CN108768987A - Data interactive method, apparatus and system - Google Patents

Data interactive method, apparatus and system Download PDF

Info

Publication number
CN108768987A
CN108768987A CN201810476283.5A CN201810476283A CN108768987A CN 108768987 A CN108768987 A CN 108768987A CN 201810476283 A CN201810476283 A CN 201810476283A CN 108768987 A CN108768987 A CN 108768987A
Authority
CN
China
Prior art keywords
party system
sent
dpi
data
service request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810476283.5A
Other languages
Chinese (zh)
Other versions
CN108768987B (en
Inventor
袁晓静
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810476283.5A priority Critical patent/CN108768987B/en
Publication of CN108768987A publication Critical patent/CN108768987A/en
Application granted granted Critical
Publication of CN108768987B publication Critical patent/CN108768987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of data interactive method of present invention offer, apparatus and system, this method, including:Receive the service request that third party system is sent;Determine that the service request is not related to private data, configuration information then is sent to deep-packet detection DPI data systems, and log-on message is sent to the third party system, wherein, the configuration information is generated according to the service request, and file destination is generated for controlling the DPI data systems.The invention avoids the leakages of privacy of user data, improve the safety of DPI system data transmissions.

Description

Data interactive method, apparatus and system
Technical field
The present invention relates to technical field of data processing more particularly to a kind of data interactive method, apparatus and systems.
Background technology
With the development of network technology, data business volume also exponentially rises.Operator needs the mass data to generation It is managed and safeguards, and satisfactory data are provided for third party system.
Current deep packet inspection technical (Deep Packet Inspection, DPI) can be by critical data report Accurate identification and analysis to business and data are realized in the acquisition of literary content.Wherein, DPI systems can get each of user Category information data, including user basic information, location information, behavior record, network quality data etc. can also generate various industry Data of being engaged in and statistical data, to provide efficient service for operation system.
But DPI systems to third party's transmission data when, the leakage of privacy of user data is likely to result in, to influence The safety of data transmission.
Invention content
A kind of data interactive method of present invention offer, apparatus and system improve to avoid the leakage of privacy of user data The safety of DPI system data transmissions.
In a first aspect, the embodiment of the present invention provides a kind of data interactive method, including:
Receive the service request that third party system is sent;
It determines that the service request is not related to private data, then sends configuration information to deep-packet detection DPI data systems, And send log-on message to the third party system, wherein the configuration information is generated according to the service request, is used File destination is generated in controlling the DPI data systems.
Optionally, after receiving the service request that third party system is sent, further include:
If the service request is related to private data, refuse the service request that the third party system is sent.
Optionally, the service request includes:Service identification, data type.
Optionally, the log-on message, including:Third party system accesses the entry password, described of the DPI data systems The mark of the internet protocol address of DPI data systems, the DPI data systems.
Second aspect, the embodiment of the present invention provide a kind of data interactive method, including:
Receive the configuration information that deep-packet detection DPI configuration servers are sent;
If the log-on message that third party system is sent is correct, file destination is generated according to the configuration information;
The file destination is sent to the third party system.
Optionally, if the log-on message of third party system transmission is correct, target is generated according to the configuration information File, including:
Receive the logging request that third party system is sent, wherein include log-on message in the logging request, it is described to step on Information is recorded, including:Third party system accesses the internet protocol of the entry password of the DPI data systems, the DPI data systems Discuss IP address, the mark of the DPI data systems;
Judge whether the entry password is correct, if the entry password is correct, is stepped on to third party system transmission Record success response;
Receive the acquisition file request that the third party system is sent;
File destination is generated according to the configuration information.
Optionally, after the file destination is sent to the third party system, further include:
Receive the response message that the third party system is sent, wherein the response message is that the third party system exists Determine the feedback information generated when the file destination received is legitimate files.
The third aspect, the embodiment of the present invention provide a kind of data interaction device, including:
Receiving module, the service request for receiving third party system transmission;
Determining module, for when determining that the service request is not related to private data, to deep-packet detection DPI data system System sends configuration information, and sends log-on message to the third party system, wherein the configuration information is according to the industry What business requested to generate, generate file destination for controlling the DPI data systems.
Optionally, the determining module, is additionally operable to:After receiving the service request that third party system is sent, if described Service request is related to private data, then refuses the service request that the third party system is sent.
Optionally, the service request includes:Service identification, data type.
Optionally, the log-on message, including:Third party system accesses the entry password, described of the DPI data systems The mark of the internet protocol address of DPI data systems, the DPI data systems.
Fourth aspect, the embodiment of the present invention provide a kind of data interaction device, including:
Receiving module, the configuration information for receiving the transmission of deep-packet detection DPI configuration servers;
Processing module, for when the log-on message that third party system is sent is correct, mesh to be generated according to the configuration information Mark file;
Sending module, for the file destination to be sent to the third party system.
Optionally, the processing module, is specifically used for:
Receive the logging request that third party system is sent, wherein include log-on message in the logging request, it is described to step on Information is recorded, including:Third party system accesses the internet protocol of the entry password of the DPI data systems, the DPI data systems Discuss IP address, the mark of the DPI data systems;
Judge whether the entry password is correct, if the entry password is correct, is stepped on to third party system transmission Record success response;
Receive the acquisition file request that the third party system is sent;
File destination is generated according to the configuration information.
Optionally, the receiving module, is additionally operable to:After the file destination is sent to the third party system, Receive the response message that the third party system is sent, wherein the response message is that the third party system is determining reception To the file destination be legitimate files when the feedback information that generates.
5th aspect, the embodiment of the present invention provide a kind of data interaction system, including:
Memory, for storing program;
Processor, the described program for executing memory storage, when described program is performed, the processor For executing the method as described in any one of first aspect, and/or the method as described in any one of second aspect.
6th aspect, the embodiment of the present invention provide a kind of computer readable storage medium, including:Computer program, when it When running on computers so that computer executes first aspect and/or the method as described in any in second aspect.
Data interactive method provided by the invention, apparatus and system pass through and receive the service request that third party system is sent; It determines that the service request is not related to private data, then sends configuration information to deep-packet detection DPI data systems, and to institute It states third party system and sends log-on message, wherein the configuration information is generated according to the service request, for controlling It states DPI data systems and generates file destination.The invention avoids the leakages of privacy of user data, improve DPI system data transmissions Safety.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without having to pay creative labor, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the structural schematic diagram of application scenarios provided in an embodiment of the present invention;
Fig. 2 is the flow chart for the data interactive method that the embodiment of the present invention one provides;
Fig. 3 is the flow chart of data interactive method provided by Embodiment 2 of the present invention;
Fig. 4 is the flow chart for the data interactive method that the embodiment of the present invention three provides;
Fig. 5 is the structural schematic diagram for the data interaction device that the embodiment of the present invention four provides;
Fig. 6 is the structural schematic diagram for the data interaction device that the embodiment of the present invention five provides;
Fig. 7 is the structural schematic diagram for the data interaction system that the embodiment of the present invention six provides.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Term " first ", " second ", " third " in description and claims of this specification and above-mentioned attached drawing, " The (if present)s such as four " are for distinguishing similar object, without being used to describe specific sequence or precedence.It should manage The data that solution uses in this way can be interchanged in the appropriate case, so that the embodiment of the present invention described herein for example can be to remove Sequence other than those of illustrating or describe herein is implemented.In addition, term " comprising " and " having " and theirs is any Deformation, it is intended that cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, production Product or equipment those of are not necessarily limited to clearly to list step or unit, but may include not listing clearly or for this The intrinsic other steps of processes, method, product or equipment or unit a bit.
Technical scheme of the present invention is described in detail with specifically embodiment below.These specific implementations below Example can be combined with each other, and same or analogous concept or process may be repeated no more in some embodiments.
Hereinafter, the part term in the application is explained, in order to those skilled in the art understand that:
1) deep packet inspection technical (Deep Packet Inspection, DPI) is in conventional the Internet protocol The application protocol identification to application layer data, data are increased on (Internet Protocol, IP) data packet inspection technical Packet content detection is decoded with depth.By the initial data Packet capturing to network communication, the inspection of its three categories can be used in DPI technologies Survey means:The data of " characteristic value " detection, the recognition detection based on application layer protocol, Behavior-based control pattern based on application data Detection.Analysis of unpacking one by one is done to the abnormal data that communication data packet may contain according to different detection methods, depth is dug Change according to trickle data present in macro-data stream is gone out.DPI by the different layers information of data packet carry out depth detection and Then analysis carries out flow according to the strategy that system defines to obtain the application layer message of entire data flow or data packet Statistical analysis and control.By the acquisition to critical data message content, according to pre-set business rule, may be implemented pair The accurate identification of business and data and analysis, DPI data systems can get the various information data of user, including user's base This information, location information, behavior record, network quality data etc. can also generate various businesses data and statistical data.Big The epoch of data service outburst, DPI technologies can provide more valuable data for operation system, clothes provided for other industry Business.
Fig. 1 is the structural schematic diagram of application scenarios provided in an embodiment of the present invention, as shown in Figure 1, including:Deep-packet detection DPI data systems 1, deep-packet detection DPI configuration servers 2, network element device 3, third-party application system 4.Network element device 3 refers to The equipment that user's Internet data can be provided for DPI data systems, such as:Phase in gateway or router and mobile network Equipment etc. is closed, various businesses data, statistical data or other data related to user etc. can be got.DPI data system The characteristic of the various Internet services of user and the Internet data etc. of user are stored in system 1.DPI configuration servers 2 For issuing various control strategies, and the instruction of update service feature library etc. to DPI data systems 1, instruction is handed down to DPI data System configures DPI data systems 1.Third-party application system 4 refers to other operation systems other than operator, is passed through Required data could be obtained to DPI data systems 1 after confirmation, data are carried out by relevant agreement between DPI data systems 1 Transmission.
How the technical solution of technical scheme of the present invention and the application is solved with specifically embodiment below above-mentioned Technical problem is described in detail.These specific embodiments can be combined with each other below, for same or analogous concept Or process may repeat no more in certain embodiments.Below in conjunction with attached drawing, the embodiment of the present invention is described.
Fig. 2 is the flow chart for the data interactive method that the embodiment of the present invention one provides, as shown in Fig. 2, in the present embodiment Method may include:
S101, the service request that third party system is sent is received.
In the present embodiment, DPI configuration servers can provide business by the relevant system of operator for third party system Then the channel of request forwards the service request to give DPI configuration servers by operator again;Can also be that third party system is straight It connects to DPI configuration servers and sends service request;Wherein, the service request includes:Service identification, data type.It is described Log-on message, including:Third party system accesses the internet of the entry password of the DPI data systems, the DPI data systems The mark of Protocol IP address, the DPI data systems.Specifically, third party system can log in DPI by the log-on message Data system, to establish the data transmission between DPI data systems.It should be noted that being configured to DPI in the present embodiment The service request how server gets third party system does not limit.
S102, it determines that the service request is not related to private data, then sends and configure to deep-packet detection DPI data systems Information, and send log-on message to the third party system.
Optionally, if the service request is related to private data, refuse the service request that the third party system is sent.
In the present embodiment, DPI configuration servers are when receiving the service request of third party system transmission, first according to industry The relevant informations such as service identification, the data type carried in business request judge whether the service request is related to private data.If It is related to private data, then DPI configuration servers directly refuse the service request that the third party system is sent.Wherein, this reality Applying private data involved in example can pre-set, and can be adjusted as the case may be.Specifically, with third party For medical system, it is assumed that third party's medical system wishes to get user's letter in hospital database by DPI data systems Breath, these user informations include:Address name, ID card No., home address, contact method, case etc..At this point it is possible to set It is private data to set address name, ID card No., home address, contact method.So, it is sent when third party's medical system Arrived involved in service request any one of address name, ID card No., home address, contact method or it is multinomial when, DPI configuration servers refuse the service request.So as to be effectively prevented from the leakage of privacy of user data.
In the present embodiment, the configuration information is generated according to the service request, for controlling DPI data system System generates file destination.Include the requirement of the required file of third party system in configuration information, DPI data systems are receiving After the configuration information, file destination is generated according to the configuration information.
The present embodiment, the service request sent by receiving third party system;Determine that the service request is not related to privacy Data then send configuration information to deep-packet detection DPI data systems, and send log-on message to the third party system, Wherein, the configuration information is generated according to the service request, and target text is generated for controlling the DPI data systems Part.The invention avoids the leakages of privacy of user data, improve the safety of DPI system data transmissions.
Fig. 3 is the flow chart of data interactive method provided by Embodiment 2 of the present invention, as shown in figure 3, in the present embodiment Method may include:
S201, the configuration information that deep-packet detection DPI configuration servers are sent is received.
In the present embodiment, the configuration information that DPI data system reception deep-packet detection DPI configuration servers are sent is described Configuration information is generated according to the service request that DPI configuration servers receive.DPI data systems to described by matching confidence The parsing of breath can obtain the documentation requirements needed for third party system.
If the log-on message that S202, third party system are sent is correct, file destination is generated according to the configuration information.
Optionally, the logging request that DPI data system receptions third party system is sent, wherein wrapped in the logging request Containing log-on message, the log-on message, including:Third party system accesses the entry password, described of the DPI data systems The mark of the internet protocol address of DPI data systems, the DPI data systems;
Judge whether the entry password is correct, if the entry password is correct, is stepped on to third party system transmission Record success response;
Receive the acquisition file request that the third party system is sent;
File destination is generated according to the configuration information.
In the present embodiment, third party system is sent out by the log-on message that DPI configuration servers are sent to DPI data systems Play logging request.Specifically, the third party system passes through the IP address of DPI data systems described in log-on message and described DPI data systems are searched for and determined to the mark of DPI data systems.After determining DPI data systems, to the DPI data System sends entry password, if the entry password is correct, response is logined successfully to third party system transmission.Described in reception The acquisition file request that third party system is sent, and file destination is generated according to the configuration information.
S203, the file destination is sent to the third party system.
In the present embodiment, the file destination of generation is sent to the third party system by DPI data systems.
Optionally, after the file destination is sent to the third party system, the DPI data systems can be with Receive the response message that the third party system is sent.Wherein, the response message is that the third party system is determining reception To the file destination be legitimate files when the feedback information that generates.
In the present embodiment, when the response message that DPI data system receptions to third party system are sent, then illustrate file destination It is legal, and received by the third party system.
Optionally, after third party system logins successfully, DPI data systems can also according to the preset period, periodically to The third party system sends newer file destination.Alternatively, being sent out when with the relevant data of the third party system service request When changing, prompt message is sent to the third party system, to remind the third party system to obtain newest data in time.
The present embodiment, the configuration information sent by receiving deep-packet detection DPI configuration servers;If third party system is sent out The log-on message sent is correct, then generates file destination according to the configuration information;The file destination is sent to the third Method, system.The present invention audits the log-on message of third party system by DPI data systems, only correct in log-on message When, the file destination needed for the third party system is just generated, the safety of DPI system data transmissions is effectively improved.
Fig. 4 is the flow chart for the data interactive method that the embodiment of the present invention three provides, as shown in figure 4, in the present embodiment Method may include:
Step 1, DPI configuration servers receive the service request that third party system is sent.
Step 2, DPI configuration servers send log-on message to third party system, and send and configure to DPI data systems Information.
Step 3, DPI data systems parse the configuration information, obtain the documentation requirements needed for the third party system.
Step 4, third party system send logging request to the DPI data systems.
Step 5, DPI data systems judge whether entry password is correct, if correctly, thening follow the steps 6;If incorrect, Terminate flow.
Step 6, DPI data systems send login response information to the third party system.
Step 7, third party system are sent to the DPI data systems obtains file request.
Step 8, DPI data systems generate file destination.
The file destination is sent to the third party system by step 9, DPI data systems.
Step 10, third party system judge whether the file destination is legal, if legal, then follow the steps 11, if not conforming to Method then rejects the file destination, terminates flow.
Step 11, third party system send feedback information to DPI data systems.
The present embodiment is on the basis of Fig. 2, Fig. 3 method, including DPI configuration servers, DPI data systems, third party The specific implementation process of systematic difference scene, detailed principles illustrated refer to the associated description in Fig. 2, Fig. 3, herein It repeats no more.
Fig. 5 is the structural schematic diagram for the data interaction device that the embodiment of the present invention four provides, as shown in figure 5, the present embodiment In device may include:
Receiving module 10, the service request for receiving third party system transmission;
Determining module 20, for when determining that the service request is not related to private data, to deep-packet detection DPI data System sends configuration information, and sends log-on message to the third party system, wherein the configuration information is according to What service request generated, generate file destination for controlling the DPI data systems.
Optionally, the determining module 20, is additionally operable to:After receiving the service request that third party system is sent, if institute It states service request and is related to private data, then refuse the service request that the third party system is sent.
Optionally, the service request includes:Service identification, data type.
Optionally, the log-on message, including:Third party system accesses the entry password, described of the DPI data systems The mark of the internet protocol address of DPI data systems, the DPI data systems.
The present embodiment can execute the technical solution in above-mentioned method shown in Fig. 2, realize process and technique effect with The above method is similar, and details are not described herein again.
Fig. 6 is the structural schematic diagram for the data interaction device that the embodiment of the present invention five provides, as shown in fig. 6, the present embodiment In device may include:
Receiving module 30, the configuration information for receiving the transmission of deep-packet detection DPI configuration servers;
Processing module 40, for when the log-on message that third party system is sent is correct, being generated according to the configuration information File destination;
Sending module 50, for the file destination to be sent to the third party system.
Optionally, the processing module 40, is specifically used for:
Receive the logging request that third party system is sent, wherein include log-on message in the logging request, it is described to step on Information is recorded, including:Third party system accesses the internet protocol of the entry password of the DPI data systems, the DPI data systems Discuss IP address, the mark of the DPI data systems;
Judge whether the entry password is correct, if the entry password is correct, is stepped on to third party system transmission Record success response;
Receive the acquisition file request that the third party system is sent;
File destination is generated according to the configuration information.
Optionally, the receiving module 30, is additionally operable to:By the file destination be sent to the third party system it Afterwards, the response message that the third party system is sent is received, wherein the response message is that the third party system connects in determination The feedback information that the file destination received generates when being legitimate files.
The present embodiment can execute the technical solution in above-mentioned method shown in Fig. 3, realize process and technique effect with The above method is similar, and details are not described herein again.
Fig. 7 is the structural schematic diagram for the data interaction system that the embodiment of the present invention six provides, as shown in fig. 6, the present embodiment In data interaction system 60 include:Processor 61 and memory 62;
Memory 62 (such as realizes application program, the function module of above-mentioned data interactive method for storing computer program Deng), computer instruction etc., above-mentioned computer program, computer instruction etc. can be with partitioned storages in one or more memories In 62.And above-mentioned computer program, computer instruction, data etc. can be called by processor 61.
Processor 61, the computer program for executing the storage of the memory 62, to realize that above-described embodiment relates to And method in each step.The specific associated description that may refer in previous methods embodiment.Wherein, memory 62, place Reason device 61 can be of coupled connections by bus 63.
The present embodiment can execute the technical solution in above-mentioned Fig. 2~method shown in Fig. 4, realize process and technology effect Fruit is similar with the above method, and details are not described herein again.
In addition, the embodiment of the present application also provides a kind of computer readable storage medium, deposited in computer readable storage medium Computer executed instructions are contained, when at least one processor of user equipment executes the computer executed instructions, user equipment Execute above-mentioned various possible methods.
Wherein, computer-readable medium includes computer storage media and communication media, and wherein communication media includes being convenient for Any medium of computer program is transmitted from a place to another place.Storage medium can be general or specialized computer Any usable medium that can be accessed.A kind of illustrative storage medium is coupled to processor, to enable a processor to from this Read information, and information can be written to the storage medium.Certainly, storage medium can also be the composition portion of processor Point.Pocessor and storage media can be located in ASIC.In addition, the ASIC can be located in user equipment.Certainly, processor and Storage medium can also be used as discrete assembly and be present in communication equipment.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer read/write memory medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or The various media that can store program code such as person's CD.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (15)

1. a kind of data interactive method, which is characterized in that including:
Receive the service request that third party system is sent;
It determines that the service request is not related to private data, then sends configuration information to deep-packet detection DPI data systems, and Log-on message is sent to the third party system, wherein the configuration information is generated according to the service request, for controlling It makes the DPI data systems and generates file destination.
2. according to the method described in claim 1, it is characterized in that, receive third party system send service request after, Further include:
If the service request is related to private data, refuse the service request that the third party system is sent.
3. method according to claim 1 or 2, which is characterized in that the service request includes:Service identification, data Type.
4. according to the method described in claim 1, it is characterized in that, the log-on message, including:Described in third party system access The mark of the entry password of DPI data systems, the internet protocol address of the DPI data systems, the DPI data systems Know.
5. a kind of data interactive method, which is characterized in that including:
Receive the configuration information that deep-packet detection DPI configuration servers are sent;
If the log-on message that third party system is sent is correct, file destination is generated according to the configuration information;
The file destination is sent to the third party system.
If 6. according to the method described in claim 5, it is characterized in that, the third party system send log-on message it is correct, File destination is then generated according to the configuration information, including:
Receive the logging request that third party system is sent, wherein include log-on message in the logging request, the login letter Breath, including:Third party system accesses the Internet protocol IP of the entry password of the DPI data systems, the DPI data systems Address, the DPI data systems mark;
Judge whether the entry password correct, if the entry password is correct, to the third party system send log at Work(responds;
Receive the acquisition file request that the third party system is sent;
File destination is generated according to the configuration information.
7. according to the method described in claim 5, it is characterized in that, the file destination is sent to the third party system Later, further include:
Receive the response message that the third party system is sent, wherein the response message is the third party system in determination The feedback information that the file destination received generates when being legitimate files.
8. a kind of data interaction device, which is characterized in that including:
Receiving module, the service request for receiving third party system transmission;
Determining module, for when determining that the service request is not related to private data, being sent out to deep-packet detection DPI data systems Configuration information is sent, and log-on message is sent to the third party system, wherein the configuration information is asked according to the business It seeks survival, file destination is generated for controlling the DPI data systems.
9. device according to claim 8, which is characterized in that the determining module is additionally operable to:Receiving third party system After the service request of transmission, if the service request is related to private data, refuse the business that the third party system is sent Request.
10. device according to claim 8 or claim 9, which is characterized in that the service request includes:Service identification, data Type.
11. device according to claim 8, which is characterized in that the log-on message, including:Third party system accesses institute State the mark of the entry password of DPI data systems, the internet protocol address of the DPI data systems, the DPI data systems Know.
12. a kind of data interaction device, which is characterized in that including:
Receiving module, the configuration information for receiving the transmission of deep-packet detection DPI configuration servers;
Processing module, for when the log-on message that third party system is sent is correct, target text to be generated according to the configuration information Part;
Sending module, for the file destination to be sent to the third party system.
13. device according to claim 12, which is characterized in that the processing module is specifically used for:
Receive the logging request that third party system is sent, wherein include log-on message in the logging request, the login letter Breath, including:Third party system accesses the Internet protocol IP of the entry password of the DPI data systems, the DPI data systems Address, the DPI data systems mark;
Judge whether the entry password correct, if the entry password is correct, to the third party system send log at Work(responds;
Receive the acquisition file request that the third party system is sent;
File destination is generated according to the configuration information.
14. device according to claim 12, which is characterized in that the receiving module is additionally operable to:The target is literary Part is sent to after the third party system, receives the response message that the third party system is sent, wherein the response message It is the feedback information that the third party system is generated when determining that the file destination received is legitimate files.
15. a kind of data interaction system, which is characterized in that including:
Memory, for storing program;
Processor, the described program for executing the memory storage, when described program is performed, the processor is used for Execute the method as described in any one of claim 1-4, and/or the method as described in any one of claim 4-7.
CN201810476283.5A 2018-05-17 2018-05-17 Data interaction method, device and system Active CN108768987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810476283.5A CN108768987B (en) 2018-05-17 2018-05-17 Data interaction method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810476283.5A CN108768987B (en) 2018-05-17 2018-05-17 Data interaction method, device and system

Publications (2)

Publication Number Publication Date
CN108768987A true CN108768987A (en) 2018-11-06
CN108768987B CN108768987B (en) 2021-03-02

Family

ID=64007004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810476283.5A Active CN108768987B (en) 2018-05-17 2018-05-17 Data interaction method, device and system

Country Status (1)

Country Link
CN (1) CN108768987B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633254A (en) * 2019-09-19 2019-12-31 中国银行股份有限公司 Data interaction method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287006A (en) * 2008-05-12 2008-10-15 华为软件技术有限公司 Information indicating method, system and device
US20100150104A1 (en) * 2008-12-17 2010-06-17 Electronics And Telecommunications Research Institute Deep packet inspection device and method
CN106303751A (en) * 2015-05-18 2017-01-04 中兴通讯股份有限公司 A kind of realization method and system orienting flow bag
CN106656677A (en) * 2017-01-13 2017-05-10 武汉邮电科学研究院 Deep packet detection system and method oriented to big data
CN106713067A (en) * 2016-11-30 2017-05-24 广东电网有限责任公司信息中心 Sensitive file circulation monitoring method based on DPI
CN107493280A (en) * 2017-08-15 2017-12-19 中国联合网络通信集团有限公司 Method, intelligent gateway and the certificate server of user authentication
CN107529190A (en) * 2016-06-21 2017-12-29 中国移动通信集团山西有限公司 User data obtains system and method
CN107547432A (en) * 2017-08-28 2018-01-05 新华三信息安全技术有限公司 A kind of flow control methods and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287006A (en) * 2008-05-12 2008-10-15 华为软件技术有限公司 Information indicating method, system and device
US20100150104A1 (en) * 2008-12-17 2010-06-17 Electronics And Telecommunications Research Institute Deep packet inspection device and method
CN106303751A (en) * 2015-05-18 2017-01-04 中兴通讯股份有限公司 A kind of realization method and system orienting flow bag
CN107529190A (en) * 2016-06-21 2017-12-29 中国移动通信集团山西有限公司 User data obtains system and method
CN106713067A (en) * 2016-11-30 2017-05-24 广东电网有限责任公司信息中心 Sensitive file circulation monitoring method based on DPI
CN106656677A (en) * 2017-01-13 2017-05-10 武汉邮电科学研究院 Deep packet detection system and method oriented to big data
CN107493280A (en) * 2017-08-15 2017-12-19 中国联合网络通信集团有限公司 Method, intelligent gateway and the certificate server of user authentication
CN107547432A (en) * 2017-08-28 2018-01-05 新华三信息安全技术有限公司 A kind of flow control methods and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633254A (en) * 2019-09-19 2019-12-31 中国银行股份有限公司 Data interaction method and device

Also Published As

Publication number Publication date
CN108768987B (en) 2021-03-02

Similar Documents

Publication Publication Date Title
CN104144419B (en) Identity authentication method, device and system
CN103607385B (en) Method and apparatus for security detection based on browser
US9438683B2 (en) Router-host logging
US9374372B2 (en) Systems and methods for profiling client devices
CN107493280A (en) Method, intelligent gateway and the certificate server of user authentication
CN103368913A (en) Account login method, apparatus and system, and network server
US11057483B2 (en) User tracking method, server, and client
CN107786551B (en) Method for accessing intranet server and device for controlling access to intranet server
CN112261175B (en) Asset information updating method, device, equipment and medium
CN103905399A (en) Account registration management method and apparatus
US20200311231A1 (en) Anomalous user session detector
CN108123961A (en) Information processing method, apparatus and system
CN109218389A (en) The method, apparatus and storage medium and electronic equipment of processing business request
CN108712428A (en) A kind of method and device carrying out device type identification to terminal
CN103220307A (en) Subscription method, subscription authorization method and Feeds generating server
CN108207012A (en) A kind of flow control methods, device, terminal and system
CN113194099B (en) Data proxy method and proxy server
CN105897667A (en) Device access history tracking method, apparatus, server and system
CN109067622A (en) State detection method, apparatus and network server
CN112600703B (en) Network equipment remote access fault positioning method and device
CN111901412B (en) Data processing method and computer readable storage medium
CN108768987A (en) Data interactive method, apparatus and system
CN112291264A (en) Safety control method and device
CN110866229B (en) Multi-platform account authority unified management method and system
CN113472545B (en) Equipment network access method, device, equipment, storage medium and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant