CN108768987B - Data interaction method, device and system - Google Patents

Data interaction method, device and system Download PDF

Info

Publication number
CN108768987B
CN108768987B CN201810476283.5A CN201810476283A CN108768987B CN 108768987 B CN108768987 B CN 108768987B CN 201810476283 A CN201810476283 A CN 201810476283A CN 108768987 B CN108768987 B CN 108768987B
Authority
CN
China
Prior art keywords
data
dpi
service request
party system
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810476283.5A
Other languages
Chinese (zh)
Other versions
CN108768987A (en
Inventor
袁晓静
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810476283.5A priority Critical patent/CN108768987B/en
Publication of CN108768987A publication Critical patent/CN108768987A/en
Application granted granted Critical
Publication of CN108768987B publication Critical patent/CN108768987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a data interaction method, a device and a system, wherein the method comprises the following steps: receiving a service request sent by a third-party system; and if the service request does not relate to private data, sending configuration information to a Deep Packet Inspection (DPI) data system, and sending login information to the third-party system, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file. The invention avoids the leakage of the private data of the user and improves the safety of data transmission of the DPI system.

Description

Data interaction method, device and system
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data interaction method, apparatus, and system.
Background
With the development of network technology, data traffic volume also increases exponentially. Operators need to manage and maintain the generated mass data and provide data meeting requirements for third-party systems.
The current Deep Packet Inspection (DPI) technology can realize accurate identification and analysis of services and data by acquiring the content of a key data Packet. The DPI system can acquire various information data of a user, including user basic information, position information, behavior records, network quality data and the like, and can generate various service data and statistical data, so that efficient service is provided for a service system.
However, when the DPI system sends data to a third party, private data of the user may be leaked, thereby affecting security of data transmission.
Disclosure of Invention
The invention provides a data interaction method, a data interaction device and a data interaction system, which are used for avoiding leakage of user privacy data and improving the security of data transmission of a DPI system.
In a first aspect, an embodiment of the present invention provides a data interaction method, including:
receiving a service request sent by a third-party system;
and if the service request does not relate to private data, sending configuration information to a Deep Packet Inspection (DPI) data system, and sending login information to the third-party system, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file.
Optionally, after receiving the service request sent by the third-party system, the method further includes:
and if the service request relates to private data, rejecting the service request sent by the third-party system.
Optionally, the service request includes: service identification and data type.
Optionally, the login information includes: the third party system accesses the login password of the DPI data system, the Internet protocol IP address of the DPI data system and the identification of the DPI data system.
In a second aspect, an embodiment of the present invention provides a data interaction method, including:
receiving configuration information sent by a DPI configuration server;
if the login information sent by the third-party system is correct, generating a target file according to the configuration information;
and sending the target file to the third-party system.
Optionally, if the login information sent by the third-party system is correct, generating a target file according to the configuration information includes:
receiving a login request sent by a third-party system, wherein the login request comprises login information, and the login information comprises: a third party system accesses a login password of the DPI data system, an Internet Protocol (IP) address of the DPI data system and an identifier of the DPI data system;
judging whether the login password is correct or not, and if the login password is correct, sending a login success response to the third-party system;
receiving a file acquisition request sent by the third-party system;
and generating a target file according to the configuration information.
Optionally, after sending the target file to the third-party system, the method further includes:
and receiving response information sent by the third-party system, wherein the response information is feedback information generated by the third-party system when the received target file is determined to be a legal file.
In a third aspect, an embodiment of the present invention provides a data interaction apparatus, including:
the receiving module is used for receiving a service request sent by a third-party system;
and the determining module is used for sending configuration information to a Deep Packet Inspection (DPI) data system and sending login information to the third-party system when the service request is determined not to relate to private data, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file.
Optionally, the determining module is further configured to: after receiving a service request sent by a third-party system, if the service request relates to private data, rejecting the service request sent by the third-party system.
Optionally, the service request includes: service identification and data type.
Optionally, the login information includes: the third party system accesses the login password of the DPI data system, the Internet protocol IP address of the DPI data system and the identification of the DPI data system.
In a fourth aspect, an embodiment of the present invention provides a data interaction apparatus, including:
the receiving module is used for receiving the configuration information sent by the DPI configuration server;
the processing module is used for generating a target file according to the configuration information when the login information sent by the third-party system is correct;
and the sending module is used for sending the target file to the third-party system.
Optionally, the processing module is specifically configured to:
receiving a login request sent by a third-party system, wherein the login request comprises login information, and the login information comprises: a third party system accesses a login password of the DPI data system, an Internet Protocol (IP) address of the DPI data system and an identifier of the DPI data system;
judging whether the login password is correct or not, and if the login password is correct, sending a login success response to the third-party system;
receiving a file acquisition request sent by the third-party system;
and generating a target file according to the configuration information.
Optionally, the receiving module is further configured to: after the target file is sent to the third-party system, response information sent by the third-party system is received, wherein the response information is feedback information generated when the third-party system determines that the received target file is a legal file.
In a fifth aspect, an embodiment of the present invention provides a data interaction system, including:
a memory for storing a program;
a processor for executing the program stored by the memory, the processor being adapted to perform the method of any of the first aspects and/or the method of any of the second aspects when the program is executed.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, including: computer program, which, when run on a computer, causes the computer to perform the first aspect and/or the method according to any of the second aspects.
According to the data interaction method, the device and the system, the service request sent by the third-party system is received; and if the service request does not relate to private data, sending configuration information to a Deep Packet Inspection (DPI) data system, and sending login information to the third-party system, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file. The invention avoids the leakage of the private data of the user and improves the safety of data transmission of the DPI system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of a data interaction method according to an embodiment of the present invention;
fig. 3 is a flowchart of a data interaction method according to a second embodiment of the present invention;
fig. 4 is a flowchart of a data interaction method according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of a data interaction device according to a fourth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a data interaction device according to a fifth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a data interaction system according to a sixth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
In the following, some terms in the present application are explained to facilitate understanding by those skilled in the art:
1) deep Packet Inspection (DPI) is a technology that adds application Protocol identification, Packet content Inspection and Deep decoding to application layer data on top of the traditional Internet Protocol (IP) Packet Inspection technology. DPI technology can use three broad classes of detection means through the capture of raw packets of network traffic: detection of "eigenvalues" based on application data, detection of identification based on application layer protocols, detection of data based on behavioral patterns. According to different detection methods, abnormal data possibly contained in the communication data packet are unpacked and analyzed one by one, and fine data changes existing in the macroscopic data flow are deeply dug. The DPI performs deep detection and analysis on different layers of information of a data packet to obtain application layer information of the whole data flow or the data packet, and then performs statistical analysis and control on flow according to a strategy defined by a system. By acquiring the content of the key data message and according to preset service rules, accurate identification and analysis of services and data can be realized, and the DPI data system can acquire various information data of a user, including user basic information, position information, behavior records, network quality data and the like, and can also generate various service data and statistical data. In the era of big data business outbreak, the DPI technology can provide more valuable data for business systems and provide services for other industries.
Fig. 1 is a schematic structural diagram of an application scenario provided in an embodiment of the present invention, as shown in fig. 1, including: the system comprises a Deep Packet Inspection (DPI) data system 1, a DPI configuration server 2, network element equipment 3 and a third-party application system 4. The network element device 3 is a device capable of providing user internet data for the DPI data system, for example: the gateway or the router, and the related devices in the mobile network, etc. may obtain various service data, statistical data, or other data related to the user. The DPI data system 1 stores feature data of various internet services of the user, internet access data of the user, and the like. The DPI configuration server 2 is used for issuing various control strategies to the DPI data system 1, updating a service feature library instruction and the like, issuing the instruction to the DPI data system, and configuring the DPI data system 1. The third-party application system 4 is a service system other than the operator, and can acquire the required data from the DPI data system 1 after confirmation, and performs data transmission with the DPI data system 1 through a related protocol.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a data interaction method according to an embodiment of the present invention, and as shown in fig. 2, the method in this embodiment may include:
s101, receiving a service request sent by a third-party system.
In this embodiment, the DPI configuration server may provide a service request channel for a third-party system through a system related to an operator, and then the operator forwards the service request to the DPI configuration server; or the third-party system directly sends a service request to the DPI configuration server; wherein, the service request includes: service identification and data type. The login information comprises: the third party system accesses the login password of the DPI data system, the Internet protocol IP address of the DPI data system and the identification of the DPI data system. Specifically, the third-party system can log in the DPI data system through the login information, so as to establish data transmission with the DPI data system. It should be noted that, in this embodiment, how the DPI configuration server obtains the service request of the third-party system is not limited.
S102, determining that the service request does not relate to private data, sending configuration information to a DPI data system, and sending login information to the third-party system.
Optionally, if the service request relates to private data, the service request sent by the third-party system is rejected.
In this embodiment, when receiving a service request sent by a third-party system, the DPI configuration server first determines whether the service request relates to private data according to relevant information such as a service identifier and a data type carried in the service request. And if the private data is involved, directly rejecting the service request sent by the third-party system by the DPI configuration server. The privacy data involved in the present embodiment may be preset and may be adjusted according to specific situations. Specifically, taking the third-party medical system as an example, it is assumed that the third-party medical system wishes to acquire user information in the hospital database through the DPI data system, where the user information includes: user name, identification number, home address, contact, case, etc. At this time, the user name, the identification number, the home address, and the contact information may be set as private data. Then, when any one or more of the user name, the identification number, the home address and the contact address is involved in the service request sent by the third-party medical system, the DPI configuration server rejects the service request. Therefore, the leakage of the user privacy data can be effectively avoided.
In this embodiment, the configuration information is generated according to the service request, and is used to control the DPI data system to generate a target file. The configuration information contains the requirements of the required files of the third-party system, and the DPI data system generates the target files according to the configuration information after receiving the configuration information.
In this embodiment, a service request sent by a third-party system is received; and if the service request does not relate to private data, sending configuration information to a Deep Packet Inspection (DPI) data system, and sending login information to the third-party system, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file. The invention avoids the leakage of the private data of the user and improves the safety of data transmission of the DPI system.
Fig. 3 is a flowchart of a data interaction method provided in a second embodiment of the present invention, and as shown in fig. 3, the method in this embodiment may include:
s201, receiving configuration information sent by a DPI configuration server.
In this embodiment, the DPI data system receives configuration information sent by the deep packet inspection DPI configuration server, where the configuration information is generated according to a service request received by the DPI configuration server. The DPI data system can obtain the file requirement required by a third-party system through analyzing the configuration information.
And S202, if the login information sent by the third-party system is correct, generating a target file according to the configuration information.
Optionally, the DPI data system receives a login request sent by a third-party system, where the login request includes login information, and the login information includes: a third party system accesses a login password of the DPI data system, an Internet Protocol (IP) address of the DPI data system and an identifier of the DPI data system;
judging whether the login password is correct or not, and if the login password is correct, sending a login success response to the third-party system;
receiving a file acquisition request sent by the third-party system;
and generating a target file according to the configuration information.
In this embodiment, the third-party system initiates a login request to the DPI data system through the login information sent by the DPI configuration server. Specifically, the third-party system searches and determines the DPI data system through the IP address of the DPI data system and the identification of the DPI data system in the login information. And after the DPI data system is determined, sending a login password to the DPI data system, and if the login password is correct, sending a login success response to the third-party system. And receiving a file acquisition request sent by the third-party system, and generating a target file according to the configuration information.
And S203, sending the target file to the third-party system.
In this embodiment, the DPI data system sends the generated target file to the third party system.
Optionally, after the target file is sent to the third-party system, the DPI data system may further receive response information sent by the third-party system. And the response information is feedback information generated by the third-party system when the received target file is determined to be a legal file.
In this embodiment, when the DPI data system receives the response message sent by the third party system, it indicates that the target file is legal and has been received by the third party system.
Optionally, after the third-party system successfully logs in, the DPI data system may also periodically send an updated target file to the third-party system according to a preset period. Or when the data related to the third-party system service request changes, sending prompt information to the third-party system to remind the third-party system of acquiring the latest data in time.
In this embodiment, the configuration information sent by the DPI configuration server is detected by receiving the deep packet; if the login information sent by the third-party system is correct, generating a target file according to the configuration information; and sending the target file to the third-party system. According to the method and the device, the DPI data system is used for auditing the login information of the third-party system, and only when the login information is correct, the target file required by the third-party system is generated, so that the data transmission safety of the DPI system is effectively improved.
Fig. 4 is a flowchart of a data interaction method provided by a third embodiment of the present invention, and as shown in fig. 4, the method in this embodiment may include:
step 1, a DPI configuration server receives a service request sent by a third-party system.
And 2, the DPI configuration server sends login information to a third-party system and sends configuration information to the DPI data system.
And 3, the DPI data system analyzes the configuration information to obtain the file requirement required by the third-party system.
And 4, the third-party system sends a login request to the DPI data system.
Step 5, the DPI data system judges whether the login password is correct, if so, step 6 is executed; if not, the flow is ended.
And 6, the DPI data system sends login response information to the third-party system.
And 7, the third-party system sends a file acquisition request to the DPI data system.
And 8, generating a target file by the DPI data system.
And 9, the DPI data system sends the target file to the third-party system.
And step 10, the third-party system judges whether the target file is legal or not, if so, the step 11 is executed, and if not, the target file is refused to be received, and the process is ended.
And step 11, the third-party system sends feedback information to the DPI data system.
The present embodiment is a specific implementation process of an application scenario including a DPI configuration server, a DPI data system, and a third party system based on the method in fig. 2 and 3, and a detailed principle description thereof is please refer to the related description in fig. 2 and 3, which is not repeated herein.
Fig. 5 is a schematic structural diagram of a data interaction device according to a fourth embodiment of the present invention, and as shown in fig. 5, the device in this embodiment may include:
a receiving module 10, configured to receive a service request sent by a third-party system;
and a determining module 20, configured to send configuration information to a deep packet inspection, DPI, data system and login information to the third-party system when it is determined that the service request does not relate to private data, where the configuration information is generated according to the service request and is used to control the DPI data system to generate a target file.
Optionally, the determining module 20 is further configured to: after receiving a service request sent by a third-party system, if the service request relates to private data, rejecting the service request sent by the third-party system.
Optionally, the service request includes: service identification and data type.
Optionally, the login information includes: the third party system accesses the login password of the DPI data system, the Internet protocol IP address of the DPI data system and the identification of the DPI data system.
The embodiment may execute the technical solution in the method shown in fig. 2, and the implementation process and the technical effect are similar to those of the method, which are not described herein again.
Fig. 6 is a schematic structural diagram of a data interaction device according to a fifth embodiment of the present invention, and as shown in fig. 6, the device in this embodiment may include:
a receiving module 30, configured to receive configuration information sent by a Deep Packet Inspection (DPI) configuration server;
the processing module 40 is configured to generate a target file according to the configuration information when the login information sent by the third-party system is correct;
a sending module 50, configured to send the target file to the third-party system.
Optionally, the processing module 40 is specifically configured to:
receiving a login request sent by a third-party system, wherein the login request comprises login information, and the login information comprises: a third party system accesses a login password of the DPI data system, an Internet Protocol (IP) address of the DPI data system and an identifier of the DPI data system;
judging whether the login password is correct or not, and if the login password is correct, sending a login success response to the third-party system;
receiving a file acquisition request sent by the third-party system;
and generating a target file according to the configuration information.
Optionally, the receiving module 30 is further configured to: after the target file is sent to the third-party system, response information sent by the third-party system is received, wherein the response information is feedback information generated when the third-party system determines that the received target file is a legal file.
The embodiment may execute the technical solution in the method shown in fig. 3, and the implementation process and the technical effect are similar to those of the method, which are not described herein again.
Fig. 7 is a schematic structural diagram of a data interaction system according to a sixth embodiment of the present invention, and as shown in fig. 6, a data interaction system 60 in this embodiment includes: a processor 61 and a memory 62;
the memory 62 is used for storing computer programs (such as application programs, functional modules, and the like for implementing the data interaction method), computer instructions, and the like, which can be stored in one or more memories 62 in a partitioned manner. And the above-mentioned computer program, computer instructions, data, etc. can be called by the processor 61.
A processor 61 for executing the computer program stored in the memory 62 to implement the steps of the method according to the above embodiments. Reference may be made in particular to the description relating to the preceding method embodiment. The memory 62 and the processor 61 may be coupled by a bus 63.
The present embodiment may implement the technical solutions in the methods shown in fig. 2 to fig. 4, and the implementation processes and technical effects are similar to those of the methods described above, and are not described herein again.
In addition, embodiments of the present application further provide a computer-readable storage medium, in which computer-executable instructions are stored, and when at least one processor of the user equipment executes the computer-executable instructions, the user equipment performs the above-mentioned various possible methods.
Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in user equipment. Of course, the processor and the storage medium may reside as discrete components in a communication device.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (13)

1. A data interaction method is applied to a DPI configuration server, and comprises the following steps:
receiving a service request sent by a third-party system; the service request comprises: service identification and data type;
if the service request does not relate to private data, sending configuration information to a Deep Packet Inspection (DPI) data system and sending login information to the third-party system, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file;
the determining that the service request does not involve private data comprises: and determining that the service request does not relate to private data according to the service identifier and the data type carried in the service request.
2. The method of claim 1, after receiving the service request sent by the third-party system, further comprising:
and if the service request relates to private data, rejecting the service request sent by the third-party system.
3. The method of claim 1, wherein the login information comprises: the third party system accesses the login password of the DPI data system, the Internet protocol IP address of the DPI data system and the identification of the DPI data system.
4. A data interaction method is applied to a DPI data system, and comprises the following steps:
receiving configuration information sent by a DPI configuration server; the configuration information is generated by the DPI configuration server according to a service request sent by a third-party system after determining that the service request does not relate to private data, and the service request comprises: the service request comprises a service identifier and a data type, wherein the service identifier and the data type are used for determining whether the service request comprises privacy data;
if the login information sent by the third-party system is correct, generating a target file according to the configuration information;
and sending the target file to the third-party system.
5. The method according to claim 4, wherein if the login information sent by the third-party system is correct, generating the target file according to the configuration information comprises:
receiving a login request sent by a third-party system, wherein the login request comprises login information, and the login information comprises: a third party system accesses a login password of the DPI data system, an Internet Protocol (IP) address of the DPI data system and an identifier of the DPI data system;
judging whether the login password is correct or not, and if the login password is correct, sending a login success response to the third-party system;
receiving a file acquisition request sent by the third-party system;
and generating a target file according to the configuration information.
6. The method of claim 4, further comprising, after sending the target file to the third-party system:
and receiving response information sent by the third-party system, wherein the response information is feedback information generated by the third-party system when the received target file is determined to be a legal file.
7. A data interaction device, comprising:
the receiving module is used for receiving a service request sent by a third-party system; the service request comprises: service identification and data type;
the determining module is used for sending configuration information to a Deep Packet Inspection (DPI) data system and sending login information to the third-party system when the service request is determined not to relate to private data, wherein the configuration information is generated according to the service request and is used for controlling the DPI data system to generate a target file;
the determining that the service request does not involve private data comprises: and judging that the service request does not relate to private data according to the service identifier and the data type carried in the service request.
8. The apparatus of claim 7, wherein the determining module is further configured to: after receiving a service request sent by a third-party system, if the service request relates to private data, rejecting the service request sent by the third-party system.
9. The apparatus of claim 7, wherein the login information comprises: the third party system accesses the login password of the DPI data system, the Internet protocol IP address of the DPI data system and the identification of the DPI data system.
10. A data interaction device, comprising:
the receiving module is used for receiving the configuration information sent by the DPI configuration server; the configuration information is generated by the DPI configuration server according to a service request sent by a third-party system after determining that the service request does not relate to private data, and the service request comprises: the service request comprises a service identifier and a data type, wherein the service identifier and the data type are used for determining whether the service request comprises privacy data;
the processing module is used for generating a target file according to the configuration information when the login information sent by the third-party system is correct;
and the sending module is used for sending the target file to the third-party system.
11. The apparatus of claim 10, wherein the processing module is specifically configured to:
receiving a login request sent by a third-party system, wherein the login request comprises login information, and the login information comprises: a third party system accesses a login password of the DPI data system, an Internet Protocol (IP) address of the DPI data system and an identifier of the DPI data system;
judging whether the login password is correct or not, and if the login password is correct, sending a login success response to the third-party system;
receiving a file acquisition request sent by the third-party system;
and generating a target file according to the configuration information.
12. The apparatus of claim 10, wherein the receiving module is further configured to: after the target file is sent to the third-party system, response information sent by the third-party system is received, wherein the response information is feedback information generated when the third-party system determines that the received target file is a legal file.
13. A data interaction system, comprising:
a memory for storing a program;
a processor for executing the program stored by the memory, the processor being adapted to perform the method of any of claims 1-3 and/or the method of any of claims 4-6 when the program is executed.
CN201810476283.5A 2018-05-17 2018-05-17 Data interaction method, device and system Active CN108768987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810476283.5A CN108768987B (en) 2018-05-17 2018-05-17 Data interaction method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810476283.5A CN108768987B (en) 2018-05-17 2018-05-17 Data interaction method, device and system

Publications (2)

Publication Number Publication Date
CN108768987A CN108768987A (en) 2018-11-06
CN108768987B true CN108768987B (en) 2021-03-02

Family

ID=64007004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810476283.5A Active CN108768987B (en) 2018-05-17 2018-05-17 Data interaction method, device and system

Country Status (1)

Country Link
CN (1) CN108768987B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633254A (en) * 2019-09-19 2019-12-31 中国银行股份有限公司 Data interaction method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656677A (en) * 2017-01-13 2017-05-10 武汉邮电科学研究院 Deep packet detection system and method oriented to big data
CN107547432A (en) * 2017-08-28 2018-01-05 新华三信息安全技术有限公司 A kind of flow control methods and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287006B (en) * 2008-05-12 2013-08-07 华为软件技术有限公司 Information indicating method, system and device
KR101195944B1 (en) * 2008-12-17 2012-10-29 고려대학교 산학협력단 Device and method for deep packet inspection
CN106303751B (en) * 2015-05-18 2020-06-30 中兴通讯股份有限公司 Method and system for realizing directional flow packet
CN107529190B (en) * 2016-06-21 2021-04-16 中国移动通信集团山西有限公司 User data acquisition system and method
CN106713067B (en) * 2016-11-30 2020-03-17 广东电网有限责任公司信息中心 Sensitive file circulation monitoring method based on DPI
CN107493280B (en) * 2017-08-15 2020-10-09 中国联合网络通信集团有限公司 User authentication method, intelligent gateway and authentication server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656677A (en) * 2017-01-13 2017-05-10 武汉邮电科学研究院 Deep packet detection system and method oriented to big data
CN107547432A (en) * 2017-08-28 2018-01-05 新华三信息安全技术有限公司 A kind of flow control methods and device

Also Published As

Publication number Publication date
CN108768987A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
US20170331834A1 (en) Centralized authentication for granting access to online services
EP3178221B1 (en) Device identification in service authorization
US10419431B2 (en) Preventing cross-site request forgery using environment fingerprints of a client device
WO2014172956A1 (en) Login method,apparatus, and system
US20140325628A1 (en) Login method, apparatus, and system
CN110795174B (en) Application program interface calling method, device, equipment and readable storage medium
CN106559405B (en) Portal authentication method and equipment
US20170034164A1 (en) Multifactor authentication for mail server access
WO2015085912A1 (en) Method and system for communication number update
CN111800426A (en) Method, device, equipment and medium for accessing native code interface in application program
US20230254146A1 (en) Cybersecurity guard for core network elements
CN110602130B (en) Terminal authentication system and method, equipment terminal and authentication server
CN107592299B (en) Proxy internet access identification method, computer device and computer readable storage medium
CN103581881A (en) Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side
CN114465791B (en) Method and device for establishing white list in network management equipment, storage medium and processor
CN113194099B (en) Data proxy method and proxy server
EP3079329B1 (en) Terminal application registration method, device and system
CN108768987B (en) Data interaction method, device and system
CN109462589B (en) Method, device and equipment for controlling network access of application program
CN113067802A (en) User identification method, device, equipment and computer readable storage medium
CN114793171B (en) Method and device for intercepting access request, storage medium and electronic device
CN113472545B (en) Equipment network access method, device, equipment, storage medium and communication system
CN106487776B (en) Method, network entity and system for protecting machine type communication equipment
EP4047885A1 (en) Method and system for processing network service, and gateway device
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant