the data.
In the present embodiment, home-delivery center 102 according in data inquiry request the first id information carry out ID mapping, obtain with Relevant second id information of data needed for party in request 103, the second id information are at least one related to data needed for party in request 103 Id information.
In specific implementation, the mapping relations of the first id information and the second id information are defined and stored in by home-delivery center 102 In database.After home-delivery center 102 receives the data inquiry request of party in request 103, the first id information is extracted, is closed according to mapping System finds associated second id information list.
In specific implementation, the data of the supplier 101 are stored in the database NoSQL database of non-relational, It can be Redis database.Redis database is a kind of key assignments (key-value) database, and data are memory storage, is only existed It is written when necessary, fast response time;Support the complex operations in numerous types of data and various data types.In Redis number According in library, the data are stored by first id information and the second id information.
In specific implementation, after data are stored in Redis database by supplier 101, home-delivery center 102 defines the first id information Key with the second id information as Redis database.It, will be in hash structure using the hash data structure of Redis database Key is set as the first ID, is worth for the 2nd ID.After the data inquiry request that home-delivery center 102 receives party in request 103, first is extracted Id information inquires key assignments, i.e. the second id information using the first id information as key.
Step S203 calls the data of supplier according to the second id information.
In the present embodiment, after home-delivery center 102 obtains the second id information, supplier 101 is transferred according to the second id information and is mentioned The data of second id information association attributes in the data of confession, and the second id information of data of the second id information association attributes is related In the data deposit database of attribute.
Step S204 encrypts the data.
In the present embodiment, the data are carried out secondary encryption by agreement key and random key by home-delivery center 102, really Protect the safety of data transmission procedure.
In the present embodiment, agreement key is supplier 101 and the party in request 103 lower key arranged online, and agreement key can Think arbitrary string, the length for arranging key is 8~16 characters;Random key is the key that supplier 101 provides, with secret Key can be arbitrary string, and the length of random key is 8~16 characters.Wherein, each query calls of home-delivery center 102 are supplied When the data of side 101, random key can be randomly generated in supplier 101.
In specific implementation, home-delivery center 102 passes through agreement key and random using Blowfish-PKCS and Base64 algorithm Key pair transmission data are encrypted.
The encrypted data are sent to the demand after home-delivery center caches random key by step S205 Side.
In the present embodiment, data needed for party in request 103 are transmitted to by party in request 103, required number according to data inquiry request According to including encrypted data and first id information.
In the present embodiment, after the party in request 103 receives the encrypted data, sends confirmation message and match to described Send center 102.After the home-delivery center 102 receives the confirmation message, the random key is transmitted to the party in request 103;After the party in request 103 receives the random key, the data 102 are decrypted according to the random key.
It is understood that the key is random key.
In the present embodiment, home-delivery center 102 records the number that party in request 103 sends confirmation message.Pass through the data of record Inquiry request number and confirmation message number unite to data Successful transmissions number between party in request 103 and supplier 101 Meter, to carry out the business operation of next step.
The embodiment of the present invention passes through home-delivery center supplier's according to first id information progress ID invoking upon mapping Data, and the encrypted data are sent to the party in request, it improves supplier and party in request's data among systems passes Defeated safety, and expand the range of supplier and the transmission of party in request's data among systems.
Fig. 3 is that another kind of the embodiment of the present invention is based on third-party data furnishing method flow chart.
Referring to figure 3., together referring to Fig.1, described to include: based on third-party data furnishing method
Step S301 receives the data inquiry request of party in request.
Step S302, the order ID of verify data inquiry request and the ID of party in request;In the IP and dispatching for verifying party in request The white list IP of the heart.
In the present embodiment, party in request 103 needs when carrying out the transmission of data using home-delivery center 102 and supplier 101 It is registered in home-delivery center 102, obtains account ID;It include the account ID information of party in request 103 in the data inquiry request, That is order ID.After home-delivery center 102 receives the data inquiry request of party in request 103, needing to verify the order ID for sending and requesting is It is no be party in request 103 account ID it is consistent, avoid the account ID of party in request 103 from being used by malice string;If party in request 103 had bad Record, then address Internet protocol (Internet Protocol.IP) of party in request 103 can be pulled in black name by home-delivery center It is single;After home-delivery center 102 receives the data inquiry request of party in request 103, whether the IP address for needing to verify party in request 103 is matching It send in the IP address white list at center 102, guarantees the safety of data transmission.It is verified after all passing through twice, enters step S303.
Step S303 carries out ID mapping according to the first id information, obtains the second id information of data.
Step S304 calls the data of supplier according to the second id information.
Step S305 encrypts the data.
Step S306 sends the encrypted data and first id information after home-delivery center's cache key To the party in request.
Step S307 after party in request receives encrypted data, sends confirmation message to home-delivery center.
In the present embodiment, the confirmation message indicates that party in request 103 has received the data of the transmission of home-delivery center 102.But The key of only having an agreement of party in request 103 without random key can not decrypt the data at this time.
Random key after home-delivery center receives confirmation message, is transmitted to party in request, party in request receives by step S308 Ciphertext data after the random key.
In the present embodiment, home-delivery center 102 determines that data have been transferred to party in request 103 after receiving confirmation message, And the random key of caching is sent to party in request 103.After the data are decrypted by the random key by party in request 103, Primary data between supplier 101 and party in request 103 are transmitted.
The present embodiment ensure that the safety of data transmission, prevented by data discord random key simultaneous transmission It loses in data transmission procedure, is utilized after the decryption of other parties in request.
Step S309, record data inquiry request and the number for sending confirmation message.
The present embodiment passes through the data inquiry request number and confirmation message number of record, to party in request 103 and supplier Data Successful transmissions number is counted between 101, to carry out the business operation of next step.
Specific embodiment can refer to aforementioned corresponding embodiment, and details are not described herein again.
Fig. 4 is that one kind of the embodiment of the present invention is based on third-party data feeding mechanism structural schematic diagram.
Referring to figure 4., together referring to Fig.1, described to include: based on third-party data feeding mechanism 40
Supplier 101, home-delivery center 102 and party in request 103.
Home-delivery center 102 includes: first interface 401, suitable for communicating sum number between the home-delivery center and the party in request According to transmission, the data inquiry request include the first id information.
In the present embodiment, party in request 103 and home-delivery center 102 pass through the progress data inquiry request sum number of first interface 401 According to transmission.
Map unit 402 is suitable for carrying out ID mapping according to first id information, obtains the second id information.
Call unit 403 calls the data of the supplier according to second id information.
Second interface 404, the transmission suitable for data between the home-delivery center and the supplier.
In the present embodiment, supplier 101 and home-delivery center 102 pass through the transmission that second interface 404 carries out data.
Encryption unit 405, suitable for encrypting the data.
Authentication unit 406, suitable for verifying the order ID of the data inquiry request and the ID of the party in request;Described in verifying The white list IP of the IP of party in request and the home-delivery center.
In the present embodiment, after the party in request 103 receives the encrypted data, sent by first interface 401 Confirmation message is to the home-delivery center 102;After the home-delivery center 102 receives the confirmation message, crossing first interface 401 will Random key is transmitted to the party in request 103;After the party in request 103 receives the random key, according to the key solution The close data 102.
Statistic unit 407, suitable for recording the data inquiry request and the number for sending confirmation message.
Specific embodiment can refer to aforementioned corresponding embodiment, and details are not described herein again.
In the embodiment of the present invention, a supplier and party in request can be configured based on third-party data feeding mechanism 40, A supplier and multiple parties in request, multiple suppliers and single party in request and multiple suppliers and multiple need can also be configured The side of asking does the adjustment of adaptability according to actual application environment.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in computer readable storage medium, and storage is situated between Matter may include: ROM, RAM, disk or CD etc..
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute Subject to the range of restriction.

Claims (11)

1. one kind is based on third-party data furnishing method, for supplier's data to be transmitted to party in request, which is characterized in that packet It includes:
The data inquiry request of party in request is received, the data inquiry request includes the first id information of the data;
ID mapping is carried out according to first id information, obtains the second id information of the data, home-delivery center is by Redis data Key in the hash structure in library is set as first id information, is worth for second id information, is made using first id information For key, key assignments is inquired, to obtain second id information;
The data of the supplier are called according to second id information, the data of the supplier are stored in described In Redis database;
The data are encrypted;
The encrypted data and first id information are sent to the party in request after home-delivery center's cache key.
2. according to claim 1 be based on third-party data furnishing method, which is characterized in that the reception party in request After data inquiry request, further includes: verify the order ID of the data inquiry request and the ID of the party in request;Verify the need The white list IP of the IP for the side of asking and the home-delivery center.
3. according to claim 1 be based on third-party data furnishing method, which is characterized in that further include: the demand After side receives the encrypted data, confirmation message is sent to the home-delivery center.
4. according to claim 3 be based on third-party data furnishing method, which is characterized in that further include: the dispatching After center receives the confirmation message, by the cipher key delivery to the party in request;The party in request receives the key Afterwards, the data are decrypted according to the key.
5. according to claim 4 be based on third-party data furnishing method, which is characterized in that further include: described in record Data inquiry request and the number for sending confirmation message.
6. according to claim 1 be based on third-party data furnishing method, which is characterized in that believed according to the 2nd ID After breath calls the data of the supplier, NoSQL database is stored the data in.
7. it is according to claim 1 be based on third-party data furnishing method, which is characterized in that it is described by the data into Row encryption, comprising: the data are subjected to secondary encryption by agreement key and random key.
8. one kind is based on third-party data feeding mechanism, including supplier, party in request and home-delivery center, which is characterized in that institute Stating home-delivery center includes:
First interface, suitable for the transmission of communication and data between the home-delivery center and the party in request, data inquiry request packet Include the first id information;
Map unit is suitable for carrying out ID mapping according to first id information, obtains the second id information, and home-delivery center is by Redis Key in the hash structure of database is set as first id information, is worth for second id information, is believed using the first ID Breath is used as key, key assignments is inquired, to obtain second id information;
Call unit calls the data of the supplier, the data storage of the supplier according to second id information In the Redis database;
Second interface, the transmission suitable for data between the home-delivery center and the supplier;
Encryption unit, suitable for encrypting the data.
9. according to claim 8 be based on third-party data feeding mechanism, which is characterized in that further include: authentication unit, Suitable for verifying the order ID of the data inquiry request and the ID of the party in request;Verify the party in request IP and the dispatching The white list IP at center.
10. according to claim 8 be based on third-party data feeding mechanism, which is characterized in that the party in request receives To after the encrypted data, confirmation message is sent to the home-delivery center;The home-delivery center receives the confirmation letter After breath, by cipher key delivery to the party in request;After the party in request receives the key, the number is decrypted according to the key According to.
11. according to claim 10 be based on third-party data feeding mechanism, which is characterized in that further include: statistics is single Member records the data inquiry request and sends the number of the confirmation message.
CN201510844397.7A 2015-11-26 2015-11-26 Based on third-party data furnishing method and device Active CN105407097B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510844397.7A CN105407097B (en) 2015-11-26 2015-11-26 Based on third-party data furnishing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510844397.7A CN105407097B (en) 2015-11-26 2015-11-26 Based on third-party data furnishing method and device

Publications (2)

Publication Number Publication Date
CN105407097A CN105407097A (en) 2016-03-16
CN105407097B true CN105407097B (en) 2019-07-19

Family

ID=55472352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510844397.7A Active CN105407097B (en) 2015-11-26 2015-11-26 Based on third-party data furnishing method and device

Country Status (1)

Country Link
CN (1) CN105407097B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107045480A (en) * 2016-02-05 2017-08-15 北京京东尚科信息技术有限公司 The method and apparatus that buffer memory is read and write based on Spring expression languages
CN106713295B (en) * 2016-12-15 2019-12-10 杭州卓健信息科技有限公司 Medical image transmission method and device
CN106802926B (en) * 2016-12-21 2019-11-22 上海数据交易中心有限公司 A kind of multiparty data inquiry system and method
CN107040519B (en) * 2017-03-10 2021-01-19 上海数据交易中心有限公司 Data circulation method, device and system
CN107025591A (en) * 2017-03-21 2017-08-08 天津数集科技有限公司 Data trade platform
CN107193963B (en) * 2017-05-24 2020-04-21 中国人民解放军陆军勤务学院 Distributed development method of database application system
CN107729460A (en) * 2017-09-30 2018-02-23 上海数据交易中心有限公司 Data query method and device, storage medium, terminal
CN109088734B (en) * 2018-09-17 2022-04-12 广州推点科技发展有限公司 Coding method and system
CN110225052A (en) * 2019-06-20 2019-09-10 上海数据交易中心有限公司 Data distribution method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409706A (en) * 2007-10-09 2009-04-15 华为技术有限公司 Method, system and relevant equipment for distributing data of edge network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905526A (en) * 2014-03-05 2014-07-02 深圳市同洲电子股份有限公司 Dispatching method and server
CN104158827B (en) * 2014-09-04 2018-07-31 中电长城网际系统应用有限公司 Ciphertext data sharing method, device, inquiry server and upload data client

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409706A (en) * 2007-10-09 2009-04-15 华为技术有限公司 Method, system and relevant equipment for distributing data of edge network

Also Published As

Publication number Publication date
CN105407097A (en) 2016-03-16

Similar Documents

Publication Publication Date Title
CN105407097B (en) Based on third-party data furnishing method and device
AU2018348322B2 (en) Asymmetric key management in consortium blockchain networks
CN106503098B (en) Block chain cloud service framework system built in Paas service layer
CN111600908B (en) Data processing method, system, computer device and readable storage medium
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
US11676133B2 (en) Method and system for mobile cryptocurrency wallet connectivity
CN104917741B (en) A kind of plain text document public network secure transmission system based on USBKEY
CN105593871A (en) Attribute information providing method, and attribute information providing system
US9967091B2 (en) Method for enhancing security in distributed systems
CN110266817A (en) Across channel data sharing model, sharing method and device based on block chain
CN109995530B (en) Safe distributed database interaction system suitable for mobile positioning system
CN109800588A (en) Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN111865609A (en) Private cloud platform data encryption and decryption system based on state cryptographic algorithm
CN109257347A (en) Communication means and relevant apparatus, storage medium suitable for data interaction between bank
US20230029087A1 (en) Systems and methods for managing secure sharing of online data
US11569989B2 (en) Blockchain system for hardening quantum computing security
CN106411504A (en) Data encryption system, method and apparatus
CN110381012A (en) For promoting the method and system of the broadcast of encryption data
CN107124409A (en) A kind of access authentication method and device
US20200175505A1 (en) System and method for creating a secure mesh network utilizing the blockchain
CN114244851B (en) Block chain-based data distribution method
CN115567312A (en) Alliance chain data authority management system and method capable of meeting multiple scenes
CN108809631B (en) Quantum key service management system and method
CN109740319A (en) Digital identity verification method and server
KR102298716B1 (en) Communication node, method of operating thereof and collaborative system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant