CN109388384A - A kind of data exchange system - Google Patents

A kind of data exchange system Download PDF

Info

Publication number
CN109388384A
CN109388384A CN201810947073.XA CN201810947073A CN109388384A CN 109388384 A CN109388384 A CN 109388384A CN 201810947073 A CN201810947073 A CN 201810947073A CN 109388384 A CN109388384 A CN 109388384A
Authority
CN
China
Prior art keywords
data
module
message
service
filling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810947073.XA
Other languages
Chinese (zh)
Inventor
张磊
李首峰
孙立宏
陈放
李莉莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guo Zheng Tong Technology Co Ltd
Original Assignee
Guo Zheng Tong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guo Zheng Tong Technology Co Ltd filed Critical Guo Zheng Tong Technology Co Ltd
Priority to CN201810947073.XA priority Critical patent/CN109388384A/en
Publication of CN109388384A publication Critical patent/CN109388384A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • G06F8/24Object-oriented

Abstract

The invention discloses a kind of data exchange systems, comprising: foreground package module is often serviced with business packed for system foreground, interface;Backstage package module, for business packed service required for system background;Messaging service interface module, the transmission service for letter, mail in providing short message, standing;Service inquiry module is used for inquiry business type and content;Data inquiry module, for inquiring data type and content;Entity object module provides encapsulation of data for service inquiry module and data inquiry module.Data interchange platform of the invention, data resource is abundant, selects high-quality data;One-stop intervention;It actively sells, cashability is strong.

Description

A kind of data exchange system
Technical field
The invention belongs to data service technology fields, and in particular to a kind of data exchange system.
Background technique
Many mega projects need to complete the convergence to multiparty datas such as public security, traffic, education, insurance, credits at present, real In existing data set and data sharing, and it is higher to real-time accuracy requirement.
Existing majority data interchange platform, constructs data interchange platform using frame+plug-in unit framework, frame is with data Switching engine is core, plug-in unit, that is, data exchange middleware, and frame has handled the major part of the high speeds data exchanges such as concurrent, caching Technical problem, and provide simple interface and interacted with plug-in unit, data exchange middleware stores the data after conversion to isomery In system, the high speed exchange between enterprise's isomeric data is realized;Or propose that a kind of includes several data exchange clients, one The data interchange platform of a intermediate store and an intermediate processor, data exchange client and intermediate processor, centre are deposited Reservoir connection;Data exchange client's end memory contains data file to be exchanged, realizes different terminals by intermediate store Between data exchange.But above scheme has a single function, and versatility and flexibility are poor, and the portion of techniques used is out-of-date.
The shortcomings that traditional data service platform is: data resource is few, and high-quality data are rare;Access process is complicated;Quilt Dynamic sale services difficult cash.
Summary of the invention
In order to solve the above problem, the present invention provides a kind of data exchange systems, are docked by big data distribution platform more The abundant data of dimension guarantees safety and the access efficiency of data, provides data output and the best channel flowed into for enterprise; And help the provider of data to carry out data with party in request and dock, it constructs with data opening, data sharing, data analysis as core The aggregate data open platform of the heart.
According to an aspect of the invention, there is provided a kind of data exchange system, comprising:
Foreground package module is often serviced with business packed for system foreground, interface;
Backstage package module, for business packed service required for system background;
Messaging service interface module, the transmission service for letter, mail in providing short message, standing;
Service inquiry module is used for inquiry business type and content;
Data inquiry module, for inquiring data type and content;
Entity object module provides encapsulation of data for service inquiry module and data inquiry module.
Preferably, there is the circulation of data between the entity object module and data inquiry module, service inquiry module.
Preferably, the transmission mode of the data is divided into two kinds of transmission modes of http and/or https.
Preferably, the data be encryption data, using to Encryption Algorithm include: secure hash algorithm, MD5 algorithm.
Preferably, the secure hash algorithm includes the following steps: for handling message data
(1) extra order is filled, filling message makes its length ≡ 896;
(2) additional length adds 128 blocks after message after filling, signless integer is regarded as, before it includes The length of message;
(3) buffer area Hash is initialized, Hash function intermediate result and final result are stored in 512 buffer areas, delay Rush area is indicated by 8 64 registers, and the integer for being 64 by these initialization of register;
(4) processed in units message is grouped into 1024 and export result.
Preferably, the mode that each content of registers obtains is: taking preceding 8 prime numbers to make even root, takes fractional part First 64.
Preferably, the MD5 is used for processing information data, includes the following steps:
(1) it fills, information is filled first, its bit length is made to be equal to 448 to the result of 512 complementations;
(2) initializing variable, 128 initial place values are four preliminary examination link variables, these parameters are used for the fortune of the first round It calculates, is indicated with big end syllable sequence;
(3) packet data is handled, the algorithm flow of each grouping is as follows:
First grouping copies to aforementioned four link variable in four additional variable, and the variable since second packet is The operation result of a upper grouping;
Major cycle has a four-wheel, and the first round carries out 16 operations, and operation is to wherein three in above-mentioned four additional variable every time Then acquired results are added the 4th variable by the nonlinear function operation of a work, a subgroup of text and one are often Number;By acquired results, ring moves an indefinite number to the left again, and plus one of above-mentioned four additional variable, finally with the result Replace one of above-mentioned four additional variable.
(4) it exports, last output is the cascade of above-mentioned four additional variable.
Preferably, the method for the filling is as follows:
1) one 1 and numerous 0 is filled behind information, just stops 0 pair of information when meeting condition above Filling;
2) message length before adding one behind this result with the filling of 64 binary representations, if binary form Message length is more than 64 before the filling shown, then takes low 64.
Preferably, the system also includes:
Configuration management module, for managing every configuration parameter of the system;
Common tools module completes the calling between modules for providing various common tools for system;
Message managing module, for managing the message of the internal system and external transmitting.
Preferably, the system also includes:
Username and password is arranged for logging in the system in login module;
Foreground Website Module accesses external service for externally showing the function of whole system;
Back bench web module, the interactive function for internal running background system.
The present invention has the advantages that data exchange system of the invention, data resource is abundant, selects high-quality data;One station Formula intervention;It actively sells, cashability is strong.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of data exchange system structure chart of the invention;
Fig. 2 shows a kind of principle assumption diagrams of the foreground Website Module of data exchange system of the invention;
Fig. 3 shows data exchange system functional structure chart of the invention;
Fig. 4 shows data exchange system technical effect schematic diagram of the invention.
Fig. 5 shows the process of purchase figure of the client of embodiment according to the present invention 1.
Specific embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in attached drawing The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here The mode of applying is limited.It is to be able to thoroughly understand the disclosure on the contrary, providing these embodiments, and can be by this public affairs The range opened is fully disclosed to those skilled in the art.
The present invention docks the abundant data of various dimensions by big data distribution platform, guarantees that the safety of data and access are imitated Rate provides data output and the best channel flowed into for enterprise;And help the provider of data to carry out data with party in request and dock, Construct the aggregate data open platform with data opening, data sharing, data analysis for core.
As shown in Figure 1, data exchange system of the invention, comprising:
Foreground package module is often serviced with business packed for system foreground, interface;
Backstage package module, for business packed service required for system background;
Messaging service interface module, the transmission service for letter, mail in providing short message, standing;
Service inquiry module is used for inquiry business type and content;
Data inquiry module, for inquiring data type and content;
Entity object (bean) module, provides encapsulation of data for service inquiry module and data inquiry module.
There are the circulation of data, data transmission between the entity object module and data inquiry module, service inquiry module Mode is divided into http and two kinds of transmission modes of https, and the data of transmission are encryption data, and the Encryption Algorithm used includes but not It is limited to: secure hash algorithm, MD5 algorithm.
Secure hash algorithm (English: Secure Hash Algorithm is abbreviated as SHA) is a Cryptographic Hash Function Family is the secure hash algorithm that FIPS is authenticated.It can calculate and arrive corresponding to a digital massage, the fixed character of length The algorithm of string (also known as eap-message digest).And if the message difference of input, the probability that they correspond to kinds of characters string are very high.
SHA algorithm process message data used in the present invention, includes the following steps:
Step 1: filling extra order
Filling message makes its length ≡ 896 (mod 1024).Filling is made of one 1 and subsequent 0.
Step 2: additional length
The block that 128 are added after message after filling, is regarded as signless integer, it includes the length of preceding message.
First two steps the result is that produce a length be 1024 integral multiples message, to be grouped.
Step 3: the initialization buffer area Hash
Hash function intermediate result and final result are stored in 512 buffer areas, and buffer area is by 8 64 registers (a, b, c, d, e, f, g, h) is indicated, and is following 64 integers (hexadecimal) by these initialization of register.
The mode that each content of registers obtains is: preceding 8 prime numbers (2,3,5,7,11,13,17,19) root of making even is taken, Take first 64 of fractional part.
Step 4: being unit processing message with 1024 groupings (128 bytes) and export result.
Message Digest Algorithm MD5 (the entitled Message Digest Algorithm 5 of Chinese) is computer security The widely used a kind of hash function in field, to provide the integrity protection of message.The document number of the algorithm is RFC 1321 (R.Rivest,MIT Laboratory for Computer Science and RSA Data Security Inc.April 1992).
The full name of MD5 is Message-Digest Algorithm 5 (md5-challenge), in the early 1990s by MIT The Ronald L.Rivest of Laboratory for Computer Science and RSA Data Security Inc is developed Come, is developed through MD2, MD3 and MD4.
MD5 is for ensuring that information transmission is complete consistent.Be one of widely used hash algorithm of computer (and translate abstract calculate Method, hash algorithm), mainstream programming language generally has MD5 and realizes.It is another fixed-length value by data (such as Chinese character) operation, It is the basic principle of hash algorithm, there are MD2, MD3 and MD4 in the predecessor of MD5.
The effect of MD5 is that large capacity information is allowed to be ' compressed ' into a kind of guarantor before signing private key with digital signature software Close format (being exactly the hexadecimal number word string for the byte serial of a random length being transformed into a fixed length).
The narration brief to MD5 algorithm can be with are as follows: MD5 handles the information of input with 512 groupings, and each grouping is again 16 32 seats groupings are divided into, after have passed through a series of processing, the output of algorithm is formed by four 32, by this 128 hashed values will be generated after four 32 packet concatenations.
In MD5 algorithm of the invention, it is necessary first to be filled to information, be equal to its bit length to the result of 512 complementations 448.Therefore, the bit length (Bits Length) of information will be scaled up to N*512+448, and N is a nonnegative integer, and N can be Zero.The method of filling is as follows, and one 1 and numerous 0 is filled behind information, just stops using when meeting condition above The filling of 0 pair of information.Then, message length before adding one behind this result with the filling of 64 binary representations.Through The processing of this two step is crossed, bit length=N*512+448+64=(N+1) * 512 of information, i.e. length are precisely 512 integral multiple.This The reason of sample is done is to meet the requirement in later process to message length.
The MD5 algorithm that the present invention uses has the following characteristics that
1, compressibility: the MD5 value length of the data of random length, calculating is fixed.
2, it is easy to calculate: calculating MD5 value from former data and be easy to.
3, anti-modification: making any change to former data, even only modifying 1 byte, obtained MD5 value has very Big difference.
4, strong impact resistant: known original data and its MD5 value are wanted to find data (the i.e. forgery number with identical MD5 value According to) it is very difficult.
The process of MD5 algorithm used in the present invention is as follows:
1. filling
In MD5 algorithm, it is necessary first to information is filled, makes its bit length to the result of 512 complementations equal to 448, and And filling must carry out, even if its bit length is equal to 448 to the result of 512 complementations.Therefore, the bit length (Bits Length) of information It will be scaled up to N*512+448, N is a nonnegative integer, and N can be zero.
The method of filling is as follows:
1) one 1 and numerous 0 is filled behind information, just stops 0 pair of information when meeting condition above Filling.
2) message length (unit Bit) before adding one behind this result with the filling of 64 binary representations, If message length is more than 64 before the filling of binary representation, low 64 are taken.
By the processing of this two step, bit length=N*512+448+64=(N+1) * 512 of information, i.e. length is precisely 512 Integral multiple.Reason for this is that meet the requirement in later process to message length.
2. initializing variable
128 initial place values are preliminary examination link variable, these parameters are used for the operation of the first round, carry out table with big end syllable sequence Show, they are respectively as follows: A=0x01234567, B=0x89ABCDEF, C=0xFEDCBA98, D=0x76543210.
(numerical value that each variable provides is that high byte is stored in memory low address, and low byte is stored in memory high address, i.e., greatly Hold syllable sequence.Variables A, the value of B, C, D are respectively 0x67452301,0xEFCDAB89,0x98BADCFE in a program, 0x10325476)。
3. handling packet data
The algorithm flow of each grouping is as follows:
First grouping needs to copy to four link variables above in four additional variable: A to a, B to b, C to c, D are arrived d.Variable since second packet is the operation result of a upper grouping, i.e. A=a, B=b, C=c, D=d.
Major cycle has four-wheel (MD4 only has three-wheel), and every wheel circulation is all much like.The first round carries out 16 operations.Behaviour every time Make to the wherein nonlinear function operation of three works in a, b, c and d, acquired results are then added into the 4th variable, text This subgroup and a constant.By acquired results, ring moves an indefinite number to the left again, and plus it in a, b, c or d One.Finally replace one of a, b, c or d with the result.
It is four nonlinear functions (every one, wheel) used in each operation below.
F (X, Y, Z)=(X&Y) | ((~X) &Z)
G (X, Y, Z)=(X&Z) | (Y& (~Z))
H (X, Y, Z)=X^Y^Z
I (X, Y, Z)=Y^ (X | (~Z))
(& be with (And), | be or (Or) ,~right and wrong (Not), ^ be exclusive or (Xor))
The explanation of this four functions: if the correspondence position of X, Y and Z be it is independent and uniform, result each It should be independent and uniform.
F is the function of a bitwise operation.That is, if X, Y, otherwise Z.Function H is odd even operator by turn.
Assuming that Mj indicates j-th of subgroup (from 0 to 15) of message, constant ti is 4294967296*abs (sin (i)) Integer part, for i value from 1 to 64, unit is radian.(4294967296=232)
Now define:
FF (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+F (b, c, d)+Mj+ti) < < s)
GG (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+G (b, c, d)+Mj+ti) < < s)
HH (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+H (b, c, d)+Mj+ti) < < s)
II (a, b, c, d, Mj, s, ti) operation is a=b+ ((a+I (b, c, d)+Mj+ti) < < s)
Note: " < < " indicate ring shift left position, do not shift left.
This four-wheel (totally 64 step) is:
The first round
FF(a,b,c,d,M0,7,0xd76aa478)
FF(d,a,b,c,M1,12,0xe8c7b756)
FF(c,d,a,b,M2,17,0x242070db)
FF(b,c,d,a,M3,22,0xc1bdceee)
FF(a,b,c,d,M4,7,0xf57c0faf)
FF(d,a,b,c,M5,12,0x4787c62a)
FF(c,d,a,b,M6,17,0xa8304613)
FF(b,c,d,a,M7,22,0xfd469501)
FF(a,b,c,d,M8,7,0x698098d8)
FF(d,a,b,c,M9,12,0x8b44f7af)
FF(c,d,a,b,M10,17,0xffff5bb1)
FF(b,c,d,a,M11,22,0x895cd7be)
FF(a,b,c,d,M12,7,0x6b901122)
FF(d,a,b,c,M13,12,0xfd987193)
FF(c,d,a,b,M14,17,0xa679438e)
FF(b,c,d,a,M15,22,0x49b40821)
Second wheel
GG(a,b,c,d,M1,5,0xf61e2562)
GG(d,a,b,c,M6,9,0xc040b340)
GG(c,d,a,b,M11,14,0x265e5a51)
GG(b,c,d,a,M0,20,0xe9b6c7aa)
GG(a,b,c,d,M5,5,0xd62f105d)
GG(d,a,b,c,M10,9,0x02441453)
GG(c,d,a,b,M15,14,0xd8a1e681)
GG(b,c,d,a,M4,20,0xe7d3fbc8)
GG(a,b,c,d,M9,5,0x21e1cde6)
GG(d,a,b,c,M14,9,0xc33707d6)
GG(c,d,a,b,M3,14,0xf4d50d87)
GG(b,c,d,a,M8,20,0x455a14ed)
GG(a,b,c,d,M13,5,0xa9e3e905)
GG(d,a,b,c,M2,9,0xfcefa3f8)
GG(c,d,a,b,M7,14,0x676f02d9)
GG(b,c,d,a,M12,20,0x8d2a4c8a)
Third round
HH(a,b,c,d,M5,4,0xfffa3942)
HH(d,a,b,c,M8,11,0x8771f681)
HH(c,d,a,b,M11,16,0x6d9d6122)
HH(b,c,d,a,M14,23,0xfde5380c)
HH(a,b,c,d,M1,4,0xa4beea44)
HH(d,a,b,c,M4,11,0x4bdecfa9)
HH(c,d,a,b,M7,16,0xf6bb4b60)
HH(b,c,d,a,M10,23,0xbebfbc70)
HH(a,b,c,d,M13,4,0x289b7ec6)
HH(d,a,b,c,M0,11,0xeaa127fa)
HH(c,d,a,b,M3,16,0xd4ef3085)
HH(b,c,d,a,M6,23,0x04881d05)
HH(a,b,c,d,M9,4,0xd9d4d039)
HH(d,a,b,c,M12,11,0xe6db99e5)
HH(c,d,a,b,M15,16,0x1fa27cf8)
HH(b,c,d,a,M2,23,0xc4ac5665)
Fourth round
II(a,b,c,d,M0,6,0xf4292244)
II(d,a,b,c,M7,10,0x432aff97)
II(c,d,a,b,M14,15,0xab9423a7)
II(b,c,d,a,M5,21,0xfc93a039)
II(a,b,c,d,M12,6,0x655b59c3)
II(d,a,b,c,M3,10,0x8f0ccc92)
II(c,d,a,b,M10,15,0xffeff47d)
II(b,c,d,a,M1,21,0x85845dd1)
II(a,b,c,d,M8,6,0x6fa87e4f)
II(d,a,b,c,M15,10,0xfe2ce6e0)
II(c,d,a,b,M6,15,0xa3014314)
II(b,c,d,a,M13,21,0x4e0811a1)
II(a,b,c,d,M4,6,0xf7537e82)
II(d,a,b,c,M11,10,0xbd3af235)
II(c,d,a,b,M2,15,0x2ad7d2bb)
II(b,c,d,a,M9,21,0xeb86d391)
After all these completions, a, b, c, d are added into A, B, C, D on the basis of original respectively.
That is a=a+A, b=b+B, c=c+C, d=d+D
Then algorithm above is continued to run with next packet data.
4. output
Last output is the cascade of a, b, c and d.
After realizing MD5 algorithm according to method described above, the journey that you can be worked it out with following information Sequence makees a simple test, looks at program either with or without mistake.
MD5 (" ")=d41d8cd98f00b204e9800998ecf8427e
MD5 (" a ")=0cc175b9c0f1b6a831c399e269772661
MD5 (" abc ")=900150983cd24fb0d6963f7d28e17f72
MD5 (" message digest ")=f96b697d7cb7938d525a2f31aaf161d0
MD5 (" abcdefghijklmnopqrstuvwxyz ")=c3fcd3d76192e4007dfb496cca67e13b
MD5 (" ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz ")=f29939a 25efabaef3b87e2cbfe641315
MD5 (" 8a683566bcc7801226b3d8b0cf35fd97 ")=cf2cb5c89c5e5eeebef4a76becd dfcfd
Now by taking character string " jklmn " as an example.
The character string indicates in memory are as follows: 6A 6B 6C 6D 6E (being from left to right low address to high address, rear same), Message length is 40bits, i.e. 0x28.
It is filled, is filled to 448, i.e. 56 bytes.As a result are as follows:
6A 6B 6C 6D 6E 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
64 remaining, i.e. information bit length before 8 padding bytes are filled fills remaining 8 byte by little-endian, as a result Are as follows:
6A 6B 6C 6D 6E 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 00 00 00 00 00 00 00
(64 bytes, 512bits)
Initialize tetra- variables of A, B, C, D.
Data after this 64 padding bytes are divided into 16 groups (16 arrays are corresponded in program), it may be assumed that
(this is the sequence in memory to M0:6A 6B 6C 6D, and the value according to little-endian principle, corresponding array M (0) is 0x6D6C6B6A, similarly hereinafter)
M1:6E 80 00 00
M2:00 00 00 00
.....
M14:28 00 00 00
M15:00 00 00 00
After " 3. packet data processes ", a, b, c, d value be respectively 0xD8523F60,0x837E0144, 0x517726CA、0x1BB6E5FE
It is in memory 52 D8 of a:60 3F
01 7E 83 of b:44
C:CA 26 77 51
D:FE E5B6 1B
A, b, c, d are final result by memory Sequential output: 603F52D844017E83CA267751FEE5B61B.This It is exactly the MD5 value of character string " jklmn ".
It is the nucleus module of the data exchange system above, is to complete the present invention to have and most important function It can module.
In order to improve the present invention, the invention also includes:
Configuration management module, for managing every configuration parameter of the system.
Common tools module completes the calling between modules for providing various common tools for system.
Message managing module, for managing the message of the internal system and external transmitting.
Username and password is arranged for logging in the system in login module.
Foreground Website Module accesses external service for externally showing the function of whole system.
Back bench web module, the interactive function for internal running background system.
An example using present system is described below.
Embodiment 1
In the present embodiment, data exchange system is specially big data distribution platform.Wherein, client refers to through big data point Send out enterprise or the individual of platform purchase data.Supplier refers to the affiliate of big data distribution platform, the offer of data channel Side.
Registration
Platform is registered using the mode that mobile phone is verified;The information that client need to fill in includes: phone number, mobile phone verifying Code, mailbox, login password.
After granted service agreement can successful registration platform account, after registration system will guide client carry out authentication, It may be selected to authenticate later.
The account of unverified identity can not carry out data purchase.
It logs in
Platform is logged in using cell-phone number and password, is forgotten Password to verify by mobile phone and be given for change.
Authentication
Account authentication is divided into personal identification and enterprise identity certification, and corresponding different types of certification need to fill in not Same authentication information after information is submitted, needs to wait for audit by that could authenticate successfully.
Personal authentication need to submit information:
Business contact's Real Name, business contact's ID card No., business contact's cell-phone number, business contact's postal Case, affiliated industry.
Corporate authentication need to submit information:
Enterprise contacts Real Name, enterprise contacts cell-phone number, enterprise contacts mailbox, Business Name, affiliated industry, Business license location, legal person, status of a legal person card number, three card unification (business licenses number/unification social credibility code/registration Number), business license validity period, business license attachment photo, company to public account, the name that opens a bank account, to public account bank of deposit.
Supplier enters
Platform supports supplier's application to enter information submission, and supplier needs first register platforms account, under logging state, point Homepage [I is supplier] entrance is hit, information solicitation is carried out, after information is submitted, commercial affairs will be linked up under the information wire according to submission and be supplied Answer quotient.
The information that supplier need to submit includes:
Enterprise contacts information:Corporate business contact person Real Name, corporate business contact person cell-phone number, corporate business connection It is people's mailbox;
Company's information:Business Name, affiliated industry, business license location, three card unification (business licenses number/unification society Can credit code/number of registration), business license validity period, business license electronic edition, company location, telephone number, legal person, method People's identification card number, registered capital, business scope.
Company's bank account information:Company opens a bank account name, company's Bank Account Number, bank of deposit location, bank of deposit's branch Row connection line number, subbranch, bank of deposit title.
Data classification
Support is classified according to the function type of data, and multiclass classification is supported in classification.
Data details are shown
The details of details displayed page display data carry out checking purchase for client.
The information of displaying includes:
√ picture
√ title
√ brief introduction: the breviary introduction of the data
√ price
√ buys specification
√ is discussed in detail
√ access process
√ mistake reference code.
Client's process of purchase figure
As shown in figure 5, being the process of purchase figure of client.Firstly, client's logon data platform, then selection needs to access Data, application access;Specification (number) is selected after client's access, it is pre-paid or monthly billing that reselection, which settles accounts type,.Work as visitor It when family selects pre-paid, is paid, until payment completion, and then is called according to interface document immediately.When client selects It when monthly billing, it is first determined whether being credit accounts, is if it is called, is otherwise supplemented with money as credit according to interface document Account.
Price
The price in channel is divided to two kinds: standard price and signing valence (wholesale price).
The price of front end, which is shown, only shows standard price.It is used if the practical calling channel charging such as configured signing valence in the channel Signing valence charging.
Clearing
Platform clearing form is divided into two class of pre-payment and post-paid (monthly billing).
Pre-payment: it when portal application accesses channel, directly buys number and pays;It deducts fees when channel is called successfully, Until payment amount is run out of.
Monthly billing: first consuming, and settles accounts by the unit the end of month of the moon, and client, which need to become credit customer, just can be carried out monthly billing, the moon Clearing have protection ratio, and when the account arrearage amount of money of deducting fees of client reaches protection ratio, then channel is closed, and need to close arrearage It could normal call channel.
Payment
The means of payment is supported to pay using account balance payment or Third-party payment mode.
Individual center
Individual center include: essential information, I account, I data, my order.
Essential information
Account information
Account information includes:
√ account name: cell-phone number can not be changed;
√ email address: it can change;
Authentication
Certification includes: personal authentication, corporate authentication.
The account for not carrying out authentication can not carry out application access channel.
Password is modified/is given for change
Under the premise of known original code, modified by verifying original code;
Under the premise of forgetting original code, modified by mobile phone identifying code.
My account
The column can carry out account charging and account revenue and expenditure record is checked.
Customer account is divided into different types of account, and the amount of money in different type account is different using limitation.Customer account Type is divided into: test account, Free Account, account of deducting fees, margin account.
Test account: the amount of money in account is only used for the use of client's test experience, will be cleared when formally using.
Free Account: being platform rebating to the amount of money of client, and the amount of money given cannot be in this month use, use in secondary month The amount of money is not counted in rebating scheme, is preferentially deducted when deducting fees and is given the amount of money, and giving after the amount of money deducts cannot retract.
It deducts fees account: the amount of money normally supplemented with money for client, for use of formally deducting fees.
Margin account: client is the amount of money supplemented with money as credit accounts, it is impossible to be used in charging, before not supporting client Platform operation is withdrawn deposit.
Platform will show the remaining sum of every kind of Account Type.
It supplements with money
Client is only capable of to deducting fees account and margin account is supplemented with money;
The means of payment is Third-party payment.
Supplement record with money
The business revenue and expenditure artificial situation of record support account, business include supplement with money, deduct fees, reimbursement, rebating.
List display field includes business odd numbers, affiliated Account Type, business, the amount of money, time.
Support screening inquiry and export excel.
My data
The plate shows that client applies for the data of access.
The pay status of request slip:
Be turned off: advance payment is not paid after client's submission application or monthly billing, user actively cancel an order;
In reimbursement: after advances from customers is paid successfully, request reimbursement, reimbursement wait in;
It is refunded: to have carried out reimbursement;
Do not pay: client does not pay after submitting application, and clearing form may be selected, and supports management on backstage for client Payment;
Paid: advances from customers is paid successfully;
In clearing: the state of monthly billing does not start to call channel or toward being settled the moon, this month is being called, for this State;
Do not settle accounts: the state of monthly billing, this month, are not called channel, and toward the moon, there are the states of debt;Support management Member is on backstage for customer statement.
Settled accounts: the state of monthly billing, this month, are not called channel, are settled toward moon debt.The label root of list According to data access state be divided into total data, it is to be accessed, accessed, be turned off;The field of data request slip list display includes:
√ application numbers
The √ application time
√ data type
√APPkey
√ settles accounts type
√ residue degree: only advance payment shows residue degree;
√ call number (success)
√ call number (failure)
√ operation: corresponding different access states have different operation.
In access
Pay status in access has: in not paying, paid, settling accounts;This state is the number that client is accessing purchase According to;
[in access-do not pay] can operate:
√ closes application: closing the access application.
√ payment
[in access-paid] [in access-in settling accounts] can operate:
√ interface: access process and interface document can be checked;
√ early warning: setting call number residue degree threshold value sends short message prompt to early warning cell-phone number.
It has accessed
The pay status accessed has: having paid, does not settle accounts, has settled accounts;This state is the number that client has accessed purchase According to, and calling;
[accessed-paid] can operate:
√ interface: access process and interface document can be checked;
√ detail: the detail record of every calling order can be checked;
Including calling order number, call request time, concluded price (member/time), pay status, channel discount, order shape State (success, failure);
√ statistics: for the success in this application unitary call channel and frequency of failure statistics, readjustment delay statistics.
√ early warning: setting call number residue degree threshold value and channel disabling notice send short message to early warning cell-phone number and mention Show.
[access-do not settle accounts] [access-settled accounts] can operate:
√ interface: access process and interface document can be checked;
√ detail: the detail record of every calling order can be checked;
Including calling order number, call request time, concluded price (member/time), pay status, channel discount, order shape State (success, failure);
√ statistics: for the success in this application unitary call channel and frequency of failure statistics, readjustment delay statistics.
√ early warning: setting call number residue degree threshold value and channel disabling notice send short message to early warning cell-phone number and mention Show.
√ clearing: checking monthly billing bill and carries out payment and settlement, bill include: the time, transfer successfully at this time, consumption it is golden Volume, the rebating amount of money, the deduction and exemption amount of money, the amount of money of actually deducting fees, the arrearage amount of money.
It is turned off
The pay status being turned off is refunded and is turned off;It is operable as:
√ is bought again
√ is deleted: deleting display record
Data sheet
Data sheet will call situation with line chart and table display data.
Line chart supports per diem/month section to inquire data call number situation.
Table supports per diem/month section inquiry channel to call total, successfully number, unsuccessfully number, success rate, average delay (second).
Fig. 3 shows data exchange system functional structure chart of the invention;As shown, data management of the invention is realized : data parameters management, data configuration management, data price control, call result management, API number management, interface calling are bright Carefully, cache management;Operation function management realizes: star's management of product, sales promotion management, abstract generation, columns management, association View management, LOGO setting;Foreground/background user management realizes: subscriber information management, aptitude checking management, Role Management, knot Calculate detail management, user supplements detail with money, rights management, managing bill, user's request detail, background user management, freezes/infuses Pin/defrosting management, consistency operation record etc..
Customer center realizes qualification authentication, data source publication, data source control, order management, buys/sell, data system Meter;Realize star's product, in limited time indulgence, data source list, payment purchase in data source center;Help Center include product use, Data source introduction, customized column, customized article etc..
In safe bottom of the invention, including random number verification, product private key, message encryption, transmission encryption, login order Board, signature algorithm, multi-thread interconnection, hardware firewall, professional computer room, strange land calamity be standby, redundancy loan, IP authentication etc..
Fig. 4 shows data exchange system technical effect schematic diagram of the invention.Data exchange system of the invention has Following features: seller directly fixes a price, and platform is not involved in;Demand is issued in time, Rapid matching demand;Affiliate is numerous, data Source is wide;Identity switches at any time, does not set supply and demand threshold;Secrecy membership information is traded safer;Industry is broken one's promise list, Pian Ziyi Net is beaten to the greatest extent;Powerful cashability relies on magnanimity client;Powerful selling group, service are cashed fast.
Operation mode, data source, the data safety situation of data service platform of the invention are as follows:
Operation mode: 1. seller's issuing services;2. number connection platform publication;3. being ordered on line, sold under line;It is received 4. obtaining Benefit.
Data source:
AUTHORITATIVE DATA source data, member have data, internet public data by oneself, and member issues, and platform collects, and government affairs are public It opens.
Data safety:
1. logging in token, product private key, signature algorithm, random number verification, message encryption.
2. transmission encryption, IP authentication, hardware firewall, strange land calamity are standby;
3. multi-thread interconnection, redundancy bandwidth, professional computer room.
The service publication process of data service platform of the invention is as follows:
1, perfect service information, including essential information, interface parameters, service pricing, sample explanation first.
2, security level is defined, includes whether that Token is needed to authenticate, if needs the certification of product private key, whether need to count According to encrypted transmission, whether need random number verification etc..
3, Matching Platform interface, including account issuing service, own interface are docked to platform, interface joint debugging, connectivity survey Examination etc..
4, service publication is completed.
It should be understood that
Algorithm and display be not inherently related to any certain computer, virtual bench or other equipment provided herein. Various fexible units can also be used together with teachings based herein.As described above, it constructs required by this kind of device Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice One in the creating device of microprocessor or digital signal processor (DSP) to realize virtual machine according to an embodiment of the present invention The some or all functions of a little or whole components.The present invention is also implemented as executing method as described herein Some or all device or device programs (for example, computer program and computer program product).Such realization Program of the invention can store on a computer-readable medium, or may be in the form of one or more signals.This The signal of sample can be downloaded from an internet website to obtain, and is perhaps provided on the carrier signal or mentions in any other forms For.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by anyone skilled in the art, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim Subject to enclosing.

Claims (10)

1. a kind of data exchange system characterized by comprising
Foreground package module is often serviced with business packed for system foreground, interface;
Backstage package module, for business packed service required for system background;
Messaging service interface module, the transmission service for letter, mail in providing short message, standing;
Service inquiry module is used for inquiry business type and content;
Data inquiry module, for inquiring data type and content;
Entity object module provides encapsulation of data for service inquiry module and data inquiry module.
2. system according to claim 1, which is characterized in that
There is the circulation of data between the entity object module and data inquiry module, service inquiry module.
3. system according to claim 2, which is characterized in that
The transmission mode of the data is divided into two kinds of transmission modes of http and/or https.
4. system according to claim 2, which is characterized in that
The data be encryption data, using to Encryption Algorithm include: secure hash algorithm, MD5 algorithm.
5. system according to claim 4, which is characterized in that
The secure hash algorithm includes the following steps: for handling message data
(1) extra order is filled, filling message makes its length ≡ 896;
(2) additional length adds 128 blocks after message after filling, is regarded as signless integer, it includes preceding message Length;
(3) buffer area Hash is initialized, Hash function intermediate result and final result are stored in 512 buffer areas, buffer area It is indicated by 8 64 registers, and the integer for being 64 by these initialization of register;
(4) processed in units message is grouped into 1024 and export result.
6. system according to claim 5, which is characterized in that
The mode that each content of registers obtains is: taking preceding 8 prime numbers to make even root, takes first 64 of fractional part.
7. system according to claim 4, which is characterized in that
The MD5 is used for processing information data, includes the following steps:
(1) it fills, information is filled first, its bit length is made to be equal to 448 to the result of 512 complementations;
(2) initializing variable, 128 initial place values are four preliminary examination link variables, these parameters are used for the operation of the first round, with Big end syllable sequence indicates;
(3) packet data is handled, the algorithm flow of each grouping is as follows:
First grouping copies to aforementioned four link variable in four additional variable, and the variable since second packet is upper one The operation result of grouping;
Major cycle has four-wheel, and the first round carries out 16 operations, and operation is to wherein three works in above-mentioned four additional variable every time Then acquired results are added the 4th variable, the subgroup and a constant of text by nonlinear function operation;Again By acquired results, ring moves an indefinite number to the left, and plus one of above-mentioned four additional variable, is finally replaced with the result One of above-mentioned four additional variable.
(4) it exports, last output is the cascade of above-mentioned four additional variable.
8. system according to claim 7, which is characterized in that
The method of the filling is as follows:
1) one 1 and numerous 0 is filled behind information, just stops filling out information with 0 when meeting condition above It fills;
2) message length before adding one behind this result with the filling of 64 binary representations, if binary representation Message length is more than 64 before filling, then takes low 64.
9. system according to any one of claims 1 to 8, which is characterized in that
The system also includes:
Configuration management module, for managing every configuration parameter of the system;
Common tools module completes the calling between modules for providing various common tools for system;
Message managing module, for managing the message of the internal system and external transmitting.
10. system according to any one of claims 1 to 8, which is characterized in that
The system also includes:
Username and password is arranged for logging in the system in login module;
Foreground Website Module accesses external service for externally showing the function of whole system;
Back bench web module, the interactive function for internal running background system.
CN201810947073.XA 2018-08-20 2018-08-20 A kind of data exchange system Pending CN109388384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810947073.XA CN109388384A (en) 2018-08-20 2018-08-20 A kind of data exchange system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810947073.XA CN109388384A (en) 2018-08-20 2018-08-20 A kind of data exchange system

Publications (1)

Publication Number Publication Date
CN109388384A true CN109388384A (en) 2019-02-26

Family

ID=65417679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810947073.XA Pending CN109388384A (en) 2018-08-20 2018-08-20 A kind of data exchange system

Country Status (1)

Country Link
CN (1) CN109388384A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263571A (en) * 2019-05-13 2019-09-20 特斯联(北京)科技有限公司 A kind of personal data guard method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020198798A1 (en) * 2001-04-03 2002-12-26 Bottomline Technologies, Inc. Modular business transactions platform
CN105869023A (en) * 2016-04-11 2016-08-17 广州智慧城市发展研究院 System based on Internet-of-things M2M system and realizing method thereof
CN107742085A (en) * 2017-10-20 2018-02-27 国信嘉宁数据技术有限公司 A kind of data security system
CN108388816A (en) * 2018-01-31 2018-08-10 上海集成电路研发中心有限公司 A kind of method of read write chip identifier through encrypting

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020198798A1 (en) * 2001-04-03 2002-12-26 Bottomline Technologies, Inc. Modular business transactions platform
CN105869023A (en) * 2016-04-11 2016-08-17 广州智慧城市发展研究院 System based on Internet-of-things M2M system and realizing method thereof
CN107742085A (en) * 2017-10-20 2018-02-27 国信嘉宁数据技术有限公司 A kind of data security system
CN108388816A (en) * 2018-01-31 2018-08-10 上海集成电路研发中心有限公司 A kind of method of read write chip identifier through encrypting

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
刘瑞芳: "《程序设计实践》", 31 March 2015 *
王凤英: "《网络与信息安全》", 30 June 2015 *
邹新国: "《计算机信息与网络安全技术》", 31 August 2008 *
韩会雯: "基于JSP的BBS论坛设计与实现", 《电脑编程技巧与维护》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263571A (en) * 2019-05-13 2019-09-20 特斯联(北京)科技有限公司 A kind of personal data guard method and system

Similar Documents

Publication Publication Date Title
CN106357640B (en) Identity identifying method, system and server based on block chain network
EP1278168B1 (en) Security module for an account management system
US20140201084A1 (en) Apparatus configured to facilitate secure financial transactions
US8840019B2 (en) Mobile device financial transactions
CN104081425B (en) Payment system based on eCheck
CN109685648A (en) Processing method, processing system and the supply chain financial platform of digital certificate
US20140089198A1 (en) Method and System to Verify the Identity of a User
US20100223188A1 (en) Online Payment System and Method
US20120290484A1 (en) Method and System for Sending Surveys and Receipts Electronically to Customers Purchasing with Credit Cards
AU2003228574A1 (en) Mobile account authentication service
HUE029807T2 (en) Systems and methods for conducting secure payment transactions using a formatted data structure
CN105989466A (en) Method of payment with mobile phone
CN108416400A (en) A kind of method of payment and payment system based on dynamic two-dimension code
CN111091430A (en) Billing two-dimensional code processing method and system
CN1619560A (en) Card data business system used for payment on net and its method
CN109447779A (en) One kind submitting an expense account system based on electronic invoice cloud service
CN109388384A (en) A kind of data exchange system
Adam et al. Backend server system design based on rest api for cashless payment system on retail community
CN109978683B (en) Supply chain management method, system, storage medium and electronic device
WO2020154576A1 (en) Cryptographic transactions supporting real world requirements
CN110956461B (en) Method and system for hosting electronic signature and verification
CN110084679A (en) Lawyer&#39;s letter&#39;s intelligence sending method and system
CN116051220A (en) Digital invoice receiving platform and receiving method based on blockchain
TWM569016U (en) Debit authorization system
CN109447623A (en) One kind being based on two dimensional code safety of payment authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190226

RJ01 Rejection of invention patent application after publication