CN108712379A - Data push method and device - Google Patents
Data push method and device Download PDFInfo
- Publication number
- CN108712379A CN108712379A CN201810308055.7A CN201810308055A CN108712379A CN 108712379 A CN108712379 A CN 108712379A CN 201810308055 A CN201810308055 A CN 201810308055A CN 108712379 A CN108712379 A CN 108712379A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- property
- terminal
- security platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
The present invention provides a kind of data push method and devices, are related to Internet technical field.The data push method includes:At least one user property is obtained as target user's attribute, data-pushing strategy is determined based on target user's attribute, the public key that push strategy and security platform are announced based on the data, target data is encrypted by the Encryption Algorithm based on attribute, ciphertext data are obtained, by push server by the ciphertext data-pushing to terminal.The present invention can improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Description
Technical field
The present invention relates to Internet technical fields, more particularly to a kind of data push method and device.
Background technology
With the development of Internet technology and popularizing for various terminals, terminal will receive largely pushing away from application server
Send data.Also the data of application server push can be received in the case of to make the no longer running background of the application in terminal,
Application service will can first need the target data that pushes to be sent to push server, and then by push server by the number of targets
According to being sent to terminal.
In the prior art, in order to ensure the safety of propelling data process, above-mentioned data-pushing passes through SSL (Secure
Sockets Layer, Secure Socket Layer) symmetric cryptographies such as/TLS (Transport Layer Security, Transport Layer Security)
Agreement is encrypted, so that it is guaranteed that safety of the target data of push between application server, push server and terminal,
But due to being encrypted by symmetrical encryption protocol, so as third-party push
Server can easily be decrypted the target data, and safety is poor, it is difficult to ensure the privacy of application developers and user
And data safety.
Invention content
In view of the above problems, it is proposed that the present invention overcoming the above problem in order to provide one kind or solves at least partly
State the data push method and device of problem.
One side according to the present invention provides a kind of data push method, the method includes:
At least one user property is obtained as target user's attribute;
Data-pushing strategy is determined based on target user's attribute;
The public key that push strategy and security platform are announced based on the data, by the Encryption Algorithm based on attribute to target
Data are encrypted, and obtain ciphertext data;
By push server by the ciphertext data-pushing to terminal.
Optionally, it is described target data is encrypted by the Encryption Algorithm based on attribute before, the method is also
Including:
Public key is obtained from the security platform.
Optionally, described to include to terminal by the ciphertext data-pushing by push server:
Push strategy determines user identifier based on the data;
The user identifier and the ciphertext data are sent to the push server, so that the push server will
The ciphertext data are sent to the corresponding terminal of the user identifier.
Optionally, the method further includes:
It is supplied to the security platform by multiple user identifiers and respectively with the associated user property of each user identifier, with
The security platform is set to be based on the multiple user identifier and the associated user property of each user identifier, it is current to the terminal
User possessed by user property verify, and after being verified to the terminal feed back private key.
One side according to the present invention provides a kind of data push method, the method includes:
The ciphertext data that application server pushes are obtained from push server, wherein the ciphertext data are by the application
The public key that server is announced based on data-pushing strategy and security platform, by the Encryption Algorithm based on attribute to target data into
Row encryption obtains;
Based on the user property associated by the user identifier with active user, private key is obtained from the security platform;
The ciphertext data are decrypted based on the private key, obtain the target data.
Optionally, the user property associated by the user identifier based on active user, is obtained from the security platform
The private key is taken to include:
The user identifier of the active user and associated user property are supplied to the security platform, so that described
Security platform verifies user property possessed by the active user, and after being verified, and determines and described current
The corresponding private key of user property possessed by user;
Receive the private key of the security platform feedback.
Optionally, the method further includes:
Record customer incident;
The user property associated by the user identifier with the active user is determined based on the customer incident;
The user identifier of the active user and associated user property are submitted into the application server, so that institute
It states application server and is based on user property possessed by user to terminal propelling data.
According to another aspect of the present invention, a kind of data-pushing device is provided, described device includes:
First acquisition module, for obtaining at least one user property as target user's attribute;
Determining module, for determining data-pushing strategy based on target user's attribute;
Encrypting module, for the public key that push strategy and security platform are announced based on the data, by based on attribute
Target data is encrypted in Encryption Algorithm, obtains ciphertext data;
Pushing module, for passing through push server by the ciphertext data-pushing to terminal.
Optionally, described device further includes:
Second acquisition module, for obtaining public key from the security platform.
Optionally, the pushing module includes:
Determination sub-module determines user identifier for push strategy based on the data;
Sending submodule, for the user identifier and the ciphertext data to be sent to the push server, so that
The ciphertext data are sent to the corresponding terminal of the user identifier by the push server.
Optionally, described device further includes:
Module is provided, for being supplied to institute by multiple user identifiers and respectively with the associated user property of each user identifier
Security platform is stated, so that the security platform is based on the multiple user identifier and the associated user property of each user identifier,
User property is verified possessed by the user current to the terminal, and feeds back private to the terminal after being verified
Key.
According to another aspect of the present invention, a kind of data-pushing device is provided, described device includes:
First acquisition module, for obtaining the ciphertext data that application server pushes from push server, wherein described close
The public key that literary data are announced by the application server based on data-pushing strategy and security platform, passes through the encryption based on attribute
Algorithm is encrypted to obtain to target data;
Second acquisition module is used for based on the user property associated by the user identifier with active user, from the safety
Platform obtains private key;
Deciphering module is decrypted the ciphertext data for being based on the private key, obtains the target data.
Optionally, second acquisition module includes:
Submodule is provided, for the user identifier of the active user and associated user property to be supplied to the peace
Full platform, so that the security platform verifies user property possessed by the active user, and after being verified,
Determine private key corresponding with user property possessed by the active user;
Receiving submodule, the private key for receiving the security platform feedback.
Optionally, described device further includes:
Logging modle, for recording customer incident;
Determining module, for determining the user associated by the user identifier with the active user based on the customer incident
Attribute;
Module is submitted, for the user identifier of the active user and associated user property to be submitted to the application
Server, so that the application server is based on user property possessed by user to terminal propelling data.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered
It is acquired with the miscellaneous equipment except the terminal of server and the user, therefore, at least one user property can be obtained and made
For target user's attribute, and then data-pushing strategy is determined based on target user's attribute, and based on data-pushing strategy to target
Data are encrypted, and obtained encryption data only can be by the terminal solution where the user identifier with target user's attribute
It is close, the equipment in addition to the terminal of application server and the user can be made to be difficult to perceive pushed data content, to
Improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention,
And can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, below the special specific implementation mode for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field
Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is a kind of step flow chart of according to embodiments of the present invention one data push method;
Fig. 2 is a kind of step flow chart of according to embodiments of the present invention two data push method;
Fig. 3 is a kind of step flow chart of according to embodiments of the present invention three data push method;
Fig. 4 is a kind of schematic diagram of according to embodiments of the present invention three data delivery system;
Fig. 5 is a kind of sequence diagram of according to embodiments of the present invention three data push method;
Fig. 6 is a kind of structure diagram of according to embodiments of the present invention four data-pushing device;
Fig. 7 is a kind of structure diagram of according to embodiments of the present invention five data-pushing device.
Specific implementation mode
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
Embodiment one
Referring to Fig.1, a kind of step flow chart of data push method in the embodiment of the present invention is shown.This method can be with
Applied in application server, specific steps include:
Step 101, at least one user property is obtained as target user's attribute.
Since application server can provide service for multiple users, and different users can have different users to belong to
Property, for example, subscribe to or pay close attention to different types of data, with all ages and classes, in different nationalities etc., and the user of each user
Attribute is easy to by the terminal of application server and the user, and is difficult to by other not by the equipment of application server or authorization terminal
It acquires, therefore, for the ease of subsequently the data pushed are encrypted in the user property based on user, makes except application
Equipment except the terminal of server and the user is difficult to perceive pushed data content, improves the safety of propelling data process
Property, the privacy and data safety of user and application developers are protected, target user's attribute can be obtained.
User property is feature possessed by user, which can submit to obtain by receiving user, alternatively, can be with
The usage behavior of application is analyzed to obtain according to user.
For example, user property may include concern or the other users subscribed to or topic, age, nationality, religious belief, institute
Locate at least one of geographical location, hobby, income level, consuming capacity etc..Certainly, in practical applications, the user
Attribute can also include other information for capableing of feature possessed by user.
Terminal may include mobile phone, computer or wearable device, and certainly, in practical applications, which can also include
Other types of equipment.Can be installed in the terminal with it is aforementioned in the corresponding application of application server, answered thereby using this
With service provided by the server.
Application server can from multiple terminals obtain different user possessed by user property, to collect obtain it is multiple
User property, and select at least one as target user's attribute in multiple user property and carry out propelling data.
Since different users has different user properties, thus the required data pushed to different users also may be used
To match with user property possessed by the user, different data are pushed accurately to be corresponded to different users.So can
With according to the data pushed, the matched at least one user property of selection institute;Alternatively, at least one use can also be randomly choosed
Then family attribute is determined to the data for meeting the corresponding user of selected user property and being pushed.
Certainly, in practical applications, at least one user property can also be selected to be used as target otherwise
Family attribute.
Step 102, data-pushing strategy is determined based on target user's attribute.
From the foregoing it will be appreciated that target user's attribute includes at least one user property, therefore in order to further accurately determine
The user of pushed data will be obtained, propelling data accuracy is improved, can determine that data push away according to target user's attribute
Send strategy.
Data-pushing strategy is made of a user property or multiple multiple user properties by logical operator connection,
So as to illustrate to obtain user property possessed by the user of pushed data.The data-pushing strategy can be by answering
It is received to submit with server and be obtained, alternatively, can be by the application server according to mode set in advance, according to currently being pushed away
The data sent determine to obtain.
For example, target user's attribute includes " concern user A " and " concern user B ", if necessary to give certain data-pushing
The user for paying close attention to user A or B can then determine that data-pushing strategy is { concern user A OR pay close attention to user B }.
Step 103, the public key that push strategy and security platform are announced based on the data, is calculated by the encryption based on attribute
Target data is encrypted in method, obtains ciphertext data.
During reducing the data-pushing by symmetric cryptography, the data pushed may be pushed the thirds such as server
Method, apparatus is obtained and is decrypted, and the problem of to perceive pushed data, improves the safety of data-pushing, it is ensured that Yong Huhe
The privacy and data safety of application developers can carry out the target data pushed by the Encryption Algorithm based on attribute
Encryption.
Encryption Algorithm based on attribute is a kind of one-to-many Encryption Algorithm.The algorithm can pass through attribute set or access
Data are encrypted in strategy, and encrypted data can be combined by the attribute or data-pushing strategy is decrypted, when and only
When attribute set meets the access strategy, encrypted data can correctly be decrypted.For example, application server is to end
The target data of end push passes through data-pushing strategy:{ concern user A OR concern users B } is encrypted, then for getting
The terminal of the target data is paid close attention to if user property possessed by the current user of the terminal meets the data-pushing strategy
User A has paid close attention to user B, can encrypted target data be decrypted.
Security platform can be used as attribute authority (aa) mechanism, the security platform that can be provided to application server based on attribute
Public key needed for encryption, so that target data can be encrypted in application server.
Security platform is initialized, and security parameter k is inputted, and exports public key PK and master key MSK, wherein PK=G0,g,
H=gβ, f=g1/β,e(g,g)αIt is disclosed to be acquired by miscellaneous equipment, it can be used for application server to data
It is encrypted;MSK=(β, gα) it is secrecy, for subsequently generating key for terminal.
Wherein, G0The Bilinear Groups for being p for a Prime Orders, g are G0Generation member, k is for determining the big of the Bilinear Groups
Small, α and β are finite field ZpIn two random elements, h and f are the parameter being calculated.
Wherein, security platform generates public key, private key referring also to the associated description in follow-up, no longer goes to live in the household of one's in-laws on getting married one by one herein
It states.
It should be noted that public key in the embodiment of the present invention be application server in advance (such as to target data into
Before row encryption) obtain and stored from security platform.Can also be to need to add target data in each determination
It is obtained from the security platform when close.Certainly, in practical applications, application server can also obtain the peace otherwise
The public key that full platform is announced, for example, receiving the public key of the security platform of miscellaneous equipment forwarding or receiving related technical personnel
Submission obtains the public key etc. of the security platform.
Target data is the data pushed to user, which can be determined by application server.For example, the target
Data can be an application message.
The Encryption Algorithm based on attribute can be passed through according to data-pushing strategy T, target data M and public key PK
Encrypt (), is encrypted M.In ciphering process, the attribute in data-pushing strategy can regard a node x as, be
Each node x constructions multinomial is qx, the collection that all nodes are constituted is combined into Y, and att (y) is the attribute value of attribute represented by node, then
Calculate to obtain encrypted target data, i.e. ciphertext dataC=hs,
Wherein, s ZpIn random element.
Step 104, by push server by the ciphertext data-pushing to terminal.
From the foregoing it will be appreciated that only the current user of terminal just has the user property for meeting data-pushing strategy, the terminal
The ciphertext data can be decrypted, and the miscellaneous equipment in addition to the terminal of application server and the user, for example push away
Send server, it is difficult to user property possessed by the user is got, is also just difficult to decrypt to obtain target data, it therefore, can be with
The ciphertext data are pushed to terminal by push server, push server can be reduced and obtain the possibility of the target data,
Improve the safety of data-pushing, it is ensured that the privacy and data safety of user and application developers.
Push server be future self-application server data forwarding to terminal server, for example, the Push Service
Device may include APNs (Apple Push Notification service, apple push notification service) server.
Ciphertext data can be sent to push server by application server, be supplied to from push server by ciphertext data
Terminal.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered
It is acquired with the miscellaneous equipment except the terminal of server and the user, therefore, at least one user property can be obtained and made
For target user's attribute, and then data-pushing strategy is determined based on target user's attribute, and based on data-pushing strategy to target
Data are encrypted, and obtained encryption data only can be by the terminal solution where the user identifier with target user's attribute
It is close, the equipment in addition to the terminal of application server and the user can be made to be difficult to perceive pushed data content, to
Improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Embodiment two
With reference to Fig. 2, a kind of step flow chart of data push method in the embodiment of the present invention is shown.This method can be with
Applied in terminal, specific steps include:
Step 201, from push server obtain application server push ciphertext data, wherein the ciphertext data by
The public key that the application server is announced based on data-pushing strategy and security platform, by the Encryption Algorithm based on attribute to mesh
Mark data are encrypted to obtain.
In order to get the data that application server is pushed, ciphertext data can be obtained from push server.And due to
The public key that the encryption data is announced by application server based on data-pushing strategy and security platform, passes through the encryption based on attribute
Algorithm is encrypted to obtain to target data, and obtained encryption data only can be by the user identifier with target user's attribute
The terminal deciphering at place can make the equipment in addition to the terminal of application server and the user be difficult to perceive pushed number
According to content, to improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Wherein, the public key that application server is issued based on data-pushing strategy and security platform passes through adding based on attribute
The mode that the target data to be pushed is encrypted in close algorithm, may refer to it is aforementioned in associated description, it is not another herein
One repeats.
Step 202, it based on the user property associated by the user identifier with active user, is obtained from the security platform private
Key.
From the foregoing it will be appreciated that ciphertext data are the public affairs issued based on data-pushing strategy and security platform by application server
Key is encrypted by the Encryption Algorithm based on attribute, and can only be met data-pushing strategy by user property when carries out
Therefore decryption for the ease of subsequently ciphertext data are decrypted, can obtain private key from security platform.
User identifier is the mark of user, which may include user name, the pet name, User ID
At least one of (Identification, identity card) and the Termination ID of place terminal etc.
The user identifier of active user and associated user property can be supplied to safe cloud platform by terminal, or will
The user identifier is supplied to safe cloud platform, and security platform can verify user property possessed by the user, to end
End provides private key, in order to which the target data can be decrypted in the terminal.It can be seen from the above, due to obtaining private key needs pair
User property possessed by user is verified, and the third party devices such as push server are difficult to perceive user possessed by user and belong to
Property, being also just difficult to acquire certainly can be to the private key that ciphertext data are decrypted, and then is difficult to acquire target data,
Improve the safety of propelling data, it is ensured that the privacy and data safety of user and application developers.
Security platform can obtain (such as from application server obtain) in advance and store the user identifier of multiple users with
And the user property that each user identifier is respectively associated.When getting the user identifier and user property of terminal offer, Ke Yigen
According to the user identifier, from the user identifier and user property of storage, acquisition and the user property associated by the user identifier, if
Acquired user property includes the user property that the terminal is provided, it is determined that this is verified, and is provided to the terminal private
Otherwise key determines that verification does not pass through, and does not provide private key to the terminal.It, can be with when only getting the user identifier of terminal offer
Directly according to the user identifier, from the user identifier and user property of storage, obtain and the user associated by the user identifier
Attribute provides private key according in acquired user property to the terminal.
Security platform can utilize the MSK retained, run key schedule KeyGen, generate private keyThe private key and the private is calculated
The user property of key corresponds to, for example, in embodiments of the present invention, the terminal where the user identifier with target user's attribute,
The private key obtained from security platform is corresponding with target user's attribute.
Wherein, S is user property set, j ∈ S, rj∈ZP。
Step 203, the ciphertext data are decrypted based on the private key, obtain the target data.
If user property possessed by the current user of terminal, meets application server and destination application server is carried out
Used data-pushing strategy when encryption can then be decrypted the ciphertext data;Certainly, if the current user of the terminal
Possessed user property does not meet used data-pushing when destination application server is encrypted in application server
Strategy cannot then be decrypted the ciphertext data.
Terminal can run decipherment algorithm when receiving ciphertext data, input private key SK and ciphertext data CT, obtain target
Data
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered
It is acquired with the miscellaneous equipment except the terminal of server and the user, and the encryption data accessed by terminal is taken by application
The public key that business device is announced based on data-pushing strategy and security platform carries out target data by the Encryption Algorithm based on attribute
Encryption obtains, which needs the user property associated by the user identifier based on active user, and private key is obtained from security platform
Encryption data is decrypted.Therefore when the user property possessed by the terminal active user meets the data-pushing strategy,
The encryption data can be decrypted in accessed key, can make except application server and the user terminal it
Outer equipment is difficult to perceive pushed data content, to improve the safety of data-pushing process, it is ensured that user and
The data safety of the privacy of application developers.
Embodiment three
With reference to Fig. 3, a kind of step flow chart of data push method in the embodiment of the present invention is shown.This method can be with
Applied in data delivery system, specific steps include:
Step 301, application server obtains multiple user identifiers from terminal and belongs to respectively with each associated user of mark
Property.
For the ease of subsequently can accurately according to user property to each user's propelling data, determine data-pushing strategy pair
Data improve accuracy and the safety of data-pushing so that data-pushing process to be encrypted, and application server can be from end
Collect user identifier and associated user property in end.
Terminal can be submitted by receiving user or be analyzed the usage behavior of application user, to obtain
It is sent to application server to user property, and by the user property and associated user identifier.Correspondingly, application server
It can be from the user identifier and associated user property that multiple terminals are sent be received, to obtain multiple user identifiers and divide
Not with the associated user property of each user identifier.
Terminal can provide a user user property and submit entrance, and it includes that setting user belongs to which, which submits entrance,
Property relevant information, so as to pass through the user property submit entrance, receive user submit user property.
In embodiments of the present invention, optionally, situations such as slipping up or being difficult to subjective determination is submitted by user in order to reduce
It is caused obtain user property inaccuracy problem, in order to improve obtain user property accuracy, improve interaction effect with
Experience, terminal can record customer incident, be determined associated by the user identifier with the active user based on the customer incident
User property, the user identifier of the active user and associated user property are submitted into the application server, with
The application server is set to be based on user property possessed by user to terminal propelling data.It that is to say, by user to application
Usage behavior, determine user property possessed by user.
Customer incident is the event that user carries out application operation generation, which may include concern event, comment thing
Part, reading event, thumbs up event, purchase events or at least one of event of making a reservation etc. at event of posting, and certainly, is actually answering
Can also include other events in.
Terminal can be for statistical analysis to customer incident, including machine learning model, neural network model, grader etc.
Statistical classification is carried out to customer incident, the user property with user-association is determined, it is of course also possible to which the customer incident of record is carried
Related technical personnel are supplied, are determined and the user property of user-association according to customer incident by related technical personnel.
By taking concern event as an example, when be recorded user to " user A " click concern button when, that is, be recorded to " user
The concern event of A ", it may be determined that the user property of the user is " concern user A ".By taking comment event as an example, when user is to " words
When inscribing the number of reviews of the content of A " more than comment threshold value, it may be determined that user property is " concern topic A ", wherein threshold value can
To be determined in advance by terminal.By taking purchase events as an example, it may be determined that the average price X of bought article in each purchase events, and
And then it is " purchasing power X " to be determined as user property.
In addition, in another alternative embodiment of the present invention, the customer incident that record obtains can be sent to using clothes
Business device, makes application server determine the user property with user-association based on customer incident.
In embodiments of the present invention, optionally, verification is carried out to terminal for the ease of Subsequent secure platform and led in verification
Later corresponding private key is provided, it is ensured that the safety of data-pushing can be marked by multiple user identifiers and respectively with each user
Know associated user property and be supplied to the security platform, so that the security platform is based on the multiple user identifier and respectively
The associated user property of user identifier, user property possessed by the user current to the terminal is verified, and is being verified
By rear private key is fed back to the terminal.
Wherein, security platform works as terminal to being based on multiple user identifiers and the associated user property of each user identifier
The mode that user property is verified possessed by preceding user may refer to it is aforementioned in associated description, no longer go to live in the household of one's in-laws on getting married one by one herein
It states.
Step 302, the application server obtains at least one user property as target user's attribute, is based on the mesh
Mark user property determines data-pushing strategy.
Wherein, application service determines the mode of target user's attribute and data-pushing strategy, may refer to it is aforementioned in
Associated description no longer repeats one by one herein.
Step 303, the application server obtains public key from security platform.
In order to ensure data-pushing can be encrypted in subsequent applications server, it is ensured that add to data-pushing process
Close reliability, and then the safety and reliability of data-pushing is improved, public key can be obtained from security platform.
Security platform can have previously been based on the Encryption Algorithm of attribute, generate and announce public key, to make the application server
Get the public key.
Wherein, security platform generate public key mode, may refer to it is aforementioned in associated description, no longer go to live in the household of one's in-laws on getting married one by one herein
It states.
In addition, in practical applications, in order to improve the flexibility for obtaining public key and data-pushing, application server may be used also
With any time before executing following step 304, public key is obtained from security platform.
Step 304, the application server pushes the public key that strategy and the security platform are announced based on the data, leads to
It crosses the Encryption Algorithm based on attribute target data is encrypted, obtains ciphertext data.
Wherein, the mode that target data is encrypted in application server, may refer to it is aforementioned in associated description, herein
No longer repeat one by one.
Step 305, the application server pushes strategy and determines user identifier based on the data, by the user identifier
It is sent to push server with the ciphertext data.
Since data-pushing strategy can illustrate that user property possessed by the user of pushed data will be obtained, because
This, can be according to the data-pushing strategy, and determining has the user identifier of the user property met, consequently facilitating being marked to the user
Terminal propelling data where knowing.
Application server can be according to data-pushing strategy and the user property of multiple users, to multiple user identifiers
It is screened, to which selection obtains the user for meeting the data-pushing strategy.
It, then can be right by the data-pushing strategy for example, data-pushing strategy is { concern user A AND pay close attention to user B }
User identifier is screened, and is associated with the user identifier of " concern user A " and " concern user B " simultaneously.
Step 306, the ciphertext data are sent to the corresponding terminal of the user identifier by the push server.
The ciphertext data can be sent to each use by push server according to the ciphertext data and user identifier received
In terminal where the mark of family.
Step 307, the terminal obtains the ciphertext data that the application server pushes from the push server.
Terminal can receive the ciphertext data of push server transmission.
Step 308, the user identifier of the active user and associated user property are supplied to described by the terminal
Security platform.
It verifies, and obtains for the ease of the user property associated by the Subsequent secure platform user identifier current to terminal
Private key is got, to reduce the possibility that ciphertext data are pushed the decryption of the miscellaneous equipments such as server, improves the safety of data-pushing,
Terminal can be supplied to security platform by current user identifier and with the user property associated by the user identifier.
User property associated by current user identifier and the user identifier can be sent to security platform by terminal.
Step 309, the security platform verifies user property possessed by the active user, and logical in verification
Later, private key corresponding with user property possessed by the active user is determined.
Wherein, security platform verifies the associated user property of user identifier and generates the mode of private key, Ke Yican
See it is aforementioned in associated description, no longer repeat one by one herein.
Step 310, the terminal is decrypted the ciphertext data based on the private key, obtains the target data.
Wherein, the mode that terminal is decrypted ciphertext data based on private key, may refer to it is aforementioned in associated description, this
Place no longer repeats one by one.
In addition, in order to further ensure that the safety of data-pushing, the data interaction between above-mentioned any two ends can lead to
The symmetrical encryption protocols such as SSL/TLS are crossed to be encrypted.
For example, data delivery system provided by the present invention can with as shown in figure 4, the system include application server 01,
Terminal 02, security platform 03 and push server 04.Data push method sequence diagram applied to the system is as shown in figure 5, packet
It includes:
S1, user generate user property according to the usage behavior, are closed with user identifier using usage behavior, terminal is generated
Connection;
User identifier and associated user property are fed back to application server by S2, terminal;
S3, security platform run initialization algorithm, input security parameter k, export common parameter PK and master key MSK, public
Cloth PK;
S4, application service are asked from security platform and obtain PK;
S5, application server determine target user's attribute, data-pushing strategy T are determined according to target user's attribute, according to T
It determines user identifier, target data M is encrypted by the Encryption Algorithm based on attribute based on T and PK, obtain encryption number
According to CT;
CT and user identifier are sent to push server by S6, application server;
S7, push server are based on user identifier, CT are sent to corresponding terminal;
S8, user property of the terminal based on active user obtain private key from security platform;
S9, security platform verify the user property of terminal active user, and private key is generated based on MSK by rear
SK;
SK is sent to terminal by S10, security platform;
S11, terminal are based on SK, run decipherment algorithm, are decrypted to CT, obtain target data M.
Certainly, it is retouched referring also to the correlation in various embodiments of the present invention about the detailed functions respectively held in above system
It states, alternatively, in practical applications, according to data-pushing needs, each end can also have more less functions, each step to hold
Row sequence can also change (such as can first step S3, then execute step S1 and S2), no longer repeat one by one herein.
In embodiments of the present invention, firstly, since there is different users different user properties, the user property to be difficult to
It is acquired by the miscellaneous equipment except the terminal of application server and the user, therefore, at least one user can be obtained and belonged to
Property as target user's attribute, and then based on target user's attribute determine data-pushing strategy, and be based on data-pushing strategy pair
Target data is encrypted, and obtained encryption data only can be by the terminal where the user identifier with target user's attribute
Decryption can make the equipment in addition to the terminal of application server and the user be difficult to perceive pushed data content, from
And improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Secondly, terminal is able to record customer incident, is determined associated by the user identifier with active user based on customer incident
User property, the user identifier of active user and associated user property are submitted into application server, so as to logical
Usage behavior of the user to application is crossed, determines user property possessed by user, is reduced and is submitted error by user or be difficult to
The caused problem for obtaining user property inaccuracy of situations such as subjectivity determines, that is, improve the accuracy for obtaining user property, carry
High interaction effect and experience.
In addition, application server can be from the public key of security platform, it is ensured that data-pushing process can be encrypted
Reliability, and then improve the safety and reliability of data-pushing.
In addition, the user identifier of the active user and associated user property can be supplied to the safety by terminal
Platform, it is ensured that security platform can verify the user property of user, and provide the terminal with private key, reduce ciphertext data
Be pushed server can miscellaneous equipment decryption possibility, further improve the safety of data-pushing.
It should be noted that for embodiment of the method above-mentioned, for simple description, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence, because according to
According to the present invention, certain steps can be performed in other orders or simultaneously.Next, those skilled in the art should also know that,
Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Example IV
With reference to Fig. 6, a kind of structure diagram of data-pushing device in the embodiment of the present invention is shown.The device can wrap
It includes:
First acquisition module 601, for obtaining at least one user property as target user's attribute;
Determining module 602, for determining data-pushing strategy based on target user's attribute;
Encrypting module 603, for the public key that push strategy and security platform are announced based on the data, by being based on attribute
Encryption Algorithm target data is encrypted, obtain ciphertext data;
Pushing module 604, for passing through push server by the ciphertext data-pushing to terminal.
Optionally, described device further includes:
Second acquisition module, for obtaining public key from the security platform.
Optionally, the pushing module includes:
Determination sub-module determines user identifier for push strategy based on the data;
Sending submodule, for the user identifier and the ciphertext data to be sent to the push server, so that
The ciphertext data are sent to the corresponding terminal of the user identifier by the push server.
Optionally, described device further includes:
Module is provided, for being supplied to institute by multiple user identifiers and respectively with the associated user property of each user identifier
Security platform is stated, so that the security platform is based on the multiple user identifier and the associated user property of each user identifier,
User property is verified possessed by the user current to the terminal, and feeds back private to the terminal after being verified
Key.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered
It is acquired with the miscellaneous equipment except the terminal of server and the user, therefore, at least one user property can be obtained and made
For target user's attribute, and then data-pushing strategy is determined based on target user's attribute, and based on data-pushing strategy to target
Data are encrypted, and obtained encryption data only can be by the terminal solution where the user identifier with target user's attribute
It is close, the equipment in addition to the terminal of application server and the user can be made to be difficult to perceive pushed data content, to
Improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Embodiment five
With reference to Fig. 7, a kind of structure diagram of data-pushing device in the embodiment of the present invention is shown.The device can wrap
It includes:
First acquisition module 701, for obtaining the ciphertext data that application server pushes from push server, wherein institute
The public key that ciphertext data are announced by the application server based on data-pushing strategy and security platform is stated, by based on attribute
Encryption Algorithm is encrypted to obtain to target data;
Second acquisition module 702 is used for based on the user property associated by the user identifier with active user, from the peace
Full platform obtains private key;
Deciphering module 703 is decrypted the ciphertext data for being based on the private key, obtains the target data.
Optionally, second acquisition module includes:
Submodule is provided, for the user identifier of the active user and associated user property to be supplied to the peace
Full platform, so that the security platform verifies user property possessed by the active user, and after being verified,
Determine private key corresponding with user property possessed by the active user;
Receiving submodule, the private key for receiving the security platform feedback.
Optionally, described device further includes:
Logging modle, for recording customer incident;
Determining module, for determining the user associated by the user identifier with the active user based on the customer incident
Attribute;
Module is submitted, for the user identifier of the active user and associated user property to be submitted to the application
Server, so that the application server is based on user property possessed by user to terminal propelling data.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered
It is acquired with the miscellaneous equipment except the terminal of server and the user, and the encryption data accessed by terminal is taken by application
The public key that business device is announced based on data-pushing strategy and security platform carries out target data by the Encryption Algorithm based on attribute
Encryption obtains, which needs the user property associated by the user identifier based on active user, and private key is obtained from security platform
Encryption data is decrypted.Therefore when the user property possessed by the terminal active user meets the data-pushing strategy,
The encryption data can be decrypted in accessed key, can make except application server and the user terminal it
Outer equipment is difficult to perceive pushed data content, to improve the safety of data-pushing process, it is ensured that user and
The data safety of the privacy of application developers.
For above-mentioned data-pushing device embodiment, since it is basically similar to the method embodiment, so description
Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that be:The arbitrary combination application of above-mentioned each embodiment is all feasible, therefore
Arbitrary combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited,
This is not just detailed one by one.
Data push method and device be not solid with any certain computer, virtual system or miscellaneous equipment provided herein
There is correlation.Various general-purpose systems can also be used together with teaching based on this.As described above, construction has this hair
Structure required by the system of bright scheme is obvious.In addition, the present invention is not also directed to any certain programmed language.It should
Understand, various programming languages can be utilized to realize the content of invention described herein, and language-specific is done above
Description is to disclose the preferred forms of the present invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each inventive aspect,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect
Shield the present invention claims the more features of feature than being expressly recited in each claim.More precisely, such as right
As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool
Thus claims of body embodiment are expressly incorporated in the specific implementation mode, wherein each claim conduct itself
The separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment
Change and they are arranged in the one or more equipment different from the embodiment.It can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it may be used any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit requires, abstract and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of arbitrary
It mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to run on one or more processors
Software module realize, or realized with combination thereof.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) realize data push method according to the ... of the embodiment of the present invention i.e. device scheme
In some or all components some or all functions.The present invention is also implemented as described herein for executing
Some or all equipment or program of device (for example, computer program and computer program product) of method.In this way
Realization the present invention program can may be stored on the computer-readable medium, or can with one or more signal shape
Formula.Such signal can be downloaded from internet website and be obtained, and either be provided on carrier signal or with any other shape
Formula provides.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference mark between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be by the same hardware branch
To embody.The use of word first, second, and third does not indicate that any sequence.These words can be explained and be run after fame
Claim.
Claims (14)
1. a kind of data push method, which is characterized in that the method includes:
At least one user property is obtained as target user's attribute;
Data-pushing strategy is determined based on target user's attribute;
The public key that push strategy and security platform are announced based on the data, by the Encryption Algorithm based on attribute to target data
It is encrypted, obtains ciphertext data;
By push server by the ciphertext data-pushing to terminal.
2. according to the method described in claim 1, it is characterized in that, it is described by the Encryption Algorithm based on attribute to number of targets
According to before being encrypted, the method further includes:
Public key is obtained from the security platform.
3. according to the method described in claim 1, it is characterized in that, it is described by push server by the ciphertext data-pushing
Include to terminal:
Push strategy determines user identifier based on the data;
The user identifier and the ciphertext data are sent to the push server, so that the push server will be described
Ciphertext data are sent to the corresponding terminal of the user identifier.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
It is supplied to the security platform by multiple user identifiers and respectively with the associated user property of each user identifier, so that institute
It states security platform and is based on the multiple user identifier and the associated user property of each user identifier, the use current to the terminal
User property possessed by family is verified, and feeds back private key to the terminal after being verified.
5. a kind of data push method, which is characterized in that the method includes:
The ciphertext data that application server pushes are obtained from push server, wherein the ciphertext data are by the application service
The public key that device is announced based on data-pushing strategy and security platform, adds target data by the Encryption Algorithm based on attribute
It is close to obtain;
Based on the user property associated by the user identifier with active user, private key is obtained from the security platform;
The ciphertext data are decrypted based on the private key, obtain the target data.
6. according to the method described in claim 5, it is characterized in that, associated by the user identifier based on active user
User property, obtaining private key from the security platform includes:
The user identifier of the active user and associated user property are supplied to the security platform, so that the safety
Platform verifies user property possessed by the active user, and after being verified, and determines and the active user
The corresponding private key of possessed user property;
Receive the private key of the security platform feedback.
7. according to the method described in claim 5, it is characterized in that, the method further includes:
Record customer incident;
The user property associated by the user identifier with the active user is determined based on the customer incident;
The user identifier of the active user and associated user property are submitted into the application server, so that described answer
User property possessed by user is based on to terminal propelling data with server.
8. a kind of data-pushing device, which is characterized in that described device includes:
First acquisition module, for obtaining at least one user property as target user's attribute;
Determining module, for determining data-pushing strategy based on target user's attribute;
Encrypting module passes through the encryption based on attribute for the public key that push strategy and security platform are announced based on the data
Target data is encrypted in algorithm, obtains ciphertext data;
Pushing module, for passing through push server by the ciphertext data-pushing to terminal.
9. device according to claim 8, which is characterized in that described device further includes:
Second acquisition module, for obtaining public key from the security platform.
10. device according to claim 8, which is characterized in that the pushing module includes:
Determination sub-module determines user identifier for push strategy based on the data;
Sending submodule, for the user identifier and the ciphertext data to be sent to the push server, so that described
The ciphertext data are sent to the corresponding terminal of the user identifier by push server.
11. device according to claim 8, which is characterized in that described device further includes:
Module is provided, for being supplied to the peace by multiple user identifiers and respectively with the associated user property of each user identifier
Full platform, so that the security platform is based on the multiple user identifier and the associated user property of each user identifier, to institute
It states user property possessed by the current user of terminal to verify, and private key is fed back to the terminal after being verified.
12. a kind of data-pushing device, which is characterized in that described device includes:
First acquisition module, for obtaining the ciphertext data that application server pushes from push server, wherein the ciphertext number
According to the public key announced based on data-pushing strategy and security platform by the application server, pass through the Encryption Algorithm based on attribute
Target data is encrypted to obtain;
Second acquisition module is used for based on the user property associated by the user identifier with active user, from the security platform
Obtain private key;
Deciphering module is decrypted the ciphertext data for being based on the private key, obtains the target data.
13. device according to claim 12, which is characterized in that second acquisition module includes:
Submodule is provided, for being supplied to the safety to put down the user identifier of the active user and associated user property
Platform so that the security platform verifies user property possessed by the active user, and after being verified, determines
Private key corresponding with user property possessed by the active user;
Receiving submodule, the private key for receiving the security platform feedback.
14. device according to claim 12, which is characterized in that described device further includes:
Logging modle, for recording customer incident;
Determining module, for determining that the user associated by the user identifier with the active user belongs to based on the customer incident
Property;
Module is submitted, for the user identifier of the active user and associated user property to be submitted to the application service
Device, so that the application server is based on user property possessed by user to terminal propelling data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810308055.7A CN108712379B (en) | 2018-04-08 | 2018-04-08 | Data pushing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810308055.7A CN108712379B (en) | 2018-04-08 | 2018-04-08 | Data pushing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108712379A true CN108712379A (en) | 2018-10-26 |
CN108712379B CN108712379B (en) | 2021-05-25 |
Family
ID=63867042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810308055.7A Active CN108712379B (en) | 2018-04-08 | 2018-04-08 | Data pushing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108712379B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110225010A (en) * | 2019-05-29 | 2019-09-10 | 深圳市元征科技股份有限公司 | A kind of processing method and relevant device of PUSH message |
CN110856003A (en) * | 2019-10-17 | 2020-02-28 | 网易(杭州)网络有限公司 | Live list pushing method and device, electronic equipment and storage medium |
CN114143025A (en) * | 2021-10-27 | 2022-03-04 | 北京银盾泰安网络科技有限公司 | Cloud platform security policy management system |
CN114465976A (en) * | 2022-01-28 | 2022-05-10 | 深圳快银付信息科技有限公司 | Message distribution and aggregation method and device |
CN114979253A (en) * | 2022-05-06 | 2022-08-30 | 蚂蚁区块链科技(上海)有限公司 | Data push decision-making method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101556609A (en) * | 2009-05-19 | 2009-10-14 | 杭州信杨通信技术有限公司 | Customer behavior analysis and service system based on web contents |
CN106060762A (en) * | 2016-05-24 | 2016-10-26 | 中国联合网络通信集团有限公司 | Information pushing method, information pushing device and information pushing system |
CN107484161A (en) * | 2017-07-24 | 2017-12-15 | 国家电网公司 | A kind of efficient information push based on mobile self-grouping network and safe sharing method |
CN107657007A (en) * | 2017-09-22 | 2018-02-02 | 广东欧珀移动通信有限公司 | Information-pushing method, device, terminal, readable storage medium storing program for executing and system |
CN107707510A (en) * | 2016-08-09 | 2018-02-16 | 北京奇虎科技有限公司 | A kind of information-pushing method, apparatus and system |
-
2018
- 2018-04-08 CN CN201810308055.7A patent/CN108712379B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101556609A (en) * | 2009-05-19 | 2009-10-14 | 杭州信杨通信技术有限公司 | Customer behavior analysis and service system based on web contents |
CN106060762A (en) * | 2016-05-24 | 2016-10-26 | 中国联合网络通信集团有限公司 | Information pushing method, information pushing device and information pushing system |
CN107707510A (en) * | 2016-08-09 | 2018-02-16 | 北京奇虎科技有限公司 | A kind of information-pushing method, apparatus and system |
CN107484161A (en) * | 2017-07-24 | 2017-12-15 | 国家电网公司 | A kind of efficient information push based on mobile self-grouping network and safe sharing method |
CN107657007A (en) * | 2017-09-22 | 2018-02-02 | 广东欧珀移动通信有限公司 | Information-pushing method, device, terminal, readable storage medium storing program for executing and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110225010A (en) * | 2019-05-29 | 2019-09-10 | 深圳市元征科技股份有限公司 | A kind of processing method and relevant device of PUSH message |
CN110856003A (en) * | 2019-10-17 | 2020-02-28 | 网易(杭州)网络有限公司 | Live list pushing method and device, electronic equipment and storage medium |
CN114143025A (en) * | 2021-10-27 | 2022-03-04 | 北京银盾泰安网络科技有限公司 | Cloud platform security policy management system |
CN114143025B (en) * | 2021-10-27 | 2023-09-05 | 浙江银盾云科技有限公司 | Cloud platform security policy management system |
CN114465976A (en) * | 2022-01-28 | 2022-05-10 | 深圳快银付信息科技有限公司 | Message distribution and aggregation method and device |
CN114979253A (en) * | 2022-05-06 | 2022-08-30 | 蚂蚁区块链科技(上海)有限公司 | Data push decision-making method and device |
CN114979253B (en) * | 2022-05-06 | 2024-03-12 | 蚂蚁区块链科技(上海)有限公司 | Data push decision method, device, medium and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108712379B (en) | 2021-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108712379A (en) | Data push method and device | |
WO2019179537A2 (en) | System and method for implementing a resolver service for decentralized identifiers | |
CN109478280A (en) | Method and system for realizing block chain | |
CN109756582A (en) | Information recording method, device, node and storage medium in block chain network | |
CN110383760A (en) | User's control, distributing, distribution and safety content distribution | |
CN112182644A (en) | Data processing method and device and electronic equipment | |
CN111108521A (en) | Implementing a blockchain based workflow | |
CN109583215A (en) | It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems | |
CN116049626A (en) | Data statistics method, device, equipment and storage medium | |
CN109754226B (en) | Data management method, device and storage medium | |
CN112434334A (en) | Data processing method, device, equipment and storage medium | |
JP2021175193A (en) | Multicast encryption scheme for data ownership platform | |
CN110634068A (en) | Community-chain-based credit investigation data processing method and system | |
CN115203749A (en) | Data transaction method and system based on block chain | |
CN109274500A (en) | A kind of key downloading method, client, encryption device and terminal device | |
Abubaker et al. | Trustful data trading through monetizing IoT data using BlockChain based review system | |
CN111523142A (en) | Data processing method, device, electronic equipment and medium | |
CN113886883A (en) | Internet of things data management method and device | |
CN114514550A (en) | Partitioning requests into blockchains | |
CN115001720B (en) | Optimization method, device, medium and equipment for safe transmission of federal learning modeling | |
US20230275751A1 (en) | Decentralized Cryptography | |
CN106295366A (en) | Sensitive data recognition methods and device | |
CN115809482B (en) | Data aggregation calculation method, device, medium and equipment based on random number confusion | |
CN110213216B (en) | Method, device and storage medium for determining same account in different account sets | |
CN115022012B (en) | Data transmission method, device, system, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |