CN108712379A - Data push method and device - Google Patents

Data push method and device Download PDF

Info

Publication number
CN108712379A
CN108712379A CN201810308055.7A CN201810308055A CN108712379A CN 108712379 A CN108712379 A CN 108712379A CN 201810308055 A CN201810308055 A CN 201810308055A CN 108712379 A CN108712379 A CN 108712379A
Authority
CN
China
Prior art keywords
user
data
property
terminal
security platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810308055.7A
Other languages
Chinese (zh)
Other versions
CN108712379B (en
Inventor
张晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201810308055.7A priority Critical patent/CN108712379B/en
Publication of CN108712379A publication Critical patent/CN108712379A/en
Application granted granted Critical
Publication of CN108712379B publication Critical patent/CN108712379B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The present invention provides a kind of data push method and devices, are related to Internet technical field.The data push method includes:At least one user property is obtained as target user's attribute, data-pushing strategy is determined based on target user's attribute, the public key that push strategy and security platform are announced based on the data, target data is encrypted by the Encryption Algorithm based on attribute, ciphertext data are obtained, by push server by the ciphertext data-pushing to terminal.The present invention can improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.

Description

Data push method and device
Technical field
The present invention relates to Internet technical fields, more particularly to a kind of data push method and device.
Background technology
With the development of Internet technology and popularizing for various terminals, terminal will receive largely pushing away from application server Send data.Also the data of application server push can be received in the case of to make the no longer running background of the application in terminal, Application service will can first need the target data that pushes to be sent to push server, and then by push server by the number of targets According to being sent to terminal.
In the prior art, in order to ensure the safety of propelling data process, above-mentioned data-pushing passes through SSL (Secure Sockets Layer, Secure Socket Layer) symmetric cryptographies such as/TLS (Transport Layer Security, Transport Layer Security) Agreement is encrypted, so that it is guaranteed that safety of the target data of push between application server, push server and terminal, But due to being encrypted by symmetrical encryption protocol, so as third-party push Server can easily be decrypted the target data, and safety is poor, it is difficult to ensure the privacy of application developers and user And data safety.
Invention content
In view of the above problems, it is proposed that the present invention overcoming the above problem in order to provide one kind or solves at least partly State the data push method and device of problem.
One side according to the present invention provides a kind of data push method, the method includes:
At least one user property is obtained as target user's attribute;
Data-pushing strategy is determined based on target user's attribute;
The public key that push strategy and security platform are announced based on the data, by the Encryption Algorithm based on attribute to target Data are encrypted, and obtain ciphertext data;
By push server by the ciphertext data-pushing to terminal.
Optionally, it is described target data is encrypted by the Encryption Algorithm based on attribute before, the method is also Including:
Public key is obtained from the security platform.
Optionally, described to include to terminal by the ciphertext data-pushing by push server:
Push strategy determines user identifier based on the data;
The user identifier and the ciphertext data are sent to the push server, so that the push server will The ciphertext data are sent to the corresponding terminal of the user identifier.
Optionally, the method further includes:
It is supplied to the security platform by multiple user identifiers and respectively with the associated user property of each user identifier, with The security platform is set to be based on the multiple user identifier and the associated user property of each user identifier, it is current to the terminal User possessed by user property verify, and after being verified to the terminal feed back private key.
One side according to the present invention provides a kind of data push method, the method includes:
The ciphertext data that application server pushes are obtained from push server, wherein the ciphertext data are by the application The public key that server is announced based on data-pushing strategy and security platform, by the Encryption Algorithm based on attribute to target data into Row encryption obtains;
Based on the user property associated by the user identifier with active user, private key is obtained from the security platform;
The ciphertext data are decrypted based on the private key, obtain the target data.
Optionally, the user property associated by the user identifier based on active user, is obtained from the security platform The private key is taken to include:
The user identifier of the active user and associated user property are supplied to the security platform, so that described Security platform verifies user property possessed by the active user, and after being verified, and determines and described current The corresponding private key of user property possessed by user;
Receive the private key of the security platform feedback.
Optionally, the method further includes:
Record customer incident;
The user property associated by the user identifier with the active user is determined based on the customer incident;
The user identifier of the active user and associated user property are submitted into the application server, so that institute It states application server and is based on user property possessed by user to terminal propelling data.
According to another aspect of the present invention, a kind of data-pushing device is provided, described device includes:
First acquisition module, for obtaining at least one user property as target user's attribute;
Determining module, for determining data-pushing strategy based on target user's attribute;
Encrypting module, for the public key that push strategy and security platform are announced based on the data, by based on attribute Target data is encrypted in Encryption Algorithm, obtains ciphertext data;
Pushing module, for passing through push server by the ciphertext data-pushing to terminal.
Optionally, described device further includes:
Second acquisition module, for obtaining public key from the security platform.
Optionally, the pushing module includes:
Determination sub-module determines user identifier for push strategy based on the data;
Sending submodule, for the user identifier and the ciphertext data to be sent to the push server, so that The ciphertext data are sent to the corresponding terminal of the user identifier by the push server.
Optionally, described device further includes:
Module is provided, for being supplied to institute by multiple user identifiers and respectively with the associated user property of each user identifier Security platform is stated, so that the security platform is based on the multiple user identifier and the associated user property of each user identifier, User property is verified possessed by the user current to the terminal, and feeds back private to the terminal after being verified Key.
According to another aspect of the present invention, a kind of data-pushing device is provided, described device includes:
First acquisition module, for obtaining the ciphertext data that application server pushes from push server, wherein described close The public key that literary data are announced by the application server based on data-pushing strategy and security platform, passes through the encryption based on attribute Algorithm is encrypted to obtain to target data;
Second acquisition module is used for based on the user property associated by the user identifier with active user, from the safety Platform obtains private key;
Deciphering module is decrypted the ciphertext data for being based on the private key, obtains the target data.
Optionally, second acquisition module includes:
Submodule is provided, for the user identifier of the active user and associated user property to be supplied to the peace Full platform, so that the security platform verifies user property possessed by the active user, and after being verified, Determine private key corresponding with user property possessed by the active user;
Receiving submodule, the private key for receiving the security platform feedback.
Optionally, described device further includes:
Logging modle, for recording customer incident;
Determining module, for determining the user associated by the user identifier with the active user based on the customer incident Attribute;
Module is submitted, for the user identifier of the active user and associated user property to be submitted to the application Server, so that the application server is based on user property possessed by user to terminal propelling data.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered It is acquired with the miscellaneous equipment except the terminal of server and the user, therefore, at least one user property can be obtained and made For target user's attribute, and then data-pushing strategy is determined based on target user's attribute, and based on data-pushing strategy to target Data are encrypted, and obtained encryption data only can be by the terminal solution where the user identifier with target user's attribute It is close, the equipment in addition to the terminal of application server and the user can be made to be difficult to perceive pushed data content, to Improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, below the special specific implementation mode for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is a kind of step flow chart of according to embodiments of the present invention one data push method;
Fig. 2 is a kind of step flow chart of according to embodiments of the present invention two data push method;
Fig. 3 is a kind of step flow chart of according to embodiments of the present invention three data push method;
Fig. 4 is a kind of schematic diagram of according to embodiments of the present invention three data delivery system;
Fig. 5 is a kind of sequence diagram of according to embodiments of the present invention three data push method;
Fig. 6 is a kind of structure diagram of according to embodiments of the present invention four data-pushing device;
Fig. 7 is a kind of structure diagram of according to embodiments of the present invention five data-pushing device.
Specific implementation mode
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
Embodiment one
Referring to Fig.1, a kind of step flow chart of data push method in the embodiment of the present invention is shown.This method can be with Applied in application server, specific steps include:
Step 101, at least one user property is obtained as target user's attribute.
Since application server can provide service for multiple users, and different users can have different users to belong to Property, for example, subscribe to or pay close attention to different types of data, with all ages and classes, in different nationalities etc., and the user of each user Attribute is easy to by the terminal of application server and the user, and is difficult to by other not by the equipment of application server or authorization terminal It acquires, therefore, for the ease of subsequently the data pushed are encrypted in the user property based on user, makes except application Equipment except the terminal of server and the user is difficult to perceive pushed data content, improves the safety of propelling data process Property, the privacy and data safety of user and application developers are protected, target user's attribute can be obtained.
User property is feature possessed by user, which can submit to obtain by receiving user, alternatively, can be with The usage behavior of application is analyzed to obtain according to user.
For example, user property may include concern or the other users subscribed to or topic, age, nationality, religious belief, institute Locate at least one of geographical location, hobby, income level, consuming capacity etc..Certainly, in practical applications, the user Attribute can also include other information for capableing of feature possessed by user.
Terminal may include mobile phone, computer or wearable device, and certainly, in practical applications, which can also include Other types of equipment.Can be installed in the terminal with it is aforementioned in the corresponding application of application server, answered thereby using this With service provided by the server.
Application server can from multiple terminals obtain different user possessed by user property, to collect obtain it is multiple User property, and select at least one as target user's attribute in multiple user property and carry out propelling data.
Since different users has different user properties, thus the required data pushed to different users also may be used To match with user property possessed by the user, different data are pushed accurately to be corresponded to different users.So can With according to the data pushed, the matched at least one user property of selection institute;Alternatively, at least one use can also be randomly choosed Then family attribute is determined to the data for meeting the corresponding user of selected user property and being pushed.
Certainly, in practical applications, at least one user property can also be selected to be used as target otherwise Family attribute.
Step 102, data-pushing strategy is determined based on target user's attribute.
From the foregoing it will be appreciated that target user's attribute includes at least one user property, therefore in order to further accurately determine The user of pushed data will be obtained, propelling data accuracy is improved, can determine that data push away according to target user's attribute Send strategy.
Data-pushing strategy is made of a user property or multiple multiple user properties by logical operator connection, So as to illustrate to obtain user property possessed by the user of pushed data.The data-pushing strategy can be by answering It is received to submit with server and be obtained, alternatively, can be by the application server according to mode set in advance, according to currently being pushed away The data sent determine to obtain.
For example, target user's attribute includes " concern user A " and " concern user B ", if necessary to give certain data-pushing The user for paying close attention to user A or B can then determine that data-pushing strategy is { concern user A OR pay close attention to user B }.
Step 103, the public key that push strategy and security platform are announced based on the data, is calculated by the encryption based on attribute Target data is encrypted in method, obtains ciphertext data.
During reducing the data-pushing by symmetric cryptography, the data pushed may be pushed the thirds such as server Method, apparatus is obtained and is decrypted, and the problem of to perceive pushed data, improves the safety of data-pushing, it is ensured that Yong Huhe The privacy and data safety of application developers can carry out the target data pushed by the Encryption Algorithm based on attribute Encryption.
Encryption Algorithm based on attribute is a kind of one-to-many Encryption Algorithm.The algorithm can pass through attribute set or access Data are encrypted in strategy, and encrypted data can be combined by the attribute or data-pushing strategy is decrypted, when and only When attribute set meets the access strategy, encrypted data can correctly be decrypted.For example, application server is to end The target data of end push passes through data-pushing strategy:{ concern user A OR concern users B } is encrypted, then for getting The terminal of the target data is paid close attention to if user property possessed by the current user of the terminal meets the data-pushing strategy User A has paid close attention to user B, can encrypted target data be decrypted.
Security platform can be used as attribute authority (aa) mechanism, the security platform that can be provided to application server based on attribute Public key needed for encryption, so that target data can be encrypted in application server.
Security platform is initialized, and security parameter k is inputted, and exports public key PK and master key MSK, wherein PK=G0,g, H=gβ, f=g1/β,e(g,g)αIt is disclosed to be acquired by miscellaneous equipment, it can be used for application server to data It is encrypted;MSK=(β, gα) it is secrecy, for subsequently generating key for terminal.
Wherein, G0The Bilinear Groups for being p for a Prime Orders, g are G0Generation member, k is for determining the big of the Bilinear Groups Small, α and β are finite field ZpIn two random elements, h and f are the parameter being calculated.
Wherein, security platform generates public key, private key referring also to the associated description in follow-up, no longer goes to live in the household of one's in-laws on getting married one by one herein It states.
It should be noted that public key in the embodiment of the present invention be application server in advance (such as to target data into Before row encryption) obtain and stored from security platform.Can also be to need to add target data in each determination It is obtained from the security platform when close.Certainly, in practical applications, application server can also obtain the peace otherwise The public key that full platform is announced, for example, receiving the public key of the security platform of miscellaneous equipment forwarding or receiving related technical personnel Submission obtains the public key etc. of the security platform.
Target data is the data pushed to user, which can be determined by application server.For example, the target Data can be an application message.
The Encryption Algorithm based on attribute can be passed through according to data-pushing strategy T, target data M and public key PK Encrypt (), is encrypted M.In ciphering process, the attribute in data-pushing strategy can regard a node x as, be Each node x constructions multinomial is qx, the collection that all nodes are constituted is combined into Y, and att (y) is the attribute value of attribute represented by node, then Calculate to obtain encrypted target data, i.e. ciphertext dataC=hs,
Wherein, s ZpIn random element.
Step 104, by push server by the ciphertext data-pushing to terminal.
From the foregoing it will be appreciated that only the current user of terminal just has the user property for meeting data-pushing strategy, the terminal The ciphertext data can be decrypted, and the miscellaneous equipment in addition to the terminal of application server and the user, for example push away Send server, it is difficult to user property possessed by the user is got, is also just difficult to decrypt to obtain target data, it therefore, can be with The ciphertext data are pushed to terminal by push server, push server can be reduced and obtain the possibility of the target data, Improve the safety of data-pushing, it is ensured that the privacy and data safety of user and application developers.
Push server be future self-application server data forwarding to terminal server, for example, the Push Service Device may include APNs (Apple Push Notification service, apple push notification service) server.
Ciphertext data can be sent to push server by application server, be supplied to from push server by ciphertext data Terminal.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered It is acquired with the miscellaneous equipment except the terminal of server and the user, therefore, at least one user property can be obtained and made For target user's attribute, and then data-pushing strategy is determined based on target user's attribute, and based on data-pushing strategy to target Data are encrypted, and obtained encryption data only can be by the terminal solution where the user identifier with target user's attribute It is close, the equipment in addition to the terminal of application server and the user can be made to be difficult to perceive pushed data content, to Improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Embodiment two
With reference to Fig. 2, a kind of step flow chart of data push method in the embodiment of the present invention is shown.This method can be with Applied in terminal, specific steps include:
Step 201, from push server obtain application server push ciphertext data, wherein the ciphertext data by The public key that the application server is announced based on data-pushing strategy and security platform, by the Encryption Algorithm based on attribute to mesh Mark data are encrypted to obtain.
In order to get the data that application server is pushed, ciphertext data can be obtained from push server.And due to The public key that the encryption data is announced by application server based on data-pushing strategy and security platform, passes through the encryption based on attribute Algorithm is encrypted to obtain to target data, and obtained encryption data only can be by the user identifier with target user's attribute The terminal deciphering at place can make the equipment in addition to the terminal of application server and the user be difficult to perceive pushed number According to content, to improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Wherein, the public key that application server is issued based on data-pushing strategy and security platform passes through adding based on attribute The mode that the target data to be pushed is encrypted in close algorithm, may refer to it is aforementioned in associated description, it is not another herein One repeats.
Step 202, it based on the user property associated by the user identifier with active user, is obtained from the security platform private Key.
From the foregoing it will be appreciated that ciphertext data are the public affairs issued based on data-pushing strategy and security platform by application server Key is encrypted by the Encryption Algorithm based on attribute, and can only be met data-pushing strategy by user property when carries out Therefore decryption for the ease of subsequently ciphertext data are decrypted, can obtain private key from security platform.
User identifier is the mark of user, which may include user name, the pet name, User ID At least one of (Identification, identity card) and the Termination ID of place terminal etc.
The user identifier of active user and associated user property can be supplied to safe cloud platform by terminal, or will The user identifier is supplied to safe cloud platform, and security platform can verify user property possessed by the user, to end End provides private key, in order to which the target data can be decrypted in the terminal.It can be seen from the above, due to obtaining private key needs pair User property possessed by user is verified, and the third party devices such as push server are difficult to perceive user possessed by user and belong to Property, being also just difficult to acquire certainly can be to the private key that ciphertext data are decrypted, and then is difficult to acquire target data, Improve the safety of propelling data, it is ensured that the privacy and data safety of user and application developers.
Security platform can obtain (such as from application server obtain) in advance and store the user identifier of multiple users with And the user property that each user identifier is respectively associated.When getting the user identifier and user property of terminal offer, Ke Yigen According to the user identifier, from the user identifier and user property of storage, acquisition and the user property associated by the user identifier, if Acquired user property includes the user property that the terminal is provided, it is determined that this is verified, and is provided to the terminal private Otherwise key determines that verification does not pass through, and does not provide private key to the terminal.It, can be with when only getting the user identifier of terminal offer Directly according to the user identifier, from the user identifier and user property of storage, obtain and the user associated by the user identifier Attribute provides private key according in acquired user property to the terminal.
Security platform can utilize the MSK retained, run key schedule KeyGen, generate private keyThe private key and the private is calculated The user property of key corresponds to, for example, in embodiments of the present invention, the terminal where the user identifier with target user's attribute, The private key obtained from security platform is corresponding with target user's attribute.
Wherein, S is user property set, j ∈ S, rj∈ZP
Step 203, the ciphertext data are decrypted based on the private key, obtain the target data.
If user property possessed by the current user of terminal, meets application server and destination application server is carried out Used data-pushing strategy when encryption can then be decrypted the ciphertext data;Certainly, if the current user of the terminal Possessed user property does not meet used data-pushing when destination application server is encrypted in application server Strategy cannot then be decrypted the ciphertext data.
Terminal can run decipherment algorithm when receiving ciphertext data, input private key SK and ciphertext data CT, obtain target Data
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered It is acquired with the miscellaneous equipment except the terminal of server and the user, and the encryption data accessed by terminal is taken by application The public key that business device is announced based on data-pushing strategy and security platform carries out target data by the Encryption Algorithm based on attribute Encryption obtains, which needs the user property associated by the user identifier based on active user, and private key is obtained from security platform Encryption data is decrypted.Therefore when the user property possessed by the terminal active user meets the data-pushing strategy, The encryption data can be decrypted in accessed key, can make except application server and the user terminal it Outer equipment is difficult to perceive pushed data content, to improve the safety of data-pushing process, it is ensured that user and The data safety of the privacy of application developers.
Embodiment three
With reference to Fig. 3, a kind of step flow chart of data push method in the embodiment of the present invention is shown.This method can be with Applied in data delivery system, specific steps include:
Step 301, application server obtains multiple user identifiers from terminal and belongs to respectively with each associated user of mark Property.
For the ease of subsequently can accurately according to user property to each user's propelling data, determine data-pushing strategy pair Data improve accuracy and the safety of data-pushing so that data-pushing process to be encrypted, and application server can be from end Collect user identifier and associated user property in end.
Terminal can be submitted by receiving user or be analyzed the usage behavior of application user, to obtain It is sent to application server to user property, and by the user property and associated user identifier.Correspondingly, application server It can be from the user identifier and associated user property that multiple terminals are sent be received, to obtain multiple user identifiers and divide Not with the associated user property of each user identifier.
Terminal can provide a user user property and submit entrance, and it includes that setting user belongs to which, which submits entrance, Property relevant information, so as to pass through the user property submit entrance, receive user submit user property.
In embodiments of the present invention, optionally, situations such as slipping up or being difficult to subjective determination is submitted by user in order to reduce It is caused obtain user property inaccuracy problem, in order to improve obtain user property accuracy, improve interaction effect with Experience, terminal can record customer incident, be determined associated by the user identifier with the active user based on the customer incident User property, the user identifier of the active user and associated user property are submitted into the application server, with The application server is set to be based on user property possessed by user to terminal propelling data.It that is to say, by user to application Usage behavior, determine user property possessed by user.
Customer incident is the event that user carries out application operation generation, which may include concern event, comment thing Part, reading event, thumbs up event, purchase events or at least one of event of making a reservation etc. at event of posting, and certainly, is actually answering Can also include other events in.
Terminal can be for statistical analysis to customer incident, including machine learning model, neural network model, grader etc. Statistical classification is carried out to customer incident, the user property with user-association is determined, it is of course also possible to which the customer incident of record is carried Related technical personnel are supplied, are determined and the user property of user-association according to customer incident by related technical personnel.
By taking concern event as an example, when be recorded user to " user A " click concern button when, that is, be recorded to " user The concern event of A ", it may be determined that the user property of the user is " concern user A ".By taking comment event as an example, when user is to " words When inscribing the number of reviews of the content of A " more than comment threshold value, it may be determined that user property is " concern topic A ", wherein threshold value can To be determined in advance by terminal.By taking purchase events as an example, it may be determined that the average price X of bought article in each purchase events, and And then it is " purchasing power X " to be determined as user property.
In addition, in another alternative embodiment of the present invention, the customer incident that record obtains can be sent to using clothes Business device, makes application server determine the user property with user-association based on customer incident.
In embodiments of the present invention, optionally, verification is carried out to terminal for the ease of Subsequent secure platform and led in verification Later corresponding private key is provided, it is ensured that the safety of data-pushing can be marked by multiple user identifiers and respectively with each user Know associated user property and be supplied to the security platform, so that the security platform is based on the multiple user identifier and respectively The associated user property of user identifier, user property possessed by the user current to the terminal is verified, and is being verified By rear private key is fed back to the terminal.
Wherein, security platform works as terminal to being based on multiple user identifiers and the associated user property of each user identifier The mode that user property is verified possessed by preceding user may refer to it is aforementioned in associated description, no longer go to live in the household of one's in-laws on getting married one by one herein It states.
Step 302, the application server obtains at least one user property as target user's attribute, is based on the mesh Mark user property determines data-pushing strategy.
Wherein, application service determines the mode of target user's attribute and data-pushing strategy, may refer to it is aforementioned in Associated description no longer repeats one by one herein.
Step 303, the application server obtains public key from security platform.
In order to ensure data-pushing can be encrypted in subsequent applications server, it is ensured that add to data-pushing process Close reliability, and then the safety and reliability of data-pushing is improved, public key can be obtained from security platform.
Security platform can have previously been based on the Encryption Algorithm of attribute, generate and announce public key, to make the application server Get the public key.
Wherein, security platform generate public key mode, may refer to it is aforementioned in associated description, no longer go to live in the household of one's in-laws on getting married one by one herein It states.
In addition, in practical applications, in order to improve the flexibility for obtaining public key and data-pushing, application server may be used also With any time before executing following step 304, public key is obtained from security platform.
Step 304, the application server pushes the public key that strategy and the security platform are announced based on the data, leads to It crosses the Encryption Algorithm based on attribute target data is encrypted, obtains ciphertext data.
Wherein, the mode that target data is encrypted in application server, may refer to it is aforementioned in associated description, herein No longer repeat one by one.
Step 305, the application server pushes strategy and determines user identifier based on the data, by the user identifier It is sent to push server with the ciphertext data.
Since data-pushing strategy can illustrate that user property possessed by the user of pushed data will be obtained, because This, can be according to the data-pushing strategy, and determining has the user identifier of the user property met, consequently facilitating being marked to the user Terminal propelling data where knowing.
Application server can be according to data-pushing strategy and the user property of multiple users, to multiple user identifiers It is screened, to which selection obtains the user for meeting the data-pushing strategy.
It, then can be right by the data-pushing strategy for example, data-pushing strategy is { concern user A AND pay close attention to user B } User identifier is screened, and is associated with the user identifier of " concern user A " and " concern user B " simultaneously.
Step 306, the ciphertext data are sent to the corresponding terminal of the user identifier by the push server.
The ciphertext data can be sent to each use by push server according to the ciphertext data and user identifier received In terminal where the mark of family.
Step 307, the terminal obtains the ciphertext data that the application server pushes from the push server.
Terminal can receive the ciphertext data of push server transmission.
Step 308, the user identifier of the active user and associated user property are supplied to described by the terminal Security platform.
It verifies, and obtains for the ease of the user property associated by the Subsequent secure platform user identifier current to terminal Private key is got, to reduce the possibility that ciphertext data are pushed the decryption of the miscellaneous equipments such as server, improves the safety of data-pushing, Terminal can be supplied to security platform by current user identifier and with the user property associated by the user identifier.
User property associated by current user identifier and the user identifier can be sent to security platform by terminal.
Step 309, the security platform verifies user property possessed by the active user, and logical in verification Later, private key corresponding with user property possessed by the active user is determined.
Wherein, security platform verifies the associated user property of user identifier and generates the mode of private key, Ke Yican See it is aforementioned in associated description, no longer repeat one by one herein.
Step 310, the terminal is decrypted the ciphertext data based on the private key, obtains the target data.
Wherein, the mode that terminal is decrypted ciphertext data based on private key, may refer to it is aforementioned in associated description, this Place no longer repeats one by one.
In addition, in order to further ensure that the safety of data-pushing, the data interaction between above-mentioned any two ends can lead to The symmetrical encryption protocols such as SSL/TLS are crossed to be encrypted.
For example, data delivery system provided by the present invention can with as shown in figure 4, the system include application server 01, Terminal 02, security platform 03 and push server 04.Data push method sequence diagram applied to the system is as shown in figure 5, packet It includes:
S1, user generate user property according to the usage behavior, are closed with user identifier using usage behavior, terminal is generated Connection;
User identifier and associated user property are fed back to application server by S2, terminal;
S3, security platform run initialization algorithm, input security parameter k, export common parameter PK and master key MSK, public Cloth PK;
S4, application service are asked from security platform and obtain PK;
S5, application server determine target user's attribute, data-pushing strategy T are determined according to target user's attribute, according to T It determines user identifier, target data M is encrypted by the Encryption Algorithm based on attribute based on T and PK, obtain encryption number According to CT;
CT and user identifier are sent to push server by S6, application server;
S7, push server are based on user identifier, CT are sent to corresponding terminal;
S8, user property of the terminal based on active user obtain private key from security platform;
S9, security platform verify the user property of terminal active user, and private key is generated based on MSK by rear SK;
SK is sent to terminal by S10, security platform;
S11, terminal are based on SK, run decipherment algorithm, are decrypted to CT, obtain target data M.
Certainly, it is retouched referring also to the correlation in various embodiments of the present invention about the detailed functions respectively held in above system It states, alternatively, in practical applications, according to data-pushing needs, each end can also have more less functions, each step to hold Row sequence can also change (such as can first step S3, then execute step S1 and S2), no longer repeat one by one herein.
In embodiments of the present invention, firstly, since there is different users different user properties, the user property to be difficult to It is acquired by the miscellaneous equipment except the terminal of application server and the user, therefore, at least one user can be obtained and belonged to Property as target user's attribute, and then based on target user's attribute determine data-pushing strategy, and be based on data-pushing strategy pair Target data is encrypted, and obtained encryption data only can be by the terminal where the user identifier with target user's attribute Decryption can make the equipment in addition to the terminal of application server and the user be difficult to perceive pushed data content, from And improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Secondly, terminal is able to record customer incident, is determined associated by the user identifier with active user based on customer incident User property, the user identifier of active user and associated user property are submitted into application server, so as to logical Usage behavior of the user to application is crossed, determines user property possessed by user, is reduced and is submitted error by user or be difficult to The caused problem for obtaining user property inaccuracy of situations such as subjectivity determines, that is, improve the accuracy for obtaining user property, carry High interaction effect and experience.
In addition, application server can be from the public key of security platform, it is ensured that data-pushing process can be encrypted Reliability, and then improve the safety and reliability of data-pushing.
In addition, the user identifier of the active user and associated user property can be supplied to the safety by terminal Platform, it is ensured that security platform can verify the user property of user, and provide the terminal with private key, reduce ciphertext data Be pushed server can miscellaneous equipment decryption possibility, further improve the safety of data-pushing.
It should be noted that for embodiment of the method above-mentioned, for simple description, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence, because according to According to the present invention, certain steps can be performed in other orders or simultaneously.Next, those skilled in the art should also know that, Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Example IV
With reference to Fig. 6, a kind of structure diagram of data-pushing device in the embodiment of the present invention is shown.The device can wrap It includes:
First acquisition module 601, for obtaining at least one user property as target user's attribute;
Determining module 602, for determining data-pushing strategy based on target user's attribute;
Encrypting module 603, for the public key that push strategy and security platform are announced based on the data, by being based on attribute Encryption Algorithm target data is encrypted, obtain ciphertext data;
Pushing module 604, for passing through push server by the ciphertext data-pushing to terminal.
Optionally, described device further includes:
Second acquisition module, for obtaining public key from the security platform.
Optionally, the pushing module includes:
Determination sub-module determines user identifier for push strategy based on the data;
Sending submodule, for the user identifier and the ciphertext data to be sent to the push server, so that The ciphertext data are sent to the corresponding terminal of the user identifier by the push server.
Optionally, described device further includes:
Module is provided, for being supplied to institute by multiple user identifiers and respectively with the associated user property of each user identifier Security platform is stated, so that the security platform is based on the multiple user identifier and the associated user property of each user identifier, User property is verified possessed by the user current to the terminal, and feeds back private to the terminal after being verified Key.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered It is acquired with the miscellaneous equipment except the terminal of server and the user, therefore, at least one user property can be obtained and made For target user's attribute, and then data-pushing strategy is determined based on target user's attribute, and based on data-pushing strategy to target Data are encrypted, and obtained encryption data only can be by the terminal solution where the user identifier with target user's attribute It is close, the equipment in addition to the terminal of application server and the user can be made to be difficult to perceive pushed data content, to Improve the safety of data-pushing process, it is ensured that the data safety of the privacy of user and application developers.
Embodiment five
With reference to Fig. 7, a kind of structure diagram of data-pushing device in the embodiment of the present invention is shown.The device can wrap It includes:
First acquisition module 701, for obtaining the ciphertext data that application server pushes from push server, wherein institute The public key that ciphertext data are announced by the application server based on data-pushing strategy and security platform is stated, by based on attribute Encryption Algorithm is encrypted to obtain to target data;
Second acquisition module 702 is used for based on the user property associated by the user identifier with active user, from the peace Full platform obtains private key;
Deciphering module 703 is decrypted the ciphertext data for being based on the private key, obtains the target data.
Optionally, second acquisition module includes:
Submodule is provided, for the user identifier of the active user and associated user property to be supplied to the peace Full platform, so that the security platform verifies user property possessed by the active user, and after being verified, Determine private key corresponding with user property possessed by the active user;
Receiving submodule, the private key for receiving the security platform feedback.
Optionally, described device further includes:
Logging modle, for recording customer incident;
Determining module, for determining the user associated by the user identifier with the active user based on the customer incident Attribute;
Module is submitted, for the user identifier of the active user and associated user property to be submitted to the application Server, so that the application server is based on user property possessed by user to terminal propelling data.
In embodiments of the present invention, since there is different users different user properties, the user property to be difficult to be answered It is acquired with the miscellaneous equipment except the terminal of server and the user, and the encryption data accessed by terminal is taken by application The public key that business device is announced based on data-pushing strategy and security platform carries out target data by the Encryption Algorithm based on attribute Encryption obtains, which needs the user property associated by the user identifier based on active user, and private key is obtained from security platform Encryption data is decrypted.Therefore when the user property possessed by the terminal active user meets the data-pushing strategy, The encryption data can be decrypted in accessed key, can make except application server and the user terminal it Outer equipment is difficult to perceive pushed data content, to improve the safety of data-pushing process, it is ensured that user and The data safety of the privacy of application developers.
For above-mentioned data-pushing device embodiment, since it is basically similar to the method embodiment, so description Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that be:The arbitrary combination application of above-mentioned each embodiment is all feasible, therefore Arbitrary combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited, This is not just detailed one by one.
Data push method and device be not solid with any certain computer, virtual system or miscellaneous equipment provided herein There is correlation.Various general-purpose systems can also be used together with teaching based on this.As described above, construction has this hair Structure required by the system of bright scheme is obvious.In addition, the present invention is not also directed to any certain programmed language.It should Understand, various programming languages can be utilized to realize the content of invention described herein, and language-specific is done above Description is to disclose the preferred forms of the present invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect Shield the present invention claims the more features of feature than being expressly recited in each claim.More precisely, such as right As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool Thus claims of body embodiment are expressly incorporated in the specific implementation mode, wherein each claim conduct itself The separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment Change and they are arranged in the one or more equipment different from the embodiment.It can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it may be used any Combination is disclosed to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, abstract and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of arbitrary It mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to run on one or more processors Software module realize, or realized with combination thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) realize data push method according to the ... of the embodiment of the present invention i.e. device scheme In some or all components some or all functions.The present invention is also implemented as described herein for executing Some or all equipment or program of device (for example, computer program and computer program product) of method.In this way Realization the present invention program can may be stored on the computer-readable medium, or can with one or more signal shape Formula.Such signal can be downloaded from internet website and be obtained, and either be provided on carrier signal or with any other shape Formula provides.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference mark between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be by the same hardware branch To embody.The use of word first, second, and third does not indicate that any sequence.These words can be explained and be run after fame Claim.

Claims (14)

1. a kind of data push method, which is characterized in that the method includes:
At least one user property is obtained as target user's attribute;
Data-pushing strategy is determined based on target user's attribute;
The public key that push strategy and security platform are announced based on the data, by the Encryption Algorithm based on attribute to target data It is encrypted, obtains ciphertext data;
By push server by the ciphertext data-pushing to terminal.
2. according to the method described in claim 1, it is characterized in that, it is described by the Encryption Algorithm based on attribute to number of targets According to before being encrypted, the method further includes:
Public key is obtained from the security platform.
3. according to the method described in claim 1, it is characterized in that, it is described by push server by the ciphertext data-pushing Include to terminal:
Push strategy determines user identifier based on the data;
The user identifier and the ciphertext data are sent to the push server, so that the push server will be described Ciphertext data are sent to the corresponding terminal of the user identifier.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
It is supplied to the security platform by multiple user identifiers and respectively with the associated user property of each user identifier, so that institute It states security platform and is based on the multiple user identifier and the associated user property of each user identifier, the use current to the terminal User property possessed by family is verified, and feeds back private key to the terminal after being verified.
5. a kind of data push method, which is characterized in that the method includes:
The ciphertext data that application server pushes are obtained from push server, wherein the ciphertext data are by the application service The public key that device is announced based on data-pushing strategy and security platform, adds target data by the Encryption Algorithm based on attribute It is close to obtain;
Based on the user property associated by the user identifier with active user, private key is obtained from the security platform;
The ciphertext data are decrypted based on the private key, obtain the target data.
6. according to the method described in claim 5, it is characterized in that, associated by the user identifier based on active user User property, obtaining private key from the security platform includes:
The user identifier of the active user and associated user property are supplied to the security platform, so that the safety Platform verifies user property possessed by the active user, and after being verified, and determines and the active user The corresponding private key of possessed user property;
Receive the private key of the security platform feedback.
7. according to the method described in claim 5, it is characterized in that, the method further includes:
Record customer incident;
The user property associated by the user identifier with the active user is determined based on the customer incident;
The user identifier of the active user and associated user property are submitted into the application server, so that described answer User property possessed by user is based on to terminal propelling data with server.
8. a kind of data-pushing device, which is characterized in that described device includes:
First acquisition module, for obtaining at least one user property as target user's attribute;
Determining module, for determining data-pushing strategy based on target user's attribute;
Encrypting module passes through the encryption based on attribute for the public key that push strategy and security platform are announced based on the data Target data is encrypted in algorithm, obtains ciphertext data;
Pushing module, for passing through push server by the ciphertext data-pushing to terminal.
9. device according to claim 8, which is characterized in that described device further includes:
Second acquisition module, for obtaining public key from the security platform.
10. device according to claim 8, which is characterized in that the pushing module includes:
Determination sub-module determines user identifier for push strategy based on the data;
Sending submodule, for the user identifier and the ciphertext data to be sent to the push server, so that described The ciphertext data are sent to the corresponding terminal of the user identifier by push server.
11. device according to claim 8, which is characterized in that described device further includes:
Module is provided, for being supplied to the peace by multiple user identifiers and respectively with the associated user property of each user identifier Full platform, so that the security platform is based on the multiple user identifier and the associated user property of each user identifier, to institute It states user property possessed by the current user of terminal to verify, and private key is fed back to the terminal after being verified.
12. a kind of data-pushing device, which is characterized in that described device includes:
First acquisition module, for obtaining the ciphertext data that application server pushes from push server, wherein the ciphertext number According to the public key announced based on data-pushing strategy and security platform by the application server, pass through the Encryption Algorithm based on attribute Target data is encrypted to obtain;
Second acquisition module is used for based on the user property associated by the user identifier with active user, from the security platform Obtain private key;
Deciphering module is decrypted the ciphertext data for being based on the private key, obtains the target data.
13. device according to claim 12, which is characterized in that second acquisition module includes:
Submodule is provided, for being supplied to the safety to put down the user identifier of the active user and associated user property Platform so that the security platform verifies user property possessed by the active user, and after being verified, determines Private key corresponding with user property possessed by the active user;
Receiving submodule, the private key for receiving the security platform feedback.
14. device according to claim 12, which is characterized in that described device further includes:
Logging modle, for recording customer incident;
Determining module, for determining that the user associated by the user identifier with the active user belongs to based on the customer incident Property;
Module is submitted, for the user identifier of the active user and associated user property to be submitted to the application service Device, so that the application server is based on user property possessed by user to terminal propelling data.
CN201810308055.7A 2018-04-08 2018-04-08 Data pushing method and device Active CN108712379B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810308055.7A CN108712379B (en) 2018-04-08 2018-04-08 Data pushing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810308055.7A CN108712379B (en) 2018-04-08 2018-04-08 Data pushing method and device

Publications (2)

Publication Number Publication Date
CN108712379A true CN108712379A (en) 2018-10-26
CN108712379B CN108712379B (en) 2021-05-25

Family

ID=63867042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810308055.7A Active CN108712379B (en) 2018-04-08 2018-04-08 Data pushing method and device

Country Status (1)

Country Link
CN (1) CN108712379B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225010A (en) * 2019-05-29 2019-09-10 深圳市元征科技股份有限公司 A kind of processing method and relevant device of PUSH message
CN110856003A (en) * 2019-10-17 2020-02-28 网易(杭州)网络有限公司 Live list pushing method and device, electronic equipment and storage medium
CN114143025A (en) * 2021-10-27 2022-03-04 北京银盾泰安网络科技有限公司 Cloud platform security policy management system
CN114465976A (en) * 2022-01-28 2022-05-10 深圳快银付信息科技有限公司 Message distribution and aggregation method and device
CN114979253A (en) * 2022-05-06 2022-08-30 蚂蚁区块链科技(上海)有限公司 Data push decision-making method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556609A (en) * 2009-05-19 2009-10-14 杭州信杨通信技术有限公司 Customer behavior analysis and service system based on web contents
CN106060762A (en) * 2016-05-24 2016-10-26 中国联合网络通信集团有限公司 Information pushing method, information pushing device and information pushing system
CN107484161A (en) * 2017-07-24 2017-12-15 国家电网公司 A kind of efficient information push based on mobile self-grouping network and safe sharing method
CN107657007A (en) * 2017-09-22 2018-02-02 广东欧珀移动通信有限公司 Information-pushing method, device, terminal, readable storage medium storing program for executing and system
CN107707510A (en) * 2016-08-09 2018-02-16 北京奇虎科技有限公司 A kind of information-pushing method, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556609A (en) * 2009-05-19 2009-10-14 杭州信杨通信技术有限公司 Customer behavior analysis and service system based on web contents
CN106060762A (en) * 2016-05-24 2016-10-26 中国联合网络通信集团有限公司 Information pushing method, information pushing device and information pushing system
CN107707510A (en) * 2016-08-09 2018-02-16 北京奇虎科技有限公司 A kind of information-pushing method, apparatus and system
CN107484161A (en) * 2017-07-24 2017-12-15 国家电网公司 A kind of efficient information push based on mobile self-grouping network and safe sharing method
CN107657007A (en) * 2017-09-22 2018-02-02 广东欧珀移动通信有限公司 Information-pushing method, device, terminal, readable storage medium storing program for executing and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225010A (en) * 2019-05-29 2019-09-10 深圳市元征科技股份有限公司 A kind of processing method and relevant device of PUSH message
CN110856003A (en) * 2019-10-17 2020-02-28 网易(杭州)网络有限公司 Live list pushing method and device, electronic equipment and storage medium
CN114143025A (en) * 2021-10-27 2022-03-04 北京银盾泰安网络科技有限公司 Cloud platform security policy management system
CN114143025B (en) * 2021-10-27 2023-09-05 浙江银盾云科技有限公司 Cloud platform security policy management system
CN114465976A (en) * 2022-01-28 2022-05-10 深圳快银付信息科技有限公司 Message distribution and aggregation method and device
CN114979253A (en) * 2022-05-06 2022-08-30 蚂蚁区块链科技(上海)有限公司 Data push decision-making method and device
CN114979253B (en) * 2022-05-06 2024-03-12 蚂蚁区块链科技(上海)有限公司 Data push decision method, device, medium and equipment

Also Published As

Publication number Publication date
CN108712379B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
CN108712379A (en) Data push method and device
WO2019179537A2 (en) System and method for implementing a resolver service for decentralized identifiers
CN109478280A (en) Method and system for realizing block chain
CN109756582A (en) Information recording method, device, node and storage medium in block chain network
CN110383760A (en) User's control, distributing, distribution and safety content distribution
CN112182644A (en) Data processing method and device and electronic equipment
CN111108521A (en) Implementing a blockchain based workflow
CN109583215A (en) It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN116049626A (en) Data statistics method, device, equipment and storage medium
CN109754226B (en) Data management method, device and storage medium
CN112434334A (en) Data processing method, device, equipment and storage medium
JP2021175193A (en) Multicast encryption scheme for data ownership platform
CN110634068A (en) Community-chain-based credit investigation data processing method and system
CN115203749A (en) Data transaction method and system based on block chain
CN109274500A (en) A kind of key downloading method, client, encryption device and terminal device
Abubaker et al. Trustful data trading through monetizing IoT data using BlockChain based review system
CN111523142A (en) Data processing method, device, electronic equipment and medium
CN113886883A (en) Internet of things data management method and device
CN114514550A (en) Partitioning requests into blockchains
CN115001720B (en) Optimization method, device, medium and equipment for safe transmission of federal learning modeling
US20230275751A1 (en) Decentralized Cryptography
CN106295366A (en) Sensitive data recognition methods and device
CN115809482B (en) Data aggregation calculation method, device, medium and equipment based on random number confusion
CN110213216B (en) Method, device and storage medium for determining same account in different account sets
CN115022012B (en) Data transmission method, device, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant