CN105407097B - Based on third-party data furnishing method and device - Google Patents
Based on third-party data furnishing method and device Download PDFInfo
- Publication number
- CN105407097B CN105407097B CN201510844397.7A CN201510844397A CN105407097B CN 105407097 B CN105407097 B CN 105407097B CN 201510844397 A CN201510844397 A CN 201510844397A CN 105407097 B CN105407097 B CN 105407097B
- Authority
- CN
- China
- Prior art keywords
- data
- party
- request
- information
- home
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Abstract
One kind being based on third-party data furnishing method and device, includes: the data inquiry request for receiving party in request based on third-party data furnishing method, the data inquiry request includes the first id information of the data for supplier's data to be transmitted to party in request;ID mapping is carried out according to first id information, obtains the second id information of the data;The data of the supplier are called according to second id information;The data are encrypted;The encrypted data and first id information are sent to the party in request after home-delivery center's cache key.It is described to be based on third-party data furnishing method and device, the safety of supplier and the transmission of party in request's data among systems are improved, and expand the range that data are transmitted between supplier and demand method, system.
Description
Technical field
The present invention relates to Internet technical fields, more particularly to one kind to be based on third-party data furnishing method and device.
Background technique
With being continuously increased for information sharing demand, the interaction and data transmission between original each system are more and more necessary.?
Between large-scale distributed application system in data transmission procedure, the uniformity of safety and data standard is to influence big data supply
With the key factor of transmission.And in the current social situation, every profession and trade, department are in development system all seldom in view of whole
Thus planning problem causes to lack unified data standard between each system.
In the prior art, in order to make smoothly realize information sharing between not homologous ray, realize that information is total between system
The mode enjoyed is, between the application systems such as local area network, intranet, usually between the two systems, using the independent number of exploitation
Data transmission is completed according to transfer program and is shared.Data transmission system is write according to the demand and feature of respective application system
Dedicated transmitting software develops individual data distributing program, keeps application system compatible.When each application system networking transport data
When, point-to-point data transmission is carried out using respectively different transmission and secure certification architecture.
But data transmission method in the prior art, it individually develops program and causes implementation close with service logic
Binding, the system degree of coupling is high, and transmission demand consideration is relatively simple, does not have generally applicable ability;In addition, when system transmits data
Using point-to-point connection, not only increases a large amount of exploitation and co-ordination, increase the complexity and unstability of system, reduce
Data transmission security is low, and causes data transmission difficult.
Summary of the invention
Present invention solves the technical problem that being how to improve the safety of inter-system data transmission, expand the suitable of data transmission
Use range.
In order to solve the above technical problems, the embodiment of the present invention, which provides one kind, is based on third-party data furnishing method, it is described
Include: based on third-party data furnishing method
The data inquiry request of party in request is received, the data inquiry request includes the first id information of the data;
ID mapping is carried out according to first id information, obtains the second id information of the data;
The data of the supplier are called according to second id information;
The data are encrypted;
The encrypted data and first id information are sent to the need after home-delivery center's cache key
The side of asking.
Optionally, after the data inquiry request for receiving party in request, further includes: verify ordering for the data inquiry request
The ID of single ID and the party in request;Verify the IP of the party in request and the white list IP of the home-delivery center.
Optionally, described to be based on third-party data furnishing method further include: the party in request receives encrypted institute
After stating data, confirmation message is sent to the home-delivery center.
Optionally, described to be based on third-party data furnishing method further include: the home-delivery center receives the confirmation
After information, by the cipher key delivery to the party in request;After the party in request receives the key, decrypted according to the key
The data.
Optionally, described to be based on third-party data furnishing method further include: to record the data inquiry request and described
Send the number of confirmation message.
Optionally, after the data that the supplier is called according to second id information, the data are deposited
Storage is in NoSQL database.
Optionally, described to encrypt the data, comprising: by the data by agreement key and random key into
The secondary encryption of row.
In order to solve the above technical problems, the embodiment of the invention also discloses one kind to be based on third-party data feeding mechanism,
Including supplier, party in request and home-delivery center, the home-delivery center includes:
First interface, suitable for the transmission of communication and data between the home-delivery center and the party in request, the data are looked into
Asking request includes the first id information;
Map unit is suitable for carrying out ID mapping according to first id information, obtains the second id information;
Call unit calls the data of the supplier according to second id information;
Second interface, the transmission suitable for data between the home-delivery center and the supplier;
Encryption unit, suitable for encrypting the data.
Optionally, described to be based on third-party data feeding mechanism further include: authentication unit is looked into suitable for verifying the data
Ask the order ID of request and the ID of the party in request;Verify the IP of the party in request and the white list IP of the home-delivery center.
Optionally, after the party in request receives the encrypted data, confirmation message is sent to the home-delivery center;
After the home-delivery center receives the confirmation message, by cipher key delivery to the party in request;The party in request receives described
After key, the data are decrypted according to the key.
Optionally, described to be based on third-party data feeding mechanism further include: statistic unit records the data query and asks
The number for the transmission confirmation message of summing.
Compared with prior art, the technical solution of the embodiment of the present invention has the advantages that
For the embodiment of the present invention by the data inquiry request of reception party in request, the data inquiry request includes that the first ID believes
Breath;ID mapping is carried out according to first id information, obtains the second id information;The supply is called according to second id information
The data of side;The data are encrypted, and the encrypted data and first id information are passed through into home-delivery center
The party in request is sent to after caching.Pass through home-delivery center supplier according to first id information progress ID invoking upon mapping
Data, and the encrypted data are sent to the party in request, improve supplier and party in request's data among systems
The safety of transmission, and expand the range that data are transmitted between supplier and demand method, system.
Detailed description of the invention
Fig. 1 is a kind of tripartite's data supply schematic diagram of the embodiment of the present invention;
Fig. 2 is that one kind of the embodiment of the present invention is based on third-party data furnishing method flow chart;
Fig. 3 is that another kind of the embodiment of the present invention is based on third-party data furnishing method flow chart;
Fig. 4 is that one kind of the embodiment of the present invention is based on third-party data feeding mechanism structural schematic diagram.
Specific embodiment
As described in the background art, data transmission method in the prior art, individually develop program cause implementation with
Service logic tight binding, the system degree of coupling is high, and transmission demand consideration is relatively simple, does not have generally applicable ability;In addition, being
Using excessive point-to-point connection when system transmission data, not only increases a large amount of exploitation and co-ordination, increase answering for system
It is low to reduce data transmission security for polygamy and unstability, and cause data transmission difficult.
For the embodiment of the present invention by the data inquiry request of reception party in request, the data inquiry request includes that the first ID believes
Breath;ID mapping is carried out according to first id information, obtains the second id information;The supply is called according to second id information
The data of side;The data are encrypted, and the encrypted data and first id information are passed through into home-delivery center
The party in request is sent to after caching.Pass through home-delivery center supplier according to first id information progress ID invoking upon mapping
Data, and the encrypted data are sent to the party in request, improve supplier and party in request's data among systems
The safety of transmission, and expand the range that data are transmitted between supplier and demand method, system.
To make the above purposes, features and advantages of the invention more obvious and understandable, with reference to the accompanying drawing to the present invention
Specific embodiment be described in detail.
Fig. 1 is a kind of tripartite's data supply schematic diagram of the embodiment of the present invention.
Fig. 1 is please referred to, the tripartite includes supplier 101, home-delivery center 102 and party in request 103.Supplier 101 prepares
The data of supply, and supply data are stored to database, the data volume that the type of the database is supplied according to supplier 101
Size and business size determine.It wherein, include the relevant id information of data in the supply data that supplier 101 provides.
Database described in 101 scheduled maintenance update of supplier keeps the validity for the data supplied in database;Wherein,
The validity of the data of supply is determined according to the type of service of supplier 101.Home-delivery center 102 is established by query service interface
Communication between database, inquiry or the data for calling supplier 101 to supply, and the data query of side 103 is asked according to demand
It asks, data will be supplied accordingly in database and are transmitted to party in request 103.
In the present embodiment, the query service interface can be based on hypertext transfer protocol (Hyper Text Transfer
Protocol, HTTP) definition use, it is also possible to be defined based on any other enforceable agreement.
In the present embodiment, home-delivery center 102 is data transfer platform, and home-delivery center 102 formulates data transmission standard, can be with
Compatible every profession and trade, the data of the various formats of department expand the model of supplier 101 and the transmission of 103 data among systems of party in request
It encloses.
Fig. 2 is that one kind of the embodiment of the present invention is based on third-party data furnishing method flow chart.
Referring to figure 2., together referring to Fig.1, described to include: based on third-party data furnishing method
Step S201 receives the data inquiry request of party in request.
In the present embodiment, the data according to needed for itself of party in request 103 send data inquiry request, the data inquiry request
The first id information including the data;First id information can be the cookie ID of data inquiry request;Party in request
Data needed for 103 include at least two identity (Identity, ID) information associated with the data, and the first id information is wherein
A kind of id information, the second id information are the relevant another id information of data needed for party in request 103;Home-delivery center 102, which receives, to be needed
The data inquiry request of the side of asking 103.
In the present embodiment, home-delivery center 102 records the number that party in request 103 sends the data inquiry request.
Step S202 carries out ID mapping according to the first id information, obtains the second id information of the data.
In the present embodiment, home-delivery center 102 according in data inquiry request the first id information carry out ID mapping, obtain with
Relevant second id information of data needed for party in request 103, the second id information are at least one related to data needed for party in request 103
Id information.
In specific implementation, the mapping relations of the first id information and the second id information are defined and stored in by home-delivery center 102
In database.After home-delivery center 102 receives the data inquiry request of party in request 103, the first id information is extracted, is closed according to mapping
System finds associated second id information list.
In specific implementation, the data of the supplier 101 are stored in the database NoSQL database of non-relational,
It can be Redis database.Redis database is a kind of key assignments (key-value) database, and data are memory storage, is only existed
It is written when necessary, fast response time;Support the complex operations in numerous types of data and various data types.In Redis number
According in library, the data are stored by first id information and the second id information.
In specific implementation, after data are stored in Redis database by supplier 101, home-delivery center 102 defines the first id information
Key with the second id information as Redis database.It, will be in hash structure using the hash data structure of Redis database
Key is set as the first ID, is worth for the 2nd ID.After the data inquiry request that home-delivery center 102 receives party in request 103, first is extracted
Id information inquires key assignments, i.e. the second id information using the first id information as key.
Step S203 calls the data of supplier according to the second id information.
In the present embodiment, after home-delivery center 102 obtains the second id information, supplier 101 is transferred according to the second id information and is mentioned
The data of second id information association attributes in the data of confession, and the second id information of data of the second id information association attributes is related
In the data deposit database of attribute.
Step S204 encrypts the data.
In the present embodiment, the data are carried out secondary encryption by agreement key and random key by home-delivery center 102, really
Protect the safety of data transmission procedure.
In the present embodiment, agreement key is supplier 101 and the party in request 103 lower key arranged online, and agreement key can
Think arbitrary string, the length for arranging key is 8~16 characters;Random key is the key that supplier 101 provides, with secret
Key can be arbitrary string, and the length of random key is 8~16 characters.Wherein, each query calls of home-delivery center 102 are supplied
When the data of side 101, random key can be randomly generated in supplier 101.
In specific implementation, home-delivery center 102 passes through agreement key and random using Blowfish-PKCS and Base64 algorithm
Key pair transmission data are encrypted.
The encrypted data are sent to the demand after home-delivery center caches random key by step S205
Side.
In the present embodiment, data needed for party in request 103 are transmitted to by party in request 103, required number according to data inquiry request
According to including encrypted data and first id information.
In the present embodiment, after the party in request 103 receives the encrypted data, sends confirmation message and match to described
Send center 102.After the home-delivery center 102 receives the confirmation message, the random key is transmitted to the party in request
103;After the party in request 103 receives the random key, the data 102 are decrypted according to the random key.
It is understood that the key is random key.
In the present embodiment, home-delivery center 102 records the number that party in request 103 sends confirmation message.Pass through the data of record
Inquiry request number and confirmation message number unite to data Successful transmissions number between party in request 103 and supplier 101
Meter, to carry out the business operation of next step.
The embodiment of the present invention passes through home-delivery center supplier's according to first id information progress ID invoking upon mapping
Data, and the encrypted data are sent to the party in request, it improves supplier and party in request's data among systems passes
Defeated safety, and expand the range of supplier and the transmission of party in request's data among systems.
Fig. 3 is that another kind of the embodiment of the present invention is based on third-party data furnishing method flow chart.
Referring to figure 3., together referring to Fig.1, described to include: based on third-party data furnishing method
Step S301 receives the data inquiry request of party in request.
Step S302, the order ID of verify data inquiry request and the ID of party in request;In the IP and dispatching for verifying party in request
The white list IP of the heart.
In the present embodiment, party in request 103 needs when carrying out the transmission of data using home-delivery center 102 and supplier 101
It is registered in home-delivery center 102, obtains account ID;It include the account ID information of party in request 103 in the data inquiry request,
That is order ID.After home-delivery center 102 receives the data inquiry request of party in request 103, needing to verify the order ID for sending and requesting is
It is no be party in request 103 account ID it is consistent, avoid the account ID of party in request 103 from being used by malice string;If party in request 103 had bad
Record, then address Internet protocol (Internet Protocol.IP) of party in request 103 can be pulled in black name by home-delivery center
It is single;After home-delivery center 102 receives the data inquiry request of party in request 103, whether the IP address for needing to verify party in request 103 is matching
It send in the IP address white list at center 102, guarantees the safety of data transmission.It is verified after all passing through twice, enters step S303.
Step S303 carries out ID mapping according to the first id information, obtains the second id information of data.
Step S304 calls the data of supplier according to the second id information.
Step S305 encrypts the data.
Step S306 sends the encrypted data and first id information after home-delivery center's cache key
To the party in request.
Step S307 after party in request receives encrypted data, sends confirmation message to home-delivery center.
In the present embodiment, the confirmation message indicates that party in request 103 has received the data of the transmission of home-delivery center 102.But
The key of only having an agreement of party in request 103 without random key can not decrypt the data at this time.
Random key after home-delivery center receives confirmation message, is transmitted to party in request, party in request receives by step S308
Ciphertext data after the random key.
In the present embodiment, home-delivery center 102 determines that data have been transferred to party in request 103 after receiving confirmation message,
And the random key of caching is sent to party in request 103.After the data are decrypted by the random key by party in request 103,
Primary data between supplier 101 and party in request 103 are transmitted.
The present embodiment ensure that the safety of data transmission, prevented by data discord random key simultaneous transmission
It loses in data transmission procedure, is utilized after the decryption of other parties in request.
Step S309, record data inquiry request and the number for sending confirmation message.
The present embodiment passes through the data inquiry request number and confirmation message number of record, to party in request 103 and supplier
Data Successful transmissions number is counted between 101, to carry out the business operation of next step.
Specific embodiment can refer to aforementioned corresponding embodiment, and details are not described herein again.
Fig. 4 is that one kind of the embodiment of the present invention is based on third-party data feeding mechanism structural schematic diagram.
Referring to figure 4., together referring to Fig.1, described to include: based on third-party data feeding mechanism 40
Supplier 101, home-delivery center 102 and party in request 103.
Home-delivery center 102 includes: first interface 401, suitable for communicating sum number between the home-delivery center and the party in request
According to transmission, the data inquiry request include the first id information.
In the present embodiment, party in request 103 and home-delivery center 102 pass through the progress data inquiry request sum number of first interface 401
According to transmission.
Map unit 402 is suitable for carrying out ID mapping according to first id information, obtains the second id information.
Call unit 403 calls the data of the supplier according to second id information.
Second interface 404, the transmission suitable for data between the home-delivery center and the supplier.
In the present embodiment, supplier 101 and home-delivery center 102 pass through the transmission that second interface 404 carries out data.
Encryption unit 405, suitable for encrypting the data.
Authentication unit 406, suitable for verifying the order ID of the data inquiry request and the ID of the party in request;Described in verifying
The white list IP of the IP of party in request and the home-delivery center.
In the present embodiment, after the party in request 103 receives the encrypted data, sent by first interface 401
Confirmation message is to the home-delivery center 102;After the home-delivery center 102 receives the confirmation message, crossing first interface 401 will
Random key is transmitted to the party in request 103;After the party in request 103 receives the random key, according to the key solution
The close data 102.
Statistic unit 407, suitable for recording the data inquiry request and the number for sending confirmation message.
Specific embodiment can refer to aforementioned corresponding embodiment, and details are not described herein again.
In the embodiment of the present invention, a supplier and party in request can be configured based on third-party data feeding mechanism 40,
A supplier and multiple parties in request, multiple suppliers and single party in request and multiple suppliers and multiple need can also be configured
The side of asking does the adjustment of adaptability according to actual application environment.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in computer readable storage medium, and storage is situated between
Matter may include: ROM, RAM, disk or CD etc..
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this
It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute
Subject to the range of restriction.
Claims (11)
1. one kind is based on third-party data furnishing method, for supplier's data to be transmitted to party in request, which is characterized in that packet
It includes:
The data inquiry request of party in request is received, the data inquiry request includes the first id information of the data;
ID mapping is carried out according to first id information, obtains the second id information of the data, home-delivery center is by Redis data
Key in the hash structure in library is set as first id information, is worth for second id information, is made using first id information
For key, key assignments is inquired, to obtain second id information;
The data of the supplier are called according to second id information, the data of the supplier are stored in described
In Redis database;
The data are encrypted;
The encrypted data and first id information are sent to the party in request after home-delivery center's cache key.
2. according to claim 1 be based on third-party data furnishing method, which is characterized in that the reception party in request
After data inquiry request, further includes: verify the order ID of the data inquiry request and the ID of the party in request;Verify the need
The white list IP of the IP for the side of asking and the home-delivery center.
3. according to claim 1 be based on third-party data furnishing method, which is characterized in that further include: the demand
After side receives the encrypted data, confirmation message is sent to the home-delivery center.
4. according to claim 3 be based on third-party data furnishing method, which is characterized in that further include: the dispatching
After center receives the confirmation message, by the cipher key delivery to the party in request;The party in request receives the key
Afterwards, the data are decrypted according to the key.
5. according to claim 4 be based on third-party data furnishing method, which is characterized in that further include: described in record
Data inquiry request and the number for sending confirmation message.
6. according to claim 1 be based on third-party data furnishing method, which is characterized in that believed according to the 2nd ID
After breath calls the data of the supplier, NoSQL database is stored the data in.
7. it is according to claim 1 be based on third-party data furnishing method, which is characterized in that it is described by the data into
Row encryption, comprising: the data are subjected to secondary encryption by agreement key and random key.
8. one kind is based on third-party data feeding mechanism, including supplier, party in request and home-delivery center, which is characterized in that institute
Stating home-delivery center includes:
First interface, suitable for the transmission of communication and data between the home-delivery center and the party in request, data inquiry request packet
Include the first id information;
Map unit is suitable for carrying out ID mapping according to first id information, obtains the second id information, and home-delivery center is by Redis
Key in the hash structure of database is set as first id information, is worth for second id information, is believed using the first ID
Breath is used as key, key assignments is inquired, to obtain second id information;
Call unit calls the data of the supplier, the data storage of the supplier according to second id information
In the Redis database;
Second interface, the transmission suitable for data between the home-delivery center and the supplier;
Encryption unit, suitable for encrypting the data.
9. according to claim 8 be based on third-party data feeding mechanism, which is characterized in that further include: authentication unit,
Suitable for verifying the order ID of the data inquiry request and the ID of the party in request;Verify the party in request IP and the dispatching
The white list IP at center.
10. according to claim 8 be based on third-party data feeding mechanism, which is characterized in that the party in request receives
To after the encrypted data, confirmation message is sent to the home-delivery center;The home-delivery center receives the confirmation letter
After breath, by cipher key delivery to the party in request;After the party in request receives the key, the number is decrypted according to the key
According to.
11. according to claim 10 be based on third-party data feeding mechanism, which is characterized in that further include: statistics is single
Member records the data inquiry request and sends the number of the confirmation message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510844397.7A CN105407097B (en) | 2015-11-26 | 2015-11-26 | Based on third-party data furnishing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510844397.7A CN105407097B (en) | 2015-11-26 | 2015-11-26 | Based on third-party data furnishing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105407097A CN105407097A (en) | 2016-03-16 |
CN105407097B true CN105407097B (en) | 2019-07-19 |
Family
ID=55472352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510844397.7A Active CN105407097B (en) | 2015-11-26 | 2015-11-26 | Based on third-party data furnishing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105407097B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107045480A (en) * | 2016-02-05 | 2017-08-15 | 北京京东尚科信息技术有限公司 | The method and apparatus that buffer memory is read and write based on Spring expression languages |
CN106713295B (en) * | 2016-12-15 | 2019-12-10 | 杭州卓健信息科技有限公司 | Medical image transmission method and device |
CN106802926B (en) * | 2016-12-21 | 2019-11-22 | 上海数据交易中心有限公司 | A kind of multiparty data inquiry system and method |
CN107040519B (en) * | 2017-03-10 | 2021-01-19 | 上海数据交易中心有限公司 | Data circulation method, device and system |
CN107025591A (en) * | 2017-03-21 | 2017-08-08 | 天津数集科技有限公司 | Data trade platform |
CN107193963B (en) * | 2017-05-24 | 2020-04-21 | 中国人民解放军陆军勤务学院 | Distributed development method of database application system |
CN107729460A (en) * | 2017-09-30 | 2018-02-23 | 上海数据交易中心有限公司 | Data query method and device, storage medium, terminal |
CN109088734B (en) * | 2018-09-17 | 2022-04-12 | 广州推点科技发展有限公司 | Coding method and system |
CN110225052A (en) * | 2019-06-20 | 2019-09-10 | 上海数据交易中心有限公司 | Data distribution method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101409706A (en) * | 2007-10-09 | 2009-04-15 | 华为技术有限公司 | Method, system and relevant equipment for distributing data of edge network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905526A (en) * | 2014-03-05 | 2014-07-02 | 深圳市同洲电子股份有限公司 | Dispatching method and server |
CN104158827B (en) * | 2014-09-04 | 2018-07-31 | 中电长城网际系统应用有限公司 | Ciphertext data sharing method, device, inquiry server and upload data client |
-
2015
- 2015-11-26 CN CN201510844397.7A patent/CN105407097B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101409706A (en) * | 2007-10-09 | 2009-04-15 | 华为技术有限公司 | Method, system and relevant equipment for distributing data of edge network |
Also Published As
Publication number | Publication date |
---|---|
CN105407097A (en) | 2016-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105407097B (en) | Based on third-party data furnishing method and device | |
AU2018348322B2 (en) | Asymmetric key management in consortium blockchain networks | |
CN106503098B (en) | Block chain cloud service framework system built in Paas service layer | |
CN111600908B (en) | Data processing method, system, computer device and readable storage medium | |
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
US11676133B2 (en) | Method and system for mobile cryptocurrency wallet connectivity | |
CN104917741B (en) | A kind of plain text document public network secure transmission system based on USBKEY | |
CN105593871A (en) | Attribute information providing method, and attribute information providing system | |
US9967091B2 (en) | Method for enhancing security in distributed systems | |
CN110266817A (en) | Across channel data sharing model, sharing method and device based on block chain | |
CN109995530B (en) | Safe distributed database interaction system suitable for mobile positioning system | |
CN109800588A (en) | Bar code dynamic encrypting method and device, bar code dynamic decryption method and device | |
CN111865609A (en) | Private cloud platform data encryption and decryption system based on state cryptographic algorithm | |
CN109257347A (en) | Communication means and relevant apparatus, storage medium suitable for data interaction between bank | |
US20230029087A1 (en) | Systems and methods for managing secure sharing of online data | |
US11569989B2 (en) | Blockchain system for hardening quantum computing security | |
CN106411504A (en) | Data encryption system, method and apparatus | |
CN110381012A (en) | For promoting the method and system of the broadcast of encryption data | |
CN107124409A (en) | A kind of access authentication method and device | |
US20200175505A1 (en) | System and method for creating a secure mesh network utilizing the blockchain | |
CN114244851B (en) | Block chain-based data distribution method | |
CN115567312A (en) | Alliance chain data authority management system and method capable of meeting multiple scenes | |
CN108809631B (en) | Quantum key service management system and method | |
CN109740319A (en) | Digital identity verification method and server | |
KR102298716B1 (en) | Communication node, method of operating thereof and collaborative system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |