CN110691091A - Data acquisition method and device based on identity authentication and computer equipment - Google Patents

Data acquisition method and device based on identity authentication and computer equipment Download PDF

Info

Publication number
CN110691091A
CN110691091A CN201910943383.9A CN201910943383A CN110691091A CN 110691091 A CN110691091 A CN 110691091A CN 201910943383 A CN201910943383 A CN 201910943383A CN 110691091 A CN110691091 A CN 110691091A
Authority
CN
China
Prior art keywords
client
data acquisition
information
data
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910943383.9A
Other languages
Chinese (zh)
Inventor
冼东亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd
Priority to CN201910943383.9A priority Critical patent/CN110691091A/en
Publication of CN110691091A publication Critical patent/CN110691091A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a data acquisition method and device based on identity authentication, computer equipment and a storage medium. Establishing connection with a corresponding client according to the encryption disk monitoring task; if the data acquisition task request is detected, acquiring corresponding client information according to the data acquisition task request; sending uKey encryption disk insertion prompt information to the client according to the client information; if the digital certificate corresponding to the uKey encryption disk insertion prompt information is detected, logging in a target website corresponding to a target address according to the digital certificate and the target address included in the data acquisition task request; and correspondingly acquiring webpage data at the target website according to the data acquisition request, and obtaining and storing an acquisition result. The embodiment of the invention realizes that the acquisition server acquires the digital certificate obtained by the client after the UKey encryption disk is inserted by sending the encryption disk monitoring task to the client, thereby accessing the target server to acquire data according to the digital certificate.

Description

Data acquisition method and device based on identity authentication and computer equipment
Technical Field
The invention relates to the technical field of data acquisition, in particular to a data acquisition method and device based on identity authentication, computer equipment and a storage medium.
Background
At present, a data acquisition method generally acquires data of a target server through an acquisition program of an acquisition server, but aiming at certain user authorization data with higher security check level, the acquisition server cannot directly perform website login through a user authorization account, local login can be performed only by inserting a user encryption disc to acquire request information, and the user encryption disc is generally not provided for a third party to use, so that acquisition of the user authorization information is severely limited.
Disclosure of Invention
The embodiment of the invention provides a data acquisition method and device based on identity authentication, computer equipment and a storage medium, and aims to solve the problem that in the prior art, aiming at user authorization data with high security check level, an acquisition server cannot directly perform website login through a user authorization account to acquire data.
In a first aspect, an embodiment of the present invention provides a data acquisition method based on identity authentication, including:
establishing connection with a corresponding client according to the encryption disk monitoring task;
if a data acquisition task request is detected, acquiring corresponding client information according to the data acquisition task request;
sending uKey encryption disk insertion prompt information to the client according to the client information;
if a digital certificate corresponding to the insertion prompt information of the UKey encryption disk is detected, logging in a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request; and
and correspondingly acquiring webpage data at the target website according to the data acquisition task request, and obtaining and storing an acquisition result.
In a second aspect, an embodiment of the present invention provides an identity authentication-based data acquisition apparatus, including:
the connection establishing unit is used for establishing connection with the corresponding client according to the encryption disc monitoring task;
the request detection unit is used for acquiring corresponding client information according to the data acquisition task request if the data acquisition task request is detected;
the disk insertion prompting unit is used for sending uKey encryption disk insertion prompting information to the client according to the client information;
the target website login unit is used for logging in a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request if the digital certificate corresponding to the uKey encryption disk insertion prompt information is detected; and
and the data acquisition and storage unit is used for correspondingly acquiring webpage data at the target website according to the data acquisition task request to obtain and store an acquisition result.
In a third aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor, when executing the computer program, implements the data collection method based on identity authentication according to the first aspect.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute the method for data collection based on identity authentication according to the first aspect.
The embodiment of the invention provides a data acquisition method, a device, computer equipment and a storage medium based on identity authentication, wherein the method comprises the steps of establishing connection with a corresponding client according to an encryption disk monitoring task; if a data acquisition task request is detected, acquiring corresponding client information according to the data acquisition task request; sending uKey encryption disk insertion prompt information to the client according to the client information; if a digital certificate corresponding to the insertion prompt information of the UKey encryption disk is detected, logging in a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request; and correspondingly acquiring webpage data at the target website according to the data acquisition task request to obtain and store an acquisition result. The embodiment of the invention realizes that the acquisition server acquires the digital certificate obtained by the client after the UKey encryption disk is inserted by sending the encryption disk monitoring task to the client, thereby accessing the target server to acquire data according to the digital certificate.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a data acquisition method based on identity authentication according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a data acquisition method based on identity authentication according to an embodiment of the present invention;
fig. 3 is a schematic sub-flow chart of a data acquisition method based on identity authentication according to an embodiment of the present invention;
fig. 4 is a schematic view of another sub-flow of the data collection method based on identity authentication according to the embodiment of the present invention;
FIG. 5 is a schematic block diagram of a data collection apparatus based on identity authentication according to an embodiment of the present invention;
FIG. 6 is a schematic block diagram of a sub-unit of a data acquisition device based on identity authentication according to an embodiment of the present invention;
FIG. 7 is a schematic block diagram of another sub-unit of the data acquisition device based on identity authentication according to the embodiment of the present invention;
FIG. 8 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic view of an application scenario of a data acquisition method based on identity authentication according to an embodiment of the present invention; fig. 2 is a schematic flowchart of a data collection method based on identity authentication according to an embodiment of the present invention, where the data collection method based on identity authentication is applied to a server, and the data collection method is executed by application software installed in the server.
As shown in fig. 2, the method includes steps S110 to S150.
And S110, establishing connection with the corresponding client according to the encrypted disk monitoring task.
In this embodiment, in order to more clearly understand the technical solution of the present application, the following describes the related terminal. The technical scheme is described in the perspective of a server.
The system comprises a collection server, which is abbreviated as a server and is used for issuing an encryption disc monitoring task to a client, and if a data collection task request triggered by the client is detected, data is collected in a target server according to a digital certificate uploaded by the client and a target address included in the data collection task request, and then a collection result is locally stored.
And the client is used for receiving the uKey encryption disk insertion prompt message sent by the server when the encryption disk monitoring task is received, detecting whether the uKey encryption disk is inserted in real time, and uploading the digital certificate in the uKey encryption disk to the server once the uKey encryption disk insertion is detected.
And the target server is used for deploying data corresponding to the target website, and after the data taking task request and the digital certificate sent by the server are received and the digital certificate is successfully verified, the data in the target website can be collected by the collection server.
For example, when the client and the collection server belong to the same enterprise, and when the client has a data collection requirement and the client needs a digital certificate to collect data from the target server, if the client is not convenient to download itself due to being occupied by other requirements, the client can authorize the collection server to help the collection server to collect the data. Therefore, before a data acquisition task request triggered by a client, an encryption disc monitoring task needs to be issued to the client by a server, and when the client agrees to run the encryption disc monitoring task, the client establishes connection with the server, so that the server can acquire a digital certificate in the client in time when in need.
In one embodiment, step S110 includes:
sending the encryption disk monitoring task to the client;
and if receiving successful receiving information which is sent by the client and corresponds to the encryption disc monitoring task, establishing connection with the client.
In this embodiment, after the server sends the encryption disc monitoring task to the client, a prompt (for example, a pop-up prompt) is sent on a user interface of the client, and after the user corresponding to the client agrees to run the encryption disc monitoring task, the client sends a reception success message to the server. If receiving successful receiving information which is sent by the client and corresponds to the encrypted disk monitoring task, the server indicates that connection can be established with the client.
And S120, if the data acquisition task request is detected, acquiring corresponding client information according to the data acquisition task request.
In this embodiment, the client may send a data collection task to the server to trigger the corresponding generation of a data collection task request in the server. The sent data acquisition task at least comprises client information (for example, the client IP address and the like, and the machine unique identification code of the client), a target address, data acquisition task information (the acquisition task information comprises a data acquisition target field and target field division information), and effective time period of the data acquisition task. When the server generates a data acquisition task request according to the data acquisition task, the client information in the data acquisition task can be acquired at the same time.
In an embodiment, step S120 further includes:
judging whether a data acquisition task triggered by a preset timing task or manually triggered at the current moment is detected;
and if a data acquisition task triggered by a preset timing task or manually triggered at the current moment is detected, generating a data acquisition task request according to a target website and a target acquisition field in the data acquisition task.
In this embodiment, the user of the client may trigger uploading of the data acquisition task to the server by setting a timing task, or may trigger uploading of the data acquisition task to the server by receiving a manual operation at the current time.
For example, the user corresponding to the client is a financial staff of an enterprise, the target server is a financial website, and the server is a cloud server. When the financial staff need collect data in the financial website by means of the cloud server, a timing task can be preset through the client or a data collection task can be triggered manually, so that the server is informed to assist the client in collecting data.
S130, sending uKey encryption disk insertion prompt information to the client according to the client information.
In this embodiment, the server needs to acquire the client information in order to accurately know which client triggers the data acquisition task request, so that the uKey encryption disk insertion prompt information can be accurately pushed to the corresponding client.
In one embodiment, as shown in fig. 3, step S130 includes:
s131, acquiring a client IP address in the client information;
s132, generating uKey encryption disk insertion prompt information according to a pre-stored notification information template and the IP address of the client, and sending the uKey encryption disk insertion prompt information to the client corresponding to the client information.
In this embodiment, since the encryption disk monitoring task is deployed in advance in the client, at this time, if the server has already obtained the client information, the upkey encryption disk insertion prompt information may be automatically generated according to the client IP address included in the client information and a notification information template (for example, please insert the upkey encryption disk of the XXX system by the XXX client in time) stored in the server in advance. And then sending the UKey encryption disk insertion prompt information to the client corresponding to the client information so as to realize prompt disk insertion for the client.
S140, if the digital certificate corresponding to the uKey encryption disk insertion prompt information is detected, logging in a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request.
In this embodiment, after the server obtains the digital certificate uploaded by the client (when the server obtains the digital certificate uploaded by the client, the user of the client agrees to authorize the digital certificate uploading operation, and the client can upload the digital certificate corresponding to the uKey encryption disk insertion prompt information), the target website corresponding to the target address can be logged in correspondingly.
In one embodiment, as shown in fig. 4, step S140 includes:
s141, acquiring a public key, a certificate name, a digital signature and a certificate validity period of the digital certificate;
s142, sending the public key, the certificate name, the digital signature and the certificate validity period of the digital certificate to a target address corresponding to the data acquisition task request to verify the certificate validity;
and S143, if the returned verification passing information is received, logging in the target website corresponding to the target address according to the digital certificate.
In this embodiment, before the server obtains the digital certificate uploaded by the client, the method further includes obtaining a stored user authorization account corresponding to the client information, and sending the user authorization account to the client. Namely, the server firstly acquires the user authorized account for use according to the client information, and sends the user authorized account to the client, and the encryption disk monitoring task in the client triggers the acquisition process of acquiring the digital certificate in the UKey encryption disk.
When the server obtains the digital certificate uploaded by the client, the server can obtain the detailed information (including the public key, the certificate name, the digital signature and the certificate validity period) included in the digital certificate according to the locally stored resolver of the server. And then the server sends the detailed information of the digital certificate to a target server for authority verification so as to verify the validity of the certificate. And after the certificate validity of the target server is verified, the target server sends verification passing information (such as that the certificate passes verification) to the server, and the server logs in the target website corresponding to the target address according to the digital certificate, so that the login is successful and the next data acquisition can be carried out.
S150, correspondingly acquiring webpage data at the target website according to the data acquisition task request, and obtaining and storing an acquisition result.
In this embodiment, after the server and the target website successfully establish a connection, the web page data can be correspondingly collected at the target website according to the data collection task request, so as to obtain a collection result. Specifically, a data acquisition tool in the server acquires target data according to configuration parameters (sources of the configuration parameters, namely, data acquisition task requests), so as to obtain an acquisition result.
In an embodiment, after step S150, the method further includes:
and dividing the acquisition result into a plurality of sub data tables according to the target field division information in the data acquisition task request and storing the sub data tables respectively.
In this embodiment, the acquisition result is acquired by the server side according to the data acquisition request, and the data acquisition task request includes a data acquisition target field, target field division information, and a data acquisition task valid time period, at this time, the data acquisition target fields may be effectively grouped according to the target field division information, for example, the data acquisition target fields 1 to 5 are allocated to the sub data table 1 for storage, and the data acquisition target fields 6 to 10 are allocated to the sub data table 2 for storage, so as to implement effective grouping of data in the acquisition result.
After the storage of the acquisition result is completed in the server, the method further comprises the following steps: and sending the acquisition result to a client. Through the process, the acquisition result is timely transmitted back to the user side, so that the data use requirement of the user side is met.
The method realizes that the acquisition server acquires the digital certificate obtained by the client after the UKey encryption disk is inserted by sending the encryption disk monitoring task to the client, thereby accessing the target server to acquire data according to the digital certificate.
The embodiment of the invention also provides a data acquisition device based on identity authentication, which is used for executing any embodiment of the data acquisition method based on identity authentication. Specifically, referring to fig. 5, fig. 5 is a schematic block diagram of a data collection device based on identity authentication according to an embodiment of the present invention. The data collection device 100 based on identity authentication can be configured in a server.
As shown in fig. 5, the data collection device 100 based on identity authentication includes a connection establishment unit 110, a request detection unit 120, a plug-in board prompting unit 130, a target website login unit 140, and a data collection storage unit 150.
And a connection establishing unit 110, configured to establish a connection with a corresponding client according to the encryption disc listening task.
In this embodiment, for example, when the client and the collection server both belong to the same enterprise, and when the client has a data collection requirement and the client needs a digital certificate to collect data from the target server, if the client is not convenient for downloading itself due to being occupied by other requirements, the collection server may be authorized to delegate to collect data. Therefore, before a data acquisition task request triggered by a client, an encryption disc monitoring task needs to be issued to the client by a server, and when the client agrees to run the encryption disc monitoring task, the client establishes connection with the server, so that the server can acquire a digital certificate in the client in time when in need.
In one embodiment, the connection establishing unit 110 includes:
the monitoring task sending unit is used for sending the encryption disk monitoring task to the client;
and the client connecting unit is used for establishing connection with the client if receiving successful receiving information which is sent by the client and corresponds to the encryption disc monitoring task.
In this embodiment, after the server sends the encryption disc monitoring task to the client, a prompt (for example, a pop-up prompt) is sent on a user interface of the client, and after the user corresponding to the client agrees to run the encryption disc monitoring task, the client sends a reception success message to the server. If receiving successful receiving information which is sent by the client and corresponds to the encrypted disk monitoring task, the server indicates that connection can be established with the client.
The request detection unit 120 is configured to, if a data acquisition task request is detected, obtain corresponding client information according to the data acquisition task request.
In this embodiment, the client may send a data collection task to the server to trigger the corresponding generation of a data collection task request in the server. The sent data acquisition task at least comprises client information (for example, the client IP address and the like, and the machine unique identification code of the client), a target address, data acquisition task information (the acquisition task information comprises a data acquisition target field and target field division information), and effective time period of the data acquisition task. When the server generates a data acquisition task request according to the data acquisition task, the client information in the data acquisition task can be acquired at the same time.
In one embodiment, the data collection apparatus 100 based on identity authentication further includes:
the acquisition task detection unit is used for judging whether a data acquisition task triggered by a preset timing task or manually triggered at the current moment is detected;
and the acquisition request generating unit is used for generating a data acquisition task request according to a target website and a target acquisition field in the data acquisition task if the data acquisition task triggered by a preset timing task or manually triggered at the current moment is detected.
In this embodiment, the user of the client may trigger uploading of the data acquisition task to the server by setting a timing task, or may trigger uploading of the data acquisition task to the server by receiving a manual operation at the current time.
For example, the user corresponding to the client is a financial staff of an enterprise, the target server is a financial website, and the server is a cloud server. When the financial staff need collect data in the financial website by means of the cloud server, a timing task can be preset through the client or a data collection task can be triggered manually, so that the server is informed to assist the client in collecting data.
And the disk insertion prompting unit 130 is used for sending uKey encryption disk insertion prompting information to the client according to the client information.
In this embodiment, the server needs to acquire the client information in order to accurately know which client triggers the data acquisition task request, so that the uKey encryption disk insertion prompt information can be accurately pushed to the corresponding client.
In one embodiment, as shown in fig. 6, the disk insertion prompting unit 130 includes:
a client IP address obtaining unit 131, configured to obtain a client IP address in the client information;
and the disk insertion prompt information generating unit 132 is configured to generate uKey-encrypted disk insertion prompt information according to a pre-stored notification information template and a client IP address, and send the uKey-encrypted disk insertion prompt information to a client corresponding to the client information.
In this embodiment, since the encryption disk monitoring task is deployed in advance in the client, at this time, if the server has already obtained the client information, the upkey encryption disk insertion prompt information may be automatically generated according to the client IP address included in the client information and a notification information template (for example, please insert the upkey encryption disk of the XXX system by the XXX client in time) stored in the server in advance. And then sending the UKey encryption disk insertion prompt information to the client corresponding to the client information so as to realize prompt disk insertion for the client.
And a target website login unit 140, configured to, if a digital certificate corresponding to the uKey encryption disk insertion prompt information is detected, login a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request.
In this embodiment, after the server obtains the digital certificate uploaded by the client (when the server obtains the digital certificate uploaded by the client, the user of the client agrees to authorize the digital certificate uploading operation, and the client can upload the digital certificate corresponding to the uKey encryption disk insertion prompt information), the target website corresponding to the target address can be logged in correspondingly.
In one embodiment, as shown in FIG. 7, the target website registering unit 140 includes:
a certificate parsing unit 141, configured to obtain a public key, a certificate name, a digital signature, and a certificate validity period of the digital certificate;
the certificate information sending unit 142 is configured to send the public key, the certificate name, the digital signature, and the certificate validity period of the digital certificate to the target address corresponding to the data acquisition task request, so as to verify the certificate validity;
and the verification passing unit 143 is configured to log in the target website corresponding to the target address according to the digital certificate if the returned verification passing information is received.
In this embodiment, before the server obtains the digital certificate uploaded by the client, the method further includes obtaining a stored user authorization account corresponding to the client information, and sending the user authorization account to the client. Namely, the server firstly acquires the user authorized account for use according to the client information, and sends the user authorized account to the client, and the encryption disk monitoring task in the client triggers the acquisition process of acquiring the digital certificate in the UKey encryption disk.
When the server obtains the digital certificate uploaded by the client, the server can obtain the detailed information (including the public key, the certificate name, the digital signature and the certificate validity period) included in the digital certificate according to the locally stored resolver of the server. And then the server sends the detailed information of the digital certificate to a target server for authority verification so as to verify the validity of the certificate. And after the certificate validity of the target server is verified, the target server sends verification passing information (such as that the certificate passes verification) to the server, and the server logs in the target website corresponding to the target address according to the digital certificate, so that the login is successful and the next data acquisition can be carried out.
And the data acquisition and storage unit 150 is used for correspondingly acquiring webpage data at the target website according to the data acquisition task request, and obtaining and storing an acquisition result.
In this embodiment, after the server and the target website successfully establish a connection, the web page data can be correspondingly collected at the target website according to the data collection task request, so as to obtain a collection result. Specifically, a data acquisition tool in the server acquires target data according to configuration parameters (sources of the configuration parameters, namely, data acquisition task requests), so as to obtain an acquisition result.
In one embodiment, the data collection apparatus 100 based on identity authentication further includes:
and the sub-table storage unit is used for dividing the acquisition result into a plurality of sub-data tables according to the target field division information in the data acquisition task request and storing the sub-data tables respectively.
In this embodiment, the acquisition result is acquired by the server side according to the data acquisition request, and the data acquisition task request includes a data acquisition target field, target field division information, and a data acquisition task valid time period, at this time, the data acquisition target fields may be effectively grouped according to the target field division information, for example, the data acquisition target fields 1 to 5 are allocated to the sub data table 1 for storage, and the data acquisition target fields 6 to 10 are allocated to the sub data table 2 for storage, so as to implement effective grouping of data in the acquisition result.
After the storage of the acquisition result is completed in the server, the method further comprises the following steps: and sending the acquisition result to a client. Through the process, the acquisition result is timely transmitted back to the user side, so that the data use requirement of the user side is met.
The device realizes that the acquisition server acquires the digital certificate obtained by the client after the UKey encryption disk is inserted by sending the encryption disk monitoring task to the client, thereby accessing the target server to acquire data according to the digital certificate.
The data acquisition device based on identity authentication may be implemented in the form of a computer program, which may be run on a computer device as shown in fig. 8.
Referring to fig. 8, fig. 8 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device 500 is a server, and the server may be an independent server or a server cluster composed of a plurality of servers.
Referring to fig. 8, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032, when executed, may cause the processor 502 to perform an authentication-based data collection method.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the operation of the computer program 5032 in the non-volatile storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be enabled to execute the data collection method based on identity authentication.
The network interface 505 is used for network communication, such as providing transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 8 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 500 to which aspects of the present invention may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The processor 502 is configured to run the computer program 5032 stored in the memory to implement the data collection method based on identity authentication disclosed in the embodiment of the present invention.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 8 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 8, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field-Programmable gate arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a non-volatile computer readable storage medium. The computer readable storage medium stores a computer program, wherein the computer program, when executed by the processor, implements the identity authentication-based data collection method disclosed by the embodiments of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only a logical division, and there may be other divisions when the actual implementation is performed, or units having the same function may be grouped into one unit, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A data acquisition method based on identity authentication is characterized by comprising the following steps:
establishing connection with a corresponding client according to the encryption disk monitoring task;
if a data acquisition task request is detected, acquiring corresponding client information according to the data acquisition task request;
sending uKey encryption disk insertion prompt information to the client according to the client information;
if a digital certificate corresponding to the insertion prompt information of the UKey encryption disk is detected, logging in a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request; and
and correspondingly acquiring webpage data at the target website according to the data acquisition task request, and obtaining and storing an acquisition result.
2. The data acquisition method based on identity authentication according to claim 1, wherein the establishing of the connection with the corresponding client according to the encryption disc listening task comprises:
sending the encryption disk monitoring task to the client;
and if receiving successful receiving information which is sent by the client and corresponds to the encryption disc monitoring task, establishing connection with the client.
3. The data collection method based on identity authentication according to claim 1, wherein before the step of acquiring the corresponding client information according to the data collection task request if the data collection task request is detected, the method further comprises:
judging whether a data acquisition task triggered by a preset timing task or manually triggered at the current moment is detected;
and if a data acquisition task triggered by a preset timing task or manually triggered at the current moment is detected, generating a data acquisition task request according to a target website and a target acquisition field in the data acquisition task.
4. The data collection method based on identity authentication according to claim 1, wherein the sending a uKey-encrypted disk insertion prompt message to the client according to the client information comprises:
acquiring a client IP address in the client information;
and generating uKey encryption disk insertion prompt information according to a pre-stored notification information template and the IP address of the client, and sending the uKey encryption disk insertion prompt information to the client corresponding to the client information.
5. The data collection method based on identity authentication according to claim 1, wherein the logging in the target website corresponding to the target address according to the digital certificate and the target address included in the data collection task request comprises:
acquiring a public key, a certificate name, a digital signature and a certificate validity period of the digital certificate;
sending the public key, the certificate name, the digital signature and the certificate validity period of the digital certificate to a target address corresponding to the data acquisition task request so as to verify the certificate validity;
and if the returned verification passing information is received, logging in a target website corresponding to the target address according to the digital certificate.
6. The data collection method based on identity authentication according to claim 5, wherein after the web page data is correspondingly collected at the target website according to the data collection task request, and a collection result is obtained and stored, the method further comprises:
and dividing the acquisition result into a plurality of sub data tables according to the target field division information in the data acquisition task request and storing the sub data tables respectively.
7. A data acquisition device based on identity authentication is characterized by comprising:
the connection establishing unit is used for establishing connection with the corresponding client according to the encryption disc monitoring task;
the request detection unit is used for acquiring corresponding client information according to the data acquisition task request if the data acquisition task request is detected;
the disk insertion prompting unit is used for sending uKey encryption disk insertion prompting information to the client according to the client information;
the target website login unit is used for logging in a target website corresponding to the target address according to the digital certificate and the target address included in the data acquisition task request if the digital certificate corresponding to the uKey encryption disk insertion prompt information is detected; and
and the data acquisition and storage unit is used for correspondingly acquiring webpage data at the target website according to the data acquisition task request to obtain and store an acquisition result.
8. The data acquisition device based on identity authentication according to claim 7, wherein the connection establishing unit comprises:
the monitoring task sending unit is used for sending the encryption disk monitoring task to the client;
and the client connecting unit is used for establishing connection with the client if receiving successful receiving information which is sent by the client and corresponds to the encryption disc monitoring task.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the authentication-based data collection method according to any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to carry out the authentication-based data collection method according to any one of claims 1 to 6.
CN201910943383.9A 2019-09-30 2019-09-30 Data acquisition method and device based on identity authentication and computer equipment Pending CN110691091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910943383.9A CN110691091A (en) 2019-09-30 2019-09-30 Data acquisition method and device based on identity authentication and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910943383.9A CN110691091A (en) 2019-09-30 2019-09-30 Data acquisition method and device based on identity authentication and computer equipment

Publications (1)

Publication Number Publication Date
CN110691091A true CN110691091A (en) 2020-01-14

Family

ID=69111403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910943383.9A Pending CN110691091A (en) 2019-09-30 2019-09-30 Data acquisition method and device based on identity authentication and computer equipment

Country Status (1)

Country Link
CN (1) CN110691091A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434848A (en) * 2021-07-06 2021-09-24 李瑞强 Data acquisition method and device, storage medium and electronic equipment
CN113449944A (en) * 2020-03-27 2021-09-28 中国移动通信集团山东有限公司 Work order processing method and device based on hardware sharing and computer equipment
CN113722095A (en) * 2021-08-18 2021-11-30 江苏电力信息技术有限公司 Data API dynamic configuration method of electric power data transaction platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120030475A1 (en) * 2010-08-02 2012-02-02 Ma Felix Kuo-We Machine-machine authentication method and human-machine authentication method for cloud computing
CN105204922A (en) * 2014-06-30 2015-12-30 金电联行(北京)信息技术有限公司 Collecting method of client terminal of data collecting platform
CN107689951A (en) * 2017-07-26 2018-02-13 上海壹账通金融科技有限公司 Web data crawling method, device, user terminal and readable storage medium storing program for executing
CN109981277A (en) * 2017-12-27 2019-07-05 航天信息股份有限公司 A kind of couple of USBKey carries out the method and system of automatic safety authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120030475A1 (en) * 2010-08-02 2012-02-02 Ma Felix Kuo-We Machine-machine authentication method and human-machine authentication method for cloud computing
CN105204922A (en) * 2014-06-30 2015-12-30 金电联行(北京)信息技术有限公司 Collecting method of client terminal of data collecting platform
CN107689951A (en) * 2017-07-26 2018-02-13 上海壹账通金融科技有限公司 Web data crawling method, device, user terminal and readable storage medium storing program for executing
CN109981277A (en) * 2017-12-27 2019-07-05 航天信息股份有限公司 A kind of couple of USBKey carries out the method and system of automatic safety authentication

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113449944A (en) * 2020-03-27 2021-09-28 中国移动通信集团山东有限公司 Work order processing method and device based on hardware sharing and computer equipment
CN113434848A (en) * 2021-07-06 2021-09-24 李瑞强 Data acquisition method and device, storage medium and electronic equipment
CN113722095A (en) * 2021-08-18 2021-11-30 江苏电力信息技术有限公司 Data API dynamic configuration method of electric power data transaction platform

Similar Documents

Publication Publication Date Title
CN110287682B (en) Login method, device and system
JP2018501567A (en) Device verification method and equipment
CN109063423B (en) Application software authorization method and system
CN107342984A (en) A kind of system, method and device for apparatus bound
CN110691091A (en) Data acquisition method and device based on identity authentication and computer equipment
CN108965331B (en) Login verification method, device and system
CN109039987A (en) A kind of user account login method, device, electronic equipment and storage medium
CN104301316A (en) Single sign-on system and implementation method thereof
CN108737110B (en) Data encryption transmission method and device for preventing replay attack
CN109005159B (en) Data processing method for terminal access system server and authentication server
CN104468531A (en) Authorization method, device and system for sensitive data
CN103888255A (en) Identity authentication method, device and system
CN107026738B (en) Digital certificate updating method, digital signature verification method and digital authentication device
CN110069909B (en) Method and device for login of third-party system without secret
CN105991614A (en) Open authorization, resource access method and device, and a server
CN107733838A (en) A kind of mobile terminal client terminal identity identifying method, device and system
CN110704566B (en) Data acquisition method and device based on geographic position and computer equipment
CN114499975B (en) Verification method for login server, server and storage medium
CN105357110A (en) Mail sending method, device and system
CN112861112A (en) Method and device for preventing equipment fingerprint identification fraud
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN113726774A (en) Client login authentication method, system and computer equipment
CN113395249A (en) Client login authentication method, system and computer equipment
CN110677423A (en) Data acquisition method and device based on client agent side and computer equipment
CN118153024B (en) Method, device, equipment and storage medium for detecting risk of server certificate application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200114

RJ01 Rejection of invention patent application after publication