CN109388384A - A kind of data exchange system - Google Patents
A kind of data exchange system Download PDFInfo
- Publication number
- CN109388384A CN109388384A CN201810947073.XA CN201810947073A CN109388384A CN 109388384 A CN109388384 A CN 109388384A CN 201810947073 A CN201810947073 A CN 201810947073A CN 109388384 A CN109388384 A CN 109388384A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- message
- service
- filling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
- G06F8/24—Object-oriented
Abstract
The invention discloses a kind of data exchange systems, comprising: foreground package module is often serviced with business packed for system foreground, interface;Backstage package module, for business packed service required for system background;Messaging service interface module, the transmission service for letter, mail in providing short message, standing;Service inquiry module is used for inquiry business type and content;Data inquiry module, for inquiring data type and content;Entity object module provides encapsulation of data for service inquiry module and data inquiry module.Data interchange platform of the invention, data resource is abundant, selects high-quality data;One-stop intervention;It actively sells, cashability is strong.
Description
Technical field
The invention belongs to data service technology fields, and in particular to a kind of data exchange system.
Background technique
Many mega projects need to complete the convergence to multiparty datas such as public security, traffic, education, insurance, credits at present, real
In existing data set and data sharing, and it is higher to real-time accuracy requirement.
Existing majority data interchange platform, constructs data interchange platform using frame+plug-in unit framework, frame is with data
Switching engine is core, plug-in unit, that is, data exchange middleware, and frame has handled the major part of the high speeds data exchanges such as concurrent, caching
Technical problem, and provide simple interface and interacted with plug-in unit, data exchange middleware stores the data after conversion to isomery
In system, the high speed exchange between enterprise's isomeric data is realized;Or propose that a kind of includes several data exchange clients, one
The data interchange platform of a intermediate store and an intermediate processor, data exchange client and intermediate processor, centre are deposited
Reservoir connection;Data exchange client's end memory contains data file to be exchanged, realizes different terminals by intermediate store
Between data exchange.But above scheme has a single function, and versatility and flexibility are poor, and the portion of techniques used is out-of-date.
The shortcomings that traditional data service platform is: data resource is few, and high-quality data are rare;Access process is complicated;Quilt
Dynamic sale services difficult cash.
Summary of the invention
In order to solve the above problem, the present invention provides a kind of data exchange systems, are docked by big data distribution platform more
The abundant data of dimension guarantees safety and the access efficiency of data, provides data output and the best channel flowed into for enterprise;
And help the provider of data to carry out data with party in request and dock, it constructs with data opening, data sharing, data analysis as core
The aggregate data open platform of the heart.
According to an aspect of the invention, there is provided a kind of data exchange system, comprising:
Foreground package module is often serviced with business packed for system foreground, interface;
Backstage package module, for business packed service required for system background;
Messaging service interface module, the transmission service for letter, mail in providing short message, standing;
Service inquiry module is used for inquiry business type and content;
Data inquiry module, for inquiring data type and content;
Entity object module provides encapsulation of data for service inquiry module and data inquiry module.
Preferably, there is the circulation of data between the entity object module and data inquiry module, service inquiry module.
Preferably, the transmission mode of the data is divided into two kinds of transmission modes of http and/or https.
Preferably, the data be encryption data, using to Encryption Algorithm include: secure hash algorithm, MD5 algorithm.
Preferably, the secure hash algorithm includes the following steps: for handling message data
(1) extra order is filled, filling message makes its length ≡ 896;
(2) additional length adds 128 blocks after message after filling, signless integer is regarded as, before it includes
The length of message;
(3) buffer area Hash is initialized, Hash function intermediate result and final result are stored in 512 buffer areas, delay
Rush area is indicated by 8 64 registers, and the integer for being 64 by these initialization of register;
(4) processed in units message is grouped into 1024 and export result.
Preferably, the mode that each content of registers obtains is: taking preceding 8 prime numbers to make even root, takes fractional part
First 64.
Preferably, the MD5 is used for processing information data, includes the following steps:
(1) it fills, information is filled first, its bit length is made to be equal to 448 to the result of 512 complementations;
(2) initializing variable, 128 initial place values are four preliminary examination link variables, these parameters are used for the fortune of the first round
It calculates, is indicated with big end syllable sequence;
(3) packet data is handled, the algorithm flow of each grouping is as follows:
First grouping copies to aforementioned four link variable in four additional variable, and the variable since second packet is
The operation result of a upper grouping;
Major cycle has a four-wheel, and the first round carries out 16 operations, and operation is to wherein three in above-mentioned four additional variable every time
Then acquired results are added the 4th variable by the nonlinear function operation of a work, a subgroup of text and one are often
Number;By acquired results, ring moves an indefinite number to the left again, and plus one of above-mentioned four additional variable, finally with the result
Replace one of above-mentioned four additional variable.
(4) it exports, last output is the cascade of above-mentioned four additional variable.
Preferably, the method for the filling is as follows:
1) one 1 and numerous 0 is filled behind information, just stops 0 pair of information when meeting condition above
Filling;
2) message length before adding one behind this result with the filling of 64 binary representations, if binary form
Message length is more than 64 before the filling shown, then takes low 64.
Preferably, the system also includes:
Configuration management module, for managing every configuration parameter of the system;
Common tools module completes the calling between modules for providing various common tools for system;
Message managing module, for managing the message of the internal system and external transmitting.
Preferably, the system also includes:
Username and password is arranged for logging in the system in login module;
Foreground Website Module accesses external service for externally showing the function of whole system;
Back bench web module, the interactive function for internal running background system.
The present invention has the advantages that data exchange system of the invention, data resource is abundant, selects high-quality data;One station
Formula intervention;It actively sells, cashability is strong.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of data exchange system structure chart of the invention;
Fig. 2 shows a kind of principle assumption diagrams of the foreground Website Module of data exchange system of the invention;
Fig. 3 shows data exchange system functional structure chart of the invention;
Fig. 4 shows data exchange system technical effect schematic diagram of the invention.
Fig. 5 shows the process of purchase figure of the client of embodiment according to the present invention 1.
Specific embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in attached drawing
The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here
The mode of applying is limited.It is to be able to thoroughly understand the disclosure on the contrary, providing these embodiments, and can be by this public affairs
The range opened is fully disclosed to those skilled in the art.
The present invention docks the abundant data of various dimensions by big data distribution platform, guarantees that the safety of data and access are imitated
Rate provides data output and the best channel flowed into for enterprise;And help the provider of data to carry out data with party in request and dock,
Construct the aggregate data open platform with data opening, data sharing, data analysis for core.
As shown in Figure 1, data exchange system of the invention, comprising:
Foreground package module is often serviced with business packed for system foreground, interface;
Backstage package module, for business packed service required for system background;
Messaging service interface module, the transmission service for letter, mail in providing short message, standing;
Service inquiry module is used for inquiry business type and content;
Data inquiry module, for inquiring data type and content;
Entity object (bean) module, provides encapsulation of data for service inquiry module and data inquiry module.
There are the circulation of data, data transmission between the entity object module and data inquiry module, service inquiry module
Mode is divided into http and two kinds of transmission modes of https, and the data of transmission are encryption data, and the Encryption Algorithm used includes but not
It is limited to: secure hash algorithm, MD5 algorithm.
Secure hash algorithm (English: Secure Hash Algorithm is abbreviated as SHA) is a Cryptographic Hash Function
Family is the secure hash algorithm that FIPS is authenticated.It can calculate and arrive corresponding to a digital massage, the fixed character of length
The algorithm of string (also known as eap-message digest).And if the message difference of input, the probability that they correspond to kinds of characters string are very high.
SHA algorithm process message data used in the present invention, includes the following steps:
Step 1: filling extra order
Filling message makes its length ≡ 896 (mod 1024).Filling is made of one 1 and subsequent 0.
Step 2: additional length
The block that 128 are added after message after filling, is regarded as signless integer, it includes the length of preceding message.
First two steps the result is that produce a length be 1024 integral multiples message, to be grouped.
Step 3: the initialization buffer area Hash
Hash function intermediate result and final result are stored in 512 buffer areas, and buffer area is by 8 64 registers
(a, b, c, d, e, f, g, h) is indicated, and is following 64 integers (hexadecimal) by these initialization of register.
The mode that each content of registers obtains is: preceding 8 prime numbers (2,3,5,7,11,13,17,19) root of making even is taken,
Take first 64 of fractional part.
Step 4: being unit processing message with 1024 groupings (128 bytes) and export result.
Message Digest Algorithm MD5 (the entitled Message Digest Algorithm 5 of Chinese) is computer security
The widely used a kind of hash function in field, to provide the integrity protection of message.The document number of the algorithm is RFC 1321
(R.Rivest,MIT Laboratory for Computer Science and RSA Data Security Inc.April
1992).
The full name of MD5 is Message-Digest Algorithm 5 (md5-challenge), in the early 1990s by MIT
The Ronald L.Rivest of Laboratory for Computer Science and RSA Data Security Inc is developed
Come, is developed through MD2, MD3 and MD4.
MD5 is for ensuring that information transmission is complete consistent.Be one of widely used hash algorithm of computer (and translate abstract calculate
Method, hash algorithm), mainstream programming language generally has MD5 and realizes.It is another fixed-length value by data (such as Chinese character) operation,
It is the basic principle of hash algorithm, there are MD2, MD3 and MD4 in the predecessor of MD5.
The effect of MD5 is that large capacity information is allowed to be ' compressed ' into a kind of guarantor before signing private key with digital signature software
Close format (being exactly the hexadecimal number word string for the byte serial of a random length being transformed into a fixed length).
The narration brief to MD5 algorithm can be with are as follows: MD5 handles the information of input with 512 groupings, and each grouping is again
16 32 seats groupings are divided into, after have passed through a series of processing, the output of algorithm is formed by four 32, by this
128 hashed values will be generated after four 32 packet concatenations.
In MD5 algorithm of the invention, it is necessary first to be filled to information, be equal to its bit length to the result of 512 complementations
448.Therefore, the bit length (Bits Length) of information will be scaled up to N*512+448, and N is a nonnegative integer, and N can be
Zero.The method of filling is as follows, and one 1 and numerous 0 is filled behind information, just stops using when meeting condition above
The filling of 0 pair of information.Then, message length before adding one behind this result with the filling of 64 binary representations.Through
The processing of this two step is crossed, bit length=N*512+448+64=(N+1) * 512 of information, i.e. length are precisely 512 integral multiple.This
The reason of sample is done is to meet the requirement in later process to message length.
The MD5 algorithm that the present invention uses has the following characteristics that
1, compressibility: the MD5 value length of the data of random length, calculating is fixed.
2, it is easy to calculate: calculating MD5 value from former data and be easy to.
3, anti-modification: making any change to former data, even only modifying 1 byte, obtained MD5 value has very
Big difference.
4, strong impact resistant: known original data and its MD5 value are wanted to find data (the i.e. forgery number with identical MD5 value
According to) it is very difficult.
The process of MD5 algorithm used in the present invention is as follows:
1. filling
In MD5 algorithm, it is necessary first to information is filled, makes its bit length to the result of 512 complementations equal to 448, and
And filling must carry out, even if its bit length is equal to 448 to the result of 512 complementations.Therefore, the bit length (Bits Length) of information
It will be scaled up to N*512+448, N is a nonnegative integer, and N can be zero.
The method of filling is as follows:
1) one 1 and numerous 0 is filled behind information, just stops 0 pair of information when meeting condition above
Filling.
2) message length (unit Bit) before adding one behind this result with the filling of 64 binary representations,
If message length is more than 64 before the filling of binary representation, low 64 are taken.
By the processing of this two step, bit length=N*512+448+64=(N+1) * 512 of information, i.e. length is precisely 512
Integral multiple.Reason for this is that meet the requirement in later process to message length.
2. initializing variable
128 initial place values are preliminary examination link variable, these parameters are used for the operation of the first round, carry out table with big end syllable sequence
Show, they are respectively as follows: A=0x01234567, B=0x89ABCDEF, C=0xFEDCBA98, D=0x76543210.
(numerical value that each variable provides is that high byte is stored in memory low address, and low byte is stored in memory high address, i.e., greatly
Hold syllable sequence.Variables A, the value of B, C, D are respectively 0x67452301,0xEFCDAB89,0x98BADCFE in a program,
0x10325476)。
3. handling packet data
The algorithm flow of each grouping is as follows:
First grouping needs to copy to four link variables above in four additional variable: A to a, B to b, C to c, D are arrived
d.Variable since second packet is the operation result of a upper grouping, i.e. A=a, B=b, C=c, D=d.
Major cycle has four-wheel (MD4 only has three-wheel), and every wheel circulation is all much like.The first round carries out 16 operations.Behaviour every time
Make to the wherein nonlinear function operation of three works in a, b, c and d, acquired results are then added into the 4th variable, text
This subgroup and a constant.By acquired results, ring moves an indefinite number to the left again, and plus it in a, b, c or d
One.Finally replace one of a, b, c or d with the result.
It is four nonlinear functions (every one, wheel) used in each operation below.
F (X, Y, Z)=(X&Y) | ((~X) &Z)
G (X, Y, Z)=(X&Z) | (Y& (~Z))
H (X, Y, Z)=X^Y^Z
I (X, Y, Z)=Y^ (X | (~Z))
(& be with (And), | be or (Or) ,~right and wrong (Not), ^ be exclusive or (Xor))
The explanation of this four functions: if the correspondence position of X, Y and Z be it is independent and uniform, result each
It should be independent and uniform.
F is the function of a bitwise operation.That is, if X, Y, otherwise Z.Function H is odd even operator by turn.
Assuming that Mj indicates j-th of subgroup (from 0 to 15) of message, constant ti is 4294967296*abs (sin (i))
Integer part, for i value from 1 to 64, unit is radian.(4294967296=232)
Now define:
FF (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+F (b, c, d)+Mj+ti) < < s)
GG (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+G (b, c, d)+Mj+ti) < < s)
HH (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+H (b, c, d)+Mj+ti) < < s)
II (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+I (b, c, d)+Mj+ti) < < s)
Note: " < < " indicate ring shift left position, do not shift left.
This four-wheel (totally 64 step) is:
The first round
FF(a,b,c,d,M0,7,0xd76aa478)
FF(d,a,b,c,M1,12,0xe8c7b756)
FF(c,d,a,b,M2,17,0x242070db)
FF(b,c,d,a,M3,22,0xc1bdceee)
FF(a,b,c,d,M4,7,0xf57c0faf)
FF(d,a,b,c,M5,12,0x4787c62a)
FF(c,d,a,b,M6,17,0xa8304613)
FF(b,c,d,a,M7,22,0xfd469501)
FF(a,b,c,d,M8,7,0x698098d8)
FF(d,a,b,c,M9,12,0x8b44f7af)
FF(c,d,a,b,M10,17,0xffff5bb1)
FF(b,c,d,a,M11,22,0x895cd7be)
FF(a,b,c,d,M12,7,0x6b901122)
FF(d,a,b,c,M13,12,0xfd987193)
FF(c,d,a,b,M14,17,0xa679438e)
FF(b,c,d,a,M15,22,0x49b40821)
Second wheel
GG(a,b,c,d,M1,5,0xf61e2562)
GG(d,a,b,c,M6,9,0xc040b340)
GG(c,d,a,b,M11,14,0x265e5a51)
GG(b,c,d,a,M0,20,0xe9b6c7aa)
GG(a,b,c,d,M5,5,0xd62f105d)
GG(d,a,b,c,M10,9,0x02441453)
GG(c,d,a,b,M15,14,0xd8a1e681)
GG(b,c,d,a,M4,20,0xe7d3fbc8)
GG(a,b,c,d,M9,5,0x21e1cde6)
GG(d,a,b,c,M14,9,0xc33707d6)
GG(c,d,a,b,M3,14,0xf4d50d87)
GG(b,c,d,a,M8,20,0x455a14ed)
GG(a,b,c,d,M13,5,0xa9e3e905)
GG(d,a,b,c,M2,9,0xfcefa3f8)
GG(c,d,a,b,M7,14,0x676f02d9)
GG(b,c,d,a,M12,20,0x8d2a4c8a)
Third round
HH(a,b,c,d,M5,4,0xfffa3942)
HH(d,a,b,c,M8,11,0x8771f681)
HH(c,d,a,b,M11,16,0x6d9d6122)
HH(b,c,d,a,M14,23,0xfde5380c)
HH(a,b,c,d,M1,4,0xa4beea44)
HH(d,a,b,c,M4,11,0x4bdecfa9)
HH(c,d,a,b,M7,16,0xf6bb4b60)
HH(b,c,d,a,M10,23,0xbebfbc70)
HH(a,b,c,d,M13,4,0x289b7ec6)
HH(d,a,b,c,M0,11,0xeaa127fa)
HH(c,d,a,b,M3,16,0xd4ef3085)
HH(b,c,d,a,M6,23,0x04881d05)
HH(a,b,c,d,M9,4,0xd9d4d039)
HH(d,a,b,c,M12,11,0xe6db99e5)
HH(c,d,a,b,M15,16,0x1fa27cf8)
HH(b,c,d,a,M2,23,0xc4ac5665)
Fourth round
II(a,b,c,d,M0,6,0xf4292244)
II(d,a,b,c,M7,10,0x432aff97)
II(c,d,a,b,M14,15,0xab9423a7)
II(b,c,d,a,M5,21,0xfc93a039)
II(a,b,c,d,M12,6,0x655b59c3)
II(d,a,b,c,M3,10,0x8f0ccc92)
II(c,d,a,b,M10,15,0xffeff47d)
II(b,c,d,a,M1,21,0x85845dd1)
II(a,b,c,d,M8,6,0x6fa87e4f)
II(d,a,b,c,M15,10,0xfe2ce6e0)
II(c,d,a,b,M6,15,0xa3014314)
II(b,c,d,a,M13,21,0x4e0811a1)
II(a,b,c,d,M4,6,0xf7537e82)
II(d,a,b,c,M11,10,0xbd3af235)
II(c,d,a,b,M2,15,0x2ad7d2bb)
II(b,c,d,a,M9,21,0xeb86d391)
After all these completions, a, b, c, d are added into A, B, C, D on the basis of original respectively.
That is a=a+A, b=b+B, c=c+C, d=d+D
Then algorithm above is continued to run with next packet data.
4. output
Last output is the cascade of a, b, c and d.
After realizing MD5 algorithm according to method described above, the journey that you can be worked it out with following information
Sequence makees a simple test, looks at program either with or without mistake.
MD5 (" ")=d41d8cd98f00b204e9800998ecf8427e
MD5 (" a ")=0cc175b9c0f1b6a831c399e269772661
MD5 (" abc ")=900150983cd24fb0d6963f7d28e17f72
MD5 (" message digest ")=f96b697d7cb7938d525a2f31aaf161d0
MD5 (" abcdefghijklmnopqrstuvwxyz ")=c3fcd3d76192e4007dfb496cca67e13b
MD5 (" ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz ")=f29939a
25efabaef3b87e2cbfe641315
MD5 (" 8a683566bcc7801226b3d8b0cf35fd97 ")=cf2cb5c89c5e5eeebef4a76becd
dfcfd
Now by taking character string " jklmn " as an example.
The character string indicates in memory are as follows: 6A 6B 6C 6D 6E (being from left to right low address to high address, rear same),
Message length is 40bits, i.e. 0x28.
It is filled, is filled to 448, i.e. 56 bytes.As a result are as follows:
6A 6B 6C 6D 6E 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00
64 remaining, i.e. information bit length before 8 padding bytes are filled fills remaining 8 byte by little-endian, as a result
Are as follows:
6A 6B 6C 6D 6E 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 28 00 00 00 00 00 00 00
(64 bytes, 512bits)
Initialize tetra- variables of A, B, C, D.
Data after this 64 padding bytes are divided into 16 groups (16 arrays are corresponded in program), it may be assumed that
(this is the sequence in memory to M0:6A 6B 6C 6D, and the value according to little-endian principle, corresponding array M (0) is
0x6D6C6B6A, similarly hereinafter)
M1:6E 80 00 00
M2:00 00 00 00
.....
M14:28 00 00 00
M15:00 00 00 00
After " 3. packet data processes ", a, b, c, d value be respectively 0xD8523F60,0x837E0144,
0x517726CA、0x1BB6E5FE
It is in memory 52 D8 of a:60 3F
01 7E 83 of b:44
C:CA 26 77 51
D:FE E5B6 1B
A, b, c, d are final result by memory Sequential output: 603F52D844017E83CA267751FEE5B61B.This
It is exactly the MD5 value of character string " jklmn ".
It is the nucleus module of the data exchange system above, is to complete the present invention to have and most important function
It can module.
In order to improve the present invention, the invention also includes:
Configuration management module, for managing every configuration parameter of the system.
Common tools module completes the calling between modules for providing various common tools for system.
Message managing module, for managing the message of the internal system and external transmitting.
Username and password is arranged for logging in the system in login module.
Foreground Website Module accesses external service for externally showing the function of whole system.
Back bench web module, the interactive function for internal running background system.
An example using present system is described below.
Embodiment 1
In the present embodiment, data exchange system is specially big data distribution platform.Wherein, client refers to through big data point
Send out enterprise or the individual of platform purchase data.Supplier refers to the affiliate of big data distribution platform, the offer of data channel
Side.
Registration
Platform is registered using the mode that mobile phone is verified;The information that client need to fill in includes: phone number, mobile phone verifying
Code, mailbox, login password.
After granted service agreement can successful registration platform account, after registration system will guide client carry out authentication,
It may be selected to authenticate later.
The account of unverified identity can not carry out data purchase.
It logs in
Platform is logged in using cell-phone number and password, is forgotten Password to verify by mobile phone and be given for change.
Authentication
Account authentication is divided into personal identification and enterprise identity certification, and corresponding different types of certification need to fill in not
Same authentication information after information is submitted, needs to wait for audit by that could authenticate successfully.
Personal authentication need to submit information:
Business contact's Real Name, business contact's ID card No., business contact's cell-phone number, business contact's postal
Case, affiliated industry.
Corporate authentication need to submit information:
Enterprise contacts Real Name, enterprise contacts cell-phone number, enterprise contacts mailbox, Business Name, affiliated industry,
Business license location, legal person, status of a legal person card number, three card unification (business licenses number/unification social credibility code/registration
Number), business license validity period, business license attachment photo, company to public account, the name that opens a bank account, to public account bank of deposit.
Supplier enters
Platform supports supplier's application to enter information submission, and supplier needs first register platforms account, under logging state, point
Homepage [I is supplier] entrance is hit, information solicitation is carried out, after information is submitted, commercial affairs will be linked up under the information wire according to submission and be supplied
Answer quotient.
The information that supplier need to submit includes:
Enterprise contacts information:Corporate business contact person Real Name, corporate business contact person cell-phone number, corporate business connection
It is people's mailbox;
Company's information:Business Name, affiliated industry, business license location, three card unification (business licenses number/unification society
Can credit code/number of registration), business license validity period, business license electronic edition, company location, telephone number, legal person, method
People's identification card number, registered capital, business scope.
Company's bank account information:Company opens a bank account name, company's Bank Account Number, bank of deposit location, bank of deposit's branch
Row connection line number, subbranch, bank of deposit title.
Data classification
Support is classified according to the function type of data, and multiclass classification is supported in classification.
Data details are shown
The details of details displayed page display data carry out checking purchase for client.
The information of displaying includes:
√ picture
√ title
√ brief introduction: the breviary introduction of the data
√ price
√ buys specification
√ is discussed in detail
√ access process
√ mistake reference code.
Client's process of purchase figure
As shown in figure 5, being the process of purchase figure of client.Firstly, client's logon data platform, then selection needs to access
Data, application access;Specification (number) is selected after client's access, it is pre-paid or monthly billing that reselection, which settles accounts type,.Work as visitor
It when family selects pre-paid, is paid, until payment completion, and then is called according to interface document immediately.When client selects
It when monthly billing, it is first determined whether being credit accounts, is if it is called, is otherwise supplemented with money as credit according to interface document
Account.
Price
The price in channel is divided to two kinds: standard price and signing valence (wholesale price).
The price of front end, which is shown, only shows standard price.It is used if the practical calling channel charging such as configured signing valence in the channel
Signing valence charging.
Clearing
Platform clearing form is divided into two class of pre-payment and post-paid (monthly billing).
Pre-payment: it when portal application accesses channel, directly buys number and pays;It deducts fees when channel is called successfully,
Until payment amount is run out of.
Monthly billing: first consuming, and settles accounts by the unit the end of month of the moon, and client, which need to become credit customer, just can be carried out monthly billing, the moon
Clearing have protection ratio, and when the account arrearage amount of money of deducting fees of client reaches protection ratio, then channel is closed, and need to close arrearage
It could normal call channel.
Payment
The means of payment is supported to pay using account balance payment or Third-party payment mode.
Individual center
Individual center include: essential information, I account, I data, my order.
Essential information
Account information
Account information includes:
√ account name: cell-phone number can not be changed;
√ email address: it can change;
Authentication
Certification includes: personal authentication, corporate authentication.
The account for not carrying out authentication can not carry out application access channel.
Password is modified/is given for change
Under the premise of known original code, modified by verifying original code;
Under the premise of forgetting original code, modified by mobile phone identifying code.
My account
The column can carry out account charging and account revenue and expenditure record is checked.
Customer account is divided into different types of account, and the amount of money in different type account is different using limitation.Customer account
Type is divided into: test account, Free Account, account of deducting fees, margin account.
Test account: the amount of money in account is only used for the use of client's test experience, will be cleared when formally using.
Free Account: being platform rebating to the amount of money of client, and the amount of money given cannot be in this month use, use in secondary month
The amount of money is not counted in rebating scheme, is preferentially deducted when deducting fees and is given the amount of money, and giving after the amount of money deducts cannot retract.
It deducts fees account: the amount of money normally supplemented with money for client, for use of formally deducting fees.
Margin account: client is the amount of money supplemented with money as credit accounts, it is impossible to be used in charging, before not supporting client
Platform operation is withdrawn deposit.
Platform will show the remaining sum of every kind of Account Type.
It supplements with money
Client is only capable of to deducting fees account and margin account is supplemented with money;
The means of payment is Third-party payment.
Supplement record with money
The business revenue and expenditure artificial situation of record support account, business include supplement with money, deduct fees, reimbursement, rebating.
List display field includes business odd numbers, affiliated Account Type, business, the amount of money, time.
Support screening inquiry and export excel.
My data
The plate shows that client applies for the data of access.
The pay status of request slip:
Be turned off: advance payment is not paid after client's submission application or monthly billing, user actively cancel an order;
In reimbursement: after advances from customers is paid successfully, request reimbursement, reimbursement wait in;
It is refunded: to have carried out reimbursement;
Do not pay: client does not pay after submitting application, and clearing form may be selected, and supports management on backstage for client
Payment;
Paid: advances from customers is paid successfully;
In clearing: the state of monthly billing does not start to call channel or toward being settled the moon, this month is being called, for this
State;
Do not settle accounts: the state of monthly billing, this month, are not called channel, and toward the moon, there are the states of debt;Support management
Member is on backstage for customer statement.
Settled accounts: the state of monthly billing, this month, are not called channel, are settled toward moon debt.The label root of list
According to data access state be divided into total data, it is to be accessed, accessed, be turned off;The field of data request slip list display includes:
√ application numbers
The √ application time
√ data type
√APPkey
√ settles accounts type
√ residue degree: only advance payment shows residue degree;
√ call number (success)
√ call number (failure)
√ operation: corresponding different access states have different operation.
In access
Pay status in access has: in not paying, paid, settling accounts;This state is the number that client is accessing purchase
According to;
[in access-do not pay] can operate:
√ closes application: closing the access application.
√ payment
[in access-paid] [in access-in settling accounts] can operate:
√ interface: access process and interface document can be checked;
√ early warning: setting call number residue degree threshold value sends short message prompt to early warning cell-phone number.
It has accessed
The pay status accessed has: having paid, does not settle accounts, has settled accounts;This state is the number that client has accessed purchase
According to, and calling;
[accessed-paid] can operate:
√ interface: access process and interface document can be checked;
√ detail: the detail record of every calling order can be checked;
Including calling order number, call request time, concluded price (member/time), pay status, channel discount, order shape
State (success, failure);
√ statistics: for the success in this application unitary call channel and frequency of failure statistics, readjustment delay statistics.
√ early warning: setting call number residue degree threshold value and channel disabling notice send short message to early warning cell-phone number and mention
Show.
[access-do not settle accounts] [access-settled accounts] can operate:
√ interface: access process and interface document can be checked;
√ detail: the detail record of every calling order can be checked;
Including calling order number, call request time, concluded price (member/time), pay status, channel discount, order shape
State (success, failure);
√ statistics: for the success in this application unitary call channel and frequency of failure statistics, readjustment delay statistics.
√ early warning: setting call number residue degree threshold value and channel disabling notice send short message to early warning cell-phone number and mention
Show.
√ clearing: checking monthly billing bill and carries out payment and settlement, bill include: the time, transfer successfully at this time, consumption it is golden
Volume, the rebating amount of money, the deduction and exemption amount of money, the amount of money of actually deducting fees, the arrearage amount of money.
It is turned off
The pay status being turned off is refunded and is turned off;It is operable as:
√ is bought again
√ is deleted: deleting display record
Data sheet
Data sheet will call situation with line chart and table display data.
Line chart supports per diem/month section to inquire data call number situation.
Table supports per diem/month section inquiry channel to call total, successfully number, unsuccessfully number, success rate, average delay
(second).
Fig. 3 shows data exchange system functional structure chart of the invention;As shown, data management of the invention is realized
: data parameters management, data configuration management, data price control, call result management, API number management, interface calling are bright
Carefully, cache management;Operation function management realizes: star's management of product, sales promotion management, abstract generation, columns management, association
View management, LOGO setting;Foreground/background user management realizes: subscriber information management, aptitude checking management, Role Management, knot
Calculate detail management, user supplements detail with money, rights management, managing bill, user's request detail, background user management, freezes/infuses
Pin/defrosting management, consistency operation record etc..
Customer center realizes qualification authentication, data source publication, data source control, order management, buys/sell, data system
Meter;Realize star's product, in limited time indulgence, data source list, payment purchase in data source center;Help Center include product use,
Data source introduction, customized column, customized article etc..
In safe bottom of the invention, including random number verification, product private key, message encryption, transmission encryption, login order
Board, signature algorithm, multi-thread interconnection, hardware firewall, professional computer room, strange land calamity be standby, redundancy loan, IP authentication etc..
Fig. 4 shows data exchange system technical effect schematic diagram of the invention.Data exchange system of the invention has
Following features: seller directly fixes a price, and platform is not involved in;Demand is issued in time, Rapid matching demand;Affiliate is numerous, data
Source is wide;Identity switches at any time, does not set supply and demand threshold;Secrecy membership information is traded safer;Industry is broken one's promise list, Pian Ziyi
Net is beaten to the greatest extent;Powerful cashability relies on magnanimity client;Powerful selling group, service are cashed fast.
Operation mode, data source, the data safety situation of data service platform of the invention are as follows:
Operation mode: 1. seller's issuing services;2. number connection platform publication;3. being ordered on line, sold under line;It is received 4. obtaining
Benefit.
Data source:
AUTHORITATIVE DATA source data, member have data, internet public data by oneself, and member issues, and platform collects, and government affairs are public
It opens.
Data safety:
1. logging in token, product private key, signature algorithm, random number verification, message encryption.
2. transmission encryption, IP authentication, hardware firewall, strange land calamity are standby;
3. multi-thread interconnection, redundancy bandwidth, professional computer room.
The service publication process of data service platform of the invention is as follows:
1, perfect service information, including essential information, interface parameters, service pricing, sample explanation first.
2, security level is defined, includes whether that Token is needed to authenticate, if needs the certification of product private key, whether need to count
According to encrypted transmission, whether need random number verification etc..
3, Matching Platform interface, including account issuing service, own interface are docked to platform, interface joint debugging, connectivity survey
Examination etc..
4, service publication is completed.
It should be understood that
Algorithm and display be not inherently related to any certain computer, virtual bench or other equipment provided herein.
Various fexible units can also be used together with teachings based herein.As described above, it constructs required by this kind of device
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
One in the creating device of microprocessor or digital signal processor (DSP) to realize virtual machine according to an embodiment of the present invention
The some or all functions of a little or whole components.The present invention is also implemented as executing method as described herein
Some or all device or device programs (for example, computer program and computer program product).Such realization
Program of the invention can store on a computer-readable medium, or may be in the form of one or more signals.This
The signal of sample can be downloaded from an internet website to obtain, and is perhaps provided on the carrier signal or mentions in any other forms
For.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by anyone skilled in the art,
It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim
Subject to enclosing.
Claims (10)
1. a kind of data exchange system characterized by comprising
Foreground package module is often serviced with business packed for system foreground, interface;
Backstage package module, for business packed service required for system background;
Messaging service interface module, the transmission service for letter, mail in providing short message, standing;
Service inquiry module is used for inquiry business type and content;
Data inquiry module, for inquiring data type and content;
Entity object module provides encapsulation of data for service inquiry module and data inquiry module.
2. system according to claim 1, which is characterized in that
There is the circulation of data between the entity object module and data inquiry module, service inquiry module.
3. system according to claim 2, which is characterized in that
The transmission mode of the data is divided into two kinds of transmission modes of http and/or https.
4. system according to claim 2, which is characterized in that
The data be encryption data, using to Encryption Algorithm include: secure hash algorithm, MD5 algorithm.
5. system according to claim 4, which is characterized in that
The secure hash algorithm includes the following steps: for handling message data
(1) extra order is filled, filling message makes its length ≡ 896;
(2) additional length adds 128 blocks after message after filling, is regarded as signless integer, it includes preceding message
Length;
(3) buffer area Hash is initialized, Hash function intermediate result and final result are stored in 512 buffer areas, buffer area
It is indicated by 8 64 registers, and the integer for being 64 by these initialization of register;
(4) processed in units message is grouped into 1024 and export result.
6. system according to claim 5, which is characterized in that
The mode that each content of registers obtains is: taking preceding 8 prime numbers to make even root, takes first 64 of fractional part.
7. system according to claim 4, which is characterized in that
The MD5 is used for processing information data, includes the following steps:
(1) it fills, information is filled first, its bit length is made to be equal to 448 to the result of 512 complementations;
(2) initializing variable, 128 initial place values are four preliminary examination link variables, these parameters are used for the operation of the first round, with
Big end syllable sequence indicates;
(3) packet data is handled, the algorithm flow of each grouping is as follows:
First grouping copies to aforementioned four link variable in four additional variable, and the variable since second packet is upper one
The operation result of grouping;
Major cycle has four-wheel, and the first round carries out 16 operations, and operation is to wherein three works in above-mentioned four additional variable every time
Then acquired results are added the 4th variable, the subgroup and a constant of text by nonlinear function operation;Again
By acquired results, ring moves an indefinite number to the left, and plus one of above-mentioned four additional variable, is finally replaced with the result
One of above-mentioned four additional variable.
(4) it exports, last output is the cascade of above-mentioned four additional variable.
8. system according to claim 7, which is characterized in that
The method of the filling is as follows:
1) one 1 and numerous 0 is filled behind information, just stops filling out information with 0 when meeting condition above
It fills;
2) message length before adding one behind this result with the filling of 64 binary representations, if binary representation
Message length is more than 64 before filling, then takes low 64.
9. system according to any one of claims 1 to 8, which is characterized in that
The system also includes:
Configuration management module, for managing every configuration parameter of the system;
Common tools module completes the calling between modules for providing various common tools for system;
Message managing module, for managing the message of the internal system and external transmitting.
10. system according to any one of claims 1 to 8, which is characterized in that
The system also includes:
Username and password is arranged for logging in the system in login module;
Foreground Website Module accesses external service for externally showing the function of whole system;
Back bench web module, the interactive function for internal running background system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810947073.XA CN109388384A (en) | 2018-08-20 | 2018-08-20 | A kind of data exchange system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810947073.XA CN109388384A (en) | 2018-08-20 | 2018-08-20 | A kind of data exchange system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109388384A true CN109388384A (en) | 2019-02-26 |
Family
ID=65417679
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810947073.XA Pending CN109388384A (en) | 2018-08-20 | 2018-08-20 | A kind of data exchange system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109388384A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263571A (en) * | 2019-05-13 | 2019-09-20 | 特斯联(北京)科技有限公司 | A kind of personal data guard method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020198798A1 (en) * | 2001-04-03 | 2002-12-26 | Bottomline Technologies, Inc. | Modular business transactions platform |
CN105869023A (en) * | 2016-04-11 | 2016-08-17 | 广州智慧城市发展研究院 | System based on Internet-of-things M2M system and realizing method thereof |
CN107742085A (en) * | 2017-10-20 | 2018-02-27 | 国信嘉宁数据技术有限公司 | A kind of data security system |
CN108388816A (en) * | 2018-01-31 | 2018-08-10 | 上海集成电路研发中心有限公司 | A kind of method of read write chip identifier through encrypting |
-
2018
- 2018-08-20 CN CN201810947073.XA patent/CN109388384A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020198798A1 (en) * | 2001-04-03 | 2002-12-26 | Bottomline Technologies, Inc. | Modular business transactions platform |
CN105869023A (en) * | 2016-04-11 | 2016-08-17 | 广州智慧城市发展研究院 | System based on Internet-of-things M2M system and realizing method thereof |
CN107742085A (en) * | 2017-10-20 | 2018-02-27 | 国信嘉宁数据技术有限公司 | A kind of data security system |
CN108388816A (en) * | 2018-01-31 | 2018-08-10 | 上海集成电路研发中心有限公司 | A kind of method of read write chip identifier through encrypting |
Non-Patent Citations (4)
Title |
---|
刘瑞芳: "《程序设计实践》", 31 March 2015 * |
王凤英: "《网络与信息安全》", 30 June 2015 * |
邹新国: "《计算机信息与网络安全技术》", 31 August 2008 * |
韩会雯: "基于JSP的BBS论坛设计与实现", 《电脑编程技巧与维护》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263571A (en) * | 2019-05-13 | 2019-09-20 | 特斯联(北京)科技有限公司 | A kind of personal data guard method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106357640B (en) | Identity identifying method, system and server based on block chain network | |
EP1278168B1 (en) | Security module for an account management system | |
US20140201084A1 (en) | Apparatus configured to facilitate secure financial transactions | |
US8840019B2 (en) | Mobile device financial transactions | |
CN104081425B (en) | Payment system based on eCheck | |
CN109685648A (en) | Processing method, processing system and the supply chain financial platform of digital certificate | |
US20140089198A1 (en) | Method and System to Verify the Identity of a User | |
US20100223188A1 (en) | Online Payment System and Method | |
US20120290484A1 (en) | Method and System for Sending Surveys and Receipts Electronically to Customers Purchasing with Credit Cards | |
AU2003228574A1 (en) | Mobile account authentication service | |
HUE029807T2 (en) | Systems and methods for conducting secure payment transactions using a formatted data structure | |
CN105989466A (en) | Method of payment with mobile phone | |
CN108416400A (en) | A kind of method of payment and payment system based on dynamic two-dimension code | |
CN111091430A (en) | Billing two-dimensional code processing method and system | |
CN1619560A (en) | Card data business system used for payment on net and its method | |
CN109447779A (en) | One kind submitting an expense account system based on electronic invoice cloud service | |
CN109388384A (en) | A kind of data exchange system | |
Adam et al. | Backend server system design based on rest api for cashless payment system on retail community | |
CN109978683B (en) | Supply chain management method, system, storage medium and electronic device | |
WO2020154576A1 (en) | Cryptographic transactions supporting real world requirements | |
CN110956461B (en) | Method and system for hosting electronic signature and verification | |
CN110084679A (en) | Lawyer's letter's intelligence sending method and system | |
CN116051220A (en) | Digital invoice receiving platform and receiving method based on blockchain | |
TWM569016U (en) | Debit authorization system | |
CN109447623A (en) | One kind being based on two dimensional code safety of payment authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190226 |
|
RJ01 | Rejection of invention patent application after publication |