CN111769954A - Data acquisition method, data acquisition server, client and electronic equipment - Google Patents

Data acquisition method, data acquisition server, client and electronic equipment Download PDF

Info

Publication number
CN111769954A
CN111769954A CN202010610664.5A CN202010610664A CN111769954A CN 111769954 A CN111769954 A CN 111769954A CN 202010610664 A CN202010610664 A CN 202010610664A CN 111769954 A CN111769954 A CN 111769954A
Authority
CN
China
Prior art keywords
data
data acquisition
client
acquired
abstract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010610664.5A
Other languages
Chinese (zh)
Inventor
吴金虎
张壮
张胜猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN202010610664.5A priority Critical patent/CN111769954A/en
Publication of CN111769954A publication Critical patent/CN111769954A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data acquisition method, a data acquisition server, a client and electronic equipment, wherein the method comprises the following steps: sending a data acquisition instruction to a data acquisition client so that the data acquisition client acquires data to be acquired required by the data acquisition instruction; receiving identity information of a data acquisition client, data to be acquired and an abstract of the data to be acquired from the data acquisition client, wherein the identity information is a digital signature encrypted by the data acquisition client through a private key; according to the identity information of the data acquisition client, performing identity authentication on the data acquisition client; after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired; and when the data of the data to be acquired passes the verification, storing the data to be acquired. The scheme can ensure the safety of the data acquisition process.

Description

Data acquisition method, data acquisition server, client and electronic equipment
Technical Field
The invention relates to the technical field of computers, in particular to a data acquisition method, a data acquisition server, a client and electronic equipment.
Background
With the advent of artificial intelligence and the era of big data, a large amount of data needs to be analyzed, and data collection is a necessary condition for big data analysis, so that the data collection is of great importance.
At present, when data acquisition is carried out identity authentication, a password corresponding to a user name of a client is generally input in an identity authentication interface according to a pre-stored corresponding relationship between the user name and the password, however, the above-mentioned identity authentication mode has a situation that a user does not log in the client himself, and thus the security of the data acquisition process is not high.
Disclosure of Invention
The embodiment of the invention provides a data acquisition method, a data acquisition server, a client and electronic equipment, which can improve the safety of a data acquisition process.
In a first aspect, the present invention provides a data acquisition method, applied to a data acquisition server, including:
sending a data acquisition instruction to a data acquisition client so that the data acquisition client acquires data to be acquired required by the data acquisition instruction;
receiving identity information of the data acquisition client, the data to be acquired and an abstract of the data to be acquired, wherein the identity information is a digital signature of the data acquisition client encrypted by a private key;
according to the identity information of the data acquisition client, performing identity authentication on the data acquisition client;
after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired;
and when the data verification of the data to be acquired is passed, storing the data to be acquired.
Preferably, the first and second electrodes are formed of a metal,
before the sending of the data acquisition instruction to the data acquisition client, the method further comprises:
receiving externally input configuration information, wherein the configuration information comprises: the method comprises the steps that a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time are obtained;
generating the data acquisition instruction according to the configuration information so that the data acquisition client acquires data between the data acquisition starting time and the data acquisition ending time;
the receiving the identity information of the data acquisition client, the data to be acquired and the abstract of the data to be acquired sent by the data acquisition client comprises:
and receiving the identity information, the data to be collected and the abstract of the data to be collected, which are transmitted to the interface corresponding to the server data receiving interface number by the data collection client through the interface corresponding to the client data uploading interface number.
Preferably, the first and second electrodes are formed of a metal,
the digital signature comprises: a current client user name and a client ID;
the performing identity authentication on the data acquisition client according to the identity information of the data acquisition client comprises:
decrypting the identity information through a public key set for the client in advance;
analyzing the current client user name and the client ID from the decrypted identity information;
determining whether a target client user name corresponding to the client ID in the identity information exists in a pre-stored corresponding relationship between the client user name and the client ID;
when the target client user name exists, determining whether the target client user name is the same as the current client user name;
and when the target client user name is determined to be the same as the current client user name, determining that the data acquisition client passes the authentication.
Preferably, the first and second electrodes are formed of a metal,
the abstract of the data to be collected is generated by processing the data to be collected by the data collection client by using a cryptographic hash algorithm;
the data verification of the data to be collected sent by the data collection client according to the abstract of the data to be collected comprises the following steps:
analyzing the data to be acquired sent by the data acquisition client;
processing the analyzed data to be acquired by using the password hash algorithm to generate a data acquisition server side abstract;
determining whether the data acquisition server side abstract and the abstract sent by the data acquisition client side are the same;
and when the data acquisition server side abstract and the abstract sent by the data acquisition client side are determined to be the same, determining that the data verification of the data to be acquired is passed.
In a second aspect, the present invention provides a data acquisition method applied to a data acquisition client, including:
receiving a data acquisition instruction sent by a data acquisition server;
acquiring data to be acquired required by the data acquisition instruction;
processing the data to be acquired by utilizing a cryptographic hash algorithm to generate an abstract of the data to be acquired;
and sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server, so that the data collection server performs identity authentication on the data collection client according to the identity information and performs data verification on the data to be collected according to the abstract of the data to be collected.
Preferably, the first and second electrodes are formed of a metal,
after receiving the data acquisition instruction sent by the data acquisition server, the method further comprises:
analyzing a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time from the data acquisition instruction;
acquiring the data to be acquired between the data acquisition starting time and the data acquisition ending time according to the data acquisition starting time and the data acquisition ending time;
the sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server side comprises the following steps:
and transmitting the identity information, the data to be collected and the abstract of the data to be collected to an interface corresponding to the server data receiving interface number through an interface corresponding to the client data uploading interface number.
In a third aspect, the present invention provides a data acquisition server, including:
the instruction sending module is used for sending a data acquisition instruction to a data acquisition client so that the data acquisition client acquires data to be acquired required by the data acquisition instruction;
the identity information receiving module is used for receiving the identity information of the data acquisition client, the data to be acquired and the abstract of the data to be acquired, which are sent by the data acquisition client according to the instruction sending module, wherein the identity information is a digital signature encrypted by a private key of the data acquisition client;
the instruction processing module is used for carrying out identity authentication on the data acquisition client according to the identity information of the data acquisition client; after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired; and when the data verification of the data to be acquired is passed, storing the data to be acquired.
In a fourth aspect, the present invention provides a data acquisition client, including:
the instruction receiving module is used for receiving a data acquisition instruction sent by the data acquisition server;
the data acquisition module is used for acquiring data to be acquired which is required by the data acquisition instruction received by the instruction receiving module;
the data processing module is used for processing the data to be acquired by the data acquisition module by utilizing a cryptographic hash algorithm to generate an abstract of the data to be acquired; and sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server, so that the data collection server performs identity authentication on the data collection client according to the identity information and performs data verification on the data to be collected according to the abstract of the data to be collected.
In a fifth aspect, the present invention provides an electronic device, comprising: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is configured to invoke the machine-readable program to perform the method of any of the first aspects.
In a sixth aspect, the present invention provides a computer readable medium having stored thereon computer instructions which, when executed by a processor, cause the processor to perform the method of any of the first aspects.
The embodiment of the invention provides a data acquisition method, a data acquisition server, a client and electronic equipment, and aims to ensure the safety of a data acquisition process, an identity authentication link can be set for the data acquisition process so as to verify the identity information of the client. Based on this, a data acquisition instruction for indicating the data to be acquired by the client can be sent to the data acquisition client, and after receiving the identity information sent by the data acquisition client, the data to be acquired and the abstract of the data to be acquired, the identity information of the data acquisition client is authenticated. Because the identity of a client is generally verified by inputting a user name and a corresponding password in the conventional data acquisition process, a non-self login situation exists. Therefore, in order to avoid the above situation, the identity information sent by the data acquisition client can be set as a digital signature encrypted by the private key, and the digital signature is encrypted by the private key, so that only the data acquisition client can generate the digital signature and others cannot forge the digital signature, and the digital signature can be used as an effective proof of the authenticity of the identity information of the data acquisition client. The identity information of the data acquisition client is authenticated based on the digital signature sent by the data acquisition client, so that the safety of the data acquisition process can be improved, then after the identity authentication is passed, the data to be acquired can be subjected to data verification to improve the reliability of the data acquisition process, and after the data verification is passed, the data to be acquired is stored. By the method, the data acquisition client does not need to input the corresponding user name and password on the identity authentication interface to verify the identity, and the safety of the data acquisition process can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a data acquisition method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another data collection method provided by an embodiment of the invention;
FIG. 3 is a flow chart of another data collection method according to an embodiment of the present invention;
fig. 4 is a flowchart of a data collection server according to an embodiment of the present invention;
fig. 5 is a flowchart of a data collection client according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a data acquisition method, which is applied to a data acquisition server, and the method may include the following steps:
step 101: sending a data acquisition instruction to a data acquisition client so that the data acquisition client acquires data to be acquired required by the data acquisition instruction;
step 102: receiving identity information of a data acquisition client, data to be acquired and an abstract of the data to be acquired from the data acquisition client, wherein the identity information is a digital signature encrypted by the data acquisition client through a private key;
step 103: according to the identity information of the data acquisition client, performing identity authentication on the data acquisition client;
step 104: after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired;
step 105: and when the data of the data to be acquired passes the verification, storing the data to be acquired.
In the embodiment of the invention, in order to ensure the safety of the data acquisition process, an identity authentication link can be set for the data acquisition process so as to verify the identity information of the client. Based on this, a data acquisition instruction for indicating the data to be acquired by the client can be sent to the data acquisition client, and after receiving the identity information sent by the data acquisition client, the data to be acquired and the abstract of the data to be acquired, the identity information of the data acquisition client is authenticated. Because the identity of a client is generally verified by inputting a user name and a corresponding password in the conventional data acquisition process, a non-self login situation exists. Therefore, in order to avoid the above situation, the identity information sent by the data acquisition client can be set as a digital signature encrypted by the private key, and the digital signature is encrypted by the private key, so that only the data acquisition client can generate the digital signature and others cannot forge the digital signature, and the digital signature can be used as an effective proof of the authenticity of the identity information of the data acquisition client. The identity information of the data acquisition client is authenticated based on the digital signature sent by the data acquisition client, so that the safety of the data acquisition process can be improved, then after the identity authentication is passed, the data to be acquired can be subjected to data verification to improve the reliability of the data acquisition process, and after the data verification is passed, the data to be acquired is stored. By the method, the data acquisition client does not need to input the corresponding user name and password on the identity authentication interface to verify the identity, and the safety of the data acquisition process can be improved.
In order to determine the data acquisition instruction, in an embodiment of the present invention, before sending the data acquisition instruction to the data acquisition client in step 101 of the foregoing embodiment, the method further includes:
receiving externally input configuration information, wherein the configuration information comprises: the method comprises the steps that a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time are obtained;
generating a data acquisition instruction according to the configuration information so that a data acquisition client acquires data between data acquisition starting time and data acquisition ending time;
receiving identity information of a data acquisition client, data to be acquired and an abstract of the data to be acquired from the data acquisition client, comprising:
and receiving the identity information, the data to be collected and the abstract of the data to be collected, which are transmitted from the data collection client to the interface corresponding to the server data receiving interface number through the interface corresponding to the client data uploading interface number.
In the embodiment of the present invention, the data acquisition instruction is an instruction for instructing a data acquisition client to acquire data, and the data acquisition client may acquire the required data according to the instruction after receiving the data acquisition instruction. Configuration information can be predetermined, and a data acquisition command can be generated through the configuration information, so that after configuration information which is externally input and contains a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time is received, a corresponding data acquisition command is generated according to the configuration information. The configuration information comprises data acquisition start time and data acquisition end time, so that the data acquisition client can be indicated to acquire data between the data acquisition start time and the data acquisition end time, and meanwhile, the configuration information comprises a client data uploading interface number and a server data receiving interface number, so that the data acquisition client can be indicated to transmit identity information, to-be-acquired data and an abstract of the to-be-acquired data to an interface corresponding to the server data receiving interface number through an interface corresponding to the client data uploading interface number.
In order to perform identity authentication on the data acquisition client, in an embodiment of the present invention, the digital signature in the foregoing embodiment includes: a current client user name and a client ID;
in step 103 of the foregoing embodiment, the identity authentication of the data acquisition client is performed according to the identity information of the data acquisition client, which may be specifically implemented in the following manner:
decrypting the identity information by a public key set for the client in advance;
analyzing the current client user name and the client ID from the decrypted identity information;
determining whether a target client user name corresponding to the client ID in the identity information exists in a pre-stored corresponding relationship between the client user name and the client ID;
when the target client user name exists, determining whether the target client user name is the same as the current client user name;
and when the target client user name is determined to be the same as the current client user name, determining that the data acquisition client passes the authentication.
In the embodiment of the present invention, because the identity information sent by the data acquisition client is a digital signature encrypted by the data acquisition client through a private key, and the data acquisition server performs configuration of a public key for each data acquisition client in advance, only the data acquisition client configured with the public key can upload data, it is first necessary to decrypt the identity information received by the data acquisition server through the public key set in advance for the client. And then analyzing a current client user name and a client ID contained in the digital signature from the decrypted identity information, determining whether a target client user name corresponding to the client ID in the identity information is the same as the current client user name according to a pre-stored corresponding relationship between the client user name and the client ID, and determining that the data acquisition client passes the authentication when the target client user name is determined to be the same as the current client user name.
In order to perform data verification on data to be acquired, in an embodiment of the present invention, the digest of the data to be acquired in the above embodiment is a digest generated by processing the data to be acquired by a data acquisition client using a cryptographic hash algorithm;
in the above embodiment, in step 104, the data to be acquired sent from the data acquisition client is verified according to the summary of the data to be acquired, which may be specifically implemented as follows:
analyzing data to be acquired sent by a data acquisition client;
processing the analyzed data to be acquired by utilizing a cipher hash algorithm to generate a data acquisition server side abstract;
determining whether the abstract of the data acquisition server side is the same as the abstract sent by the data acquisition client side;
and when the data acquisition server side abstract and the abstract sent by the data acquisition client side are determined to be the same, determining that the data verification of the data to be acquired is passed.
In the embodiment of the invention, in order to improve the reliability of the data to be acquired, data verification can be performed on the data to be acquired, so that when the data to be acquired sent by the data acquisition client is received by the data acquisition server, the data can be analyzed first, and the abstract of the data acquisition server is generated by the analyzed data through a cryptographic hash algorithm. The data acquisition client sends the identity information of the data acquisition client, the data to be acquired and the abstract of the data to be acquired to the data acquisition table server after receiving the data acquisition instruction, and whether the abstract of the data acquisition client is the same as the abstract of the data acquisition server or not can be determined based on comparison between the abstract of the data acquisition client and the abstract of the data acquisition server, and the data verification of the data to be acquired is determined to be passed under the condition that the abstract of the data acquisition client is the same as the abstract of the data acquisition server.
As shown in fig. 2, an embodiment of the present invention provides a data acquisition method, which is applied to a data acquisition client, and the method may include the following steps:
step 201: receiving a data acquisition instruction sent by a data acquisition server;
step 202: acquiring data to be acquired required by a data acquisition instruction;
step 203: processing data to be acquired by using a cryptographic hash algorithm to generate an abstract of the data to be acquired;
step 204: and sending the identity information, the data to be collected and the abstract of the data to be collected to the data collection server, so that the data collection server performs identity authentication on the data collection client according to the identity information and performs data verification on the data to be collected according to the abstract of the data to be collected.
In the embodiment of the invention, in order to ensure the safety of the data acquisition process, an identity authentication link can be set for the data acquisition process so as to verify the identity information of the client. Based on this, after receiving a data acquisition instruction which is sent by the data acquisition server and used for indicating the data which needs to be acquired by the client, the data acquisition server acquires the required data according to the data acquisition instruction, processes the data to be acquired by using a cryptographic hash algorithm, generates an abstract of the data to be acquired, and then sends the identity information, the data to be acquired and the abstract of the data to be acquired to the data acquisition server for identity information authentication. Because the identity of a client is generally verified by inputting a user name and a corresponding password in the conventional data acquisition process, a non-self login situation exists. Therefore, in order to avoid the above situation, the identity information sent by the data acquisition client can be set as a digital signature encrypted by the private key, and the digital signature is encrypted by the private key, so that only the data acquisition client can generate the digital signature and others cannot forge the digital signature, the digital signature can be used as an effective proof of the authenticity of the identity information of the data acquisition client, and meanwhile, the reliability of the data to be acquired can be determined through a data verification feedback result sent by the server. By the method, the data acquisition client does not need to input the corresponding user name and password on the identity authentication interface to verify the identity, and the safety of the data acquisition process can be improved.
In order to determine the data to be collected, in an embodiment of the present invention, after receiving the data collection instruction sent by the data collection server, the method further includes:
analyzing a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time from a data acquisition instruction;
acquiring data to be acquired between the data acquisition starting time and the data acquisition ending time according to the data acquisition starting time and the data acquisition ending time;
step 204 in the foregoing embodiment is to send the identity information, the data to be collected, and the summary of the data to be collected to the data collection server, which may be specifically implemented in the following manner:
and transmitting the identity information, the data to be collected and the abstract of the data to be collected to an interface corresponding to the server data receiving interface number through an interface corresponding to the client data uploading interface number.
In the embodiment of the invention, the data acquisition instruction is used for indicating the data required to be acquired by the data acquisition client, so that the data acquisition client can firstly analyze the client data uploading interface number, the server data receiving interface number, the data acquisition starting time and the data acquisition ending time from the data acquisition instruction, acquire the data to be acquired between the data acquisition starting time and the data acquisition ending time according to the data acquisition starting time and the data acquisition ending time, and transmit the identity information, the data to be acquired and the abstract of the data to be acquired to the interface corresponding to the server data receiving interface number through the interface corresponding to the client data uploading interface number.
As shown in fig. 3, in order to more clearly illustrate the technical solution and advantages of the present invention, the following detailed description of the data acquisition method provided in the embodiment of the present invention may specifically include the following steps:
step 301: the data acquisition server receives configuration information input from the outside, wherein the configuration information comprises: the data acquisition system comprises a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time.
For example: assume that externally input configuration information is: content: "1201; 1303, "starttime: "2019-07-0300: 00: 00", endtime: and 2019-07-0400: 00:00, the number of the client data uploading interface is 1201, the number of the server data receiving interface is 1303, and the data acquired by the data acquisition client is data in the time length from 2019-07-0300: 00:00 to 2019-07-0400: 00: 00.
Step 302: and the data acquisition server generates a data acquisition instruction according to the configuration information so that the data acquisition client acquires data between the data acquisition starting time and the data acquisition ending time.
Step 303: and the data acquisition server sends a data acquisition instruction to the data acquisition client so that the data acquisition client acquires the data to be acquired required by the data acquisition instruction.
Step 304: and the data acquisition client receives a data acquisition instruction sent by the data acquisition server.
Specifically, the data acquisition instruction is used for indicating the data required to be acquired by the data acquisition client, so that the data acquisition client can acquire data according to the data acquisition instruction after receiving the data acquisition instruction sent by the data acquisition server, and meanwhile, the data acquisition client cannot upload data at will and can upload data only after receiving the data acquisition instruction sent by the data acquisition server.
Step 305: the data acquisition client analyzes the client data uploading interface number, the server data receiving interface number, the data acquisition starting time and the data acquisition ending time from the data acquisition instruction.
Specifically, the data acquisition client needs to immediately feed back the instruction after receiving the data acquisition instruction, and the data acquisition server determines that the instruction execution fails after 1 minute.
For example, a feedback status code of the data acquisition client can be represented by a code, the data acquisition client feeds back the status code according to a status code specification, and the data acquisition server analyzes the status fed back by the client according to the status code specification; for example, "code": "200", representing "result": "instruction parsing is successful"; "code": "500", representing "result": "instruction resolution failed".
Step 306: and acquiring data to be acquired between the data acquisition starting time and the data acquisition ending time according to the data acquisition starting time and the data acquisition ending time.
Step 307: and the data acquisition client processes the data to be acquired by using a cryptographic hash algorithm to generate an abstract of the data to be acquired.
For example, the data collection client may generate a digest of the data collection client using a cryptographic hash algorithm md5 or SM 3.
Step 308: and the data acquisition client transmits the identity information, the data to be acquired and the abstract of the data to be acquired to the interface corresponding to the server data receiving interface number through the interface corresponding to the client data uploading interface number.
Specifically, the data acquisition client must upload new, modified, and deleted data within a specified time range according to the data instruction requirements. When data is uploaded, the types of the data which are added, modified and deleted are marked through an operation mark in an interface. Where i identifies data representing newly added data, u identifies data representing updated data, and d identifies data representing deleted data. The data body has the limitation of maximum number of data, and the maximum amount of data uploaded in a single time is 100.
For example, the data body data is in a JSON array format, and a single piece of data is also processed in the JSON array format.
Step 309: the data acquisition server receives identity information, data to be acquired and an abstract of the data to be acquired, which are transmitted to an interface corresponding to the server data receiving interface number by the data acquisition client through an interface corresponding to the client data uploading interface number, wherein the identity information is a digital signature encrypted by the data acquisition client through a private key, and the digital signature comprises: the current client user name and the client ID, and the summary of the data to be collected are generated by processing the data to be collected by the data collection client through a password hash algorithm.
Specifically, the data acquisition client may encrypt the identity information through a private key of a public key encryption algorithm RSA or SM2 to obtain a digital signature, and the data acquisition service first verifies the identity of the data acquisition client according to the digital signature and analyzes the data to be acquired after the identity authentication is passed.
Step 310: and the data acquisition server decrypts the identity information through a public key which is set for the client in advance.
Specifically, the data acquisition server can configure the public key of the client through the visual interface, perform authority management on the data liniment client to be acquired, and the client which is not configured with the public key cannot upload data to be acquired.
Step 311: and the data acquisition server analyzes the current client user name and the client ID from the decrypted identity information.
Step 312: and the data acquisition server determines whether a target client user name corresponding to the client ID in the identity information exists in a pre-stored corresponding relationship between the client user name and the client ID.
Step 313: and when the target client user name exists, the data acquisition server determines whether the target client user name is the same as the current client user name.
Step 314: and the data acquisition server determines that the data acquisition client passes the authentication when determining that the target client user name is the same as the current client user name.
Step 315: and the data acquisition server analyzes the data to be acquired sent by the data acquisition client after the data acquisition client passes the authentication.
Step 316: and the data acquisition server side processes the analyzed data to be acquired by utilizing a cipher hash algorithm to generate a data acquisition server side abstract.
Step 317: the data acquisition server determines whether the abstract of the data acquisition server is the same as the abstract sent by the data acquisition client.
Step 318: and the data acquisition server side determines that the data verification of the data to be acquired is passed when determining that the data acquisition server side abstract is the same as the abstract sent by the data acquisition client side.
In particular, in order to prevent the data to be collected from being tampered in the network transmission process. The data acquisition client side can use the cipher hash algorithm md5 or SM3 to generate the digest of the data acquisition client side for the data to be acquired, the data acquisition server side generates the digest of the data acquisition server side through the cipher hash algorithm md5 or SM3, and the two digests are compared, if the two digests are consistent, the data is not tampered, otherwise, the data is tampered.
Step 319: and the data acquisition server stores the data to be acquired when the data verification of the data to be acquired is passed.
As shown in fig. 4, an embodiment of the present invention provides a data acquisition server, including:
the instruction sending module 401 is configured to send a data acquisition instruction to a data acquisition client, so that the data acquisition client acquires data to be acquired, which is required by the data acquisition instruction;
an identity information receiving module 402, configured to receive the identity information of the data acquisition client, the data to be acquired, and the digest of the data to be acquired, which are sent by the data acquisition client according to the instruction sending module 401, where the identity information is a digital signature encrypted by a private key of the data acquisition client;
the instruction processing module 403 is configured to perform identity authentication on the data acquisition client according to the identity information of the data acquisition client; after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired; and when the data verification of the data to be acquired is passed, storing the data to be acquired.
In the embodiment of the invention, in order to ensure the safety of the data acquisition process, an identity authentication link can be set for the data acquisition process so as to verify the identity information of the client. Based on this, a data acquisition instruction for indicating the data to be acquired by the client can be sent to the data acquisition client, and after receiving the identity information sent by the data acquisition client, the data to be acquired and the abstract of the data to be acquired, the identity information of the data acquisition client is authenticated. Because the identity of a client is generally verified by inputting a user name and a corresponding password in the conventional data acquisition process, a non-self login situation exists. Therefore, in order to avoid the above situation, the identity information sent by the data acquisition client can be set as a digital signature encrypted by the private key, and the digital signature is encrypted by the private key, so that only the data acquisition client can generate the digital signature and others cannot forge the digital signature, and the digital signature can be used as an effective proof of the authenticity of the identity information of the data acquisition client. The identity information of the data acquisition client is authenticated based on the digital signature sent by the data acquisition client, so that the safety of the data acquisition process can be improved, then after the identity authentication is passed, the data to be acquired can be subjected to data verification to improve the reliability of the data acquisition process, and after the data verification is passed, the data to be acquired is stored. By the method, the data acquisition client does not need to input the corresponding user name and password on the identity authentication interface to verify the identity, and the safety of the data acquisition process can be improved.
It is to be understood that the illustrated structure of the embodiment of the present invention does not form a specific limitation on the data acquisition server. In other embodiments of the invention, the data collection server may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
As shown in fig. 5, an embodiment of the present invention provides a data acquisition client, including:
the instruction receiving module 501 is configured to receive a data acquisition instruction sent by a data acquisition server;
a data acquisition module 502, configured to acquire data to be acquired according to the data acquisition instruction received by the instruction receiving module 501;
a data processing module 503, configured to process the data to be acquired, acquired by the data acquisition module 502, by using a cryptographic hash algorithm, and generate a summary of the data to be acquired; and sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server, so that the data collection server performs identity authentication on the data collection client according to the identity information and performs data verification on the data to be collected according to the abstract of the data to be collected.
In the embodiment of the invention, in order to ensure the safety of the data acquisition process, an identity authentication link can be set for the data acquisition process so as to verify the identity information of the client. Based on this, after receiving a data acquisition instruction which is sent by the data acquisition server and used for indicating the data which needs to be acquired by the client, the data acquisition server acquires the required data according to the data acquisition instruction, processes the data to be acquired by using a cryptographic hash algorithm, generates an abstract of the data to be acquired, and then sends the identity information, the data to be acquired and the abstract of the data to be acquired to the data acquisition server for identity information authentication. Because the identity of a client is generally verified by inputting a user name and a corresponding password in the conventional data acquisition process, a non-self login situation exists. Therefore, in order to avoid the above situation, the identity information sent by the data acquisition client can be set as a digital signature encrypted by the private key, and the digital signature is encrypted by the private key, so that only the data acquisition client can generate the digital signature and others cannot forge the digital signature, the digital signature can be used as an effective proof of the authenticity of the identity information of the data acquisition client, and meanwhile, the reliability of the data to be acquired can be determined through a data verification feedback result sent by the server. By the method, the data acquisition client does not need to input the corresponding user name and password on the identity authentication interface to verify the identity, and the safety of the data acquisition process can be improved.
It is to be understood that the illustrated structure of the embodiment of the present invention does not form a specific limitation to the data collection client. In other embodiments of the invention, the data collection client may include more or fewer components than illustrated, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Because the information interaction, execution process, and other contents between the units in the device are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
An embodiment of the present invention further provides an electronic device, including: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is configured to invoke the machine readable program to perform the data collection method of any embodiment of the invention.
An embodiment of the present invention further provides a computer-readable medium, where computer instructions are stored on the computer-readable medium, and when executed by a processor, the computer instructions cause the processor to execute the data acquisition method in any embodiment of the present invention.
Specifically, a system or an apparatus equipped with a storage medium on which software program codes that realize the functions of any of the above-described embodiments are stored may be provided, and a computer (or a CPU or MPU) of the system or the apparatus is caused to read out and execute the program codes stored in the storage medium.
In this case, the program code itself read from the storage medium can realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code constitute a part of the present invention.
Examples of the storage medium for supplying the program code include a floppy disk, a hard disk, a magneto-optical disk, an optical disk (e.g., CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD + RW), a magnetic tape, a nonvolatile memory card, and a ROM. Alternatively, the program code may be downloaded from a server computer via a communications network.
Further, it should be clear that the functions of any one of the above-described embodiments may be implemented not only by executing the program code read out by the computer, but also by causing an operating system or the like operating on the computer to perform a part or all of the actual operations based on instructions of the program code.
Further, it is to be understood that the program code read out from the storage medium is written to a memory provided in an expansion board inserted into the computer or to a memory provided in an expansion unit connected to the computer, and then causes a CPU or the like mounted on the expansion board or the expansion unit to perform part or all of the actual operations based on instructions of the program code, thereby realizing the functions of any of the above-described embodiments.
The embodiments of the invention have at least the following beneficial effects:
1. in the embodiment of the invention, in order to ensure the safety of the data acquisition process, an identity authentication link can be set for the data acquisition process so as to verify the identity information of the client. Based on this, a data acquisition instruction for indicating the data to be acquired by the client can be sent to the data acquisition client, and after receiving the identity information sent by the data acquisition client, the data to be acquired and the abstract of the data to be acquired, the identity information of the data acquisition client is authenticated. Because the identity of a client is generally verified by inputting a user name and a corresponding password in the conventional data acquisition process, a non-self login situation exists. Therefore, in order to avoid the above situation, the identity information sent by the data acquisition client can be set as a digital signature encrypted by the private key, and the digital signature is encrypted by the private key, so that only the data acquisition client can generate the digital signature and others cannot forge the digital signature, and the digital signature can be used as an effective proof of the authenticity of the identity information of the data acquisition client. The identity information of the data acquisition client is authenticated based on the digital signature sent by the data acquisition client, so that the safety of the data acquisition process can be improved, then after the identity authentication is passed, the data to be acquired can be subjected to data verification to improve the reliability of the data acquisition process, and after the data verification is passed, the data to be acquired is stored. By the method, the data acquisition client does not need to input the corresponding user name and password on the identity authentication interface to verify the identity, so that the safety of the data acquisition process can be improved;
2. in the embodiment of the present invention, the data acquisition instruction is an instruction for instructing a data acquisition client to acquire data, and the data acquisition client may acquire the required data according to the instruction after receiving the data acquisition instruction. Configuration information can be predetermined, and a data acquisition command can be generated through the configuration information, so that after configuration information which is externally input and contains a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time is received, a corresponding data acquisition command is generated according to the configuration information. The configuration information comprises data acquisition starting time and data acquisition ending time, so that the data acquisition client can be indicated to acquire data between the data acquisition starting time and the data acquisition ending time, and meanwhile, the configuration information comprises a client data uploading interface number and a server data receiving interface number, so that the data acquisition client can be indicated to transmit identity information, to-be-acquired data and an abstract of the to-be-acquired data to an interface corresponding to the server data receiving interface number through an interface corresponding to the client data uploading interface number;
3. in an embodiment of the present invention, because the identity information sent by the data acquisition client is a digital signature encrypted by the data acquisition client through a private key, and the data acquisition server performs configuration of a public key for each data acquisition client in advance, only the data acquisition client configured with the public key can upload data, it is first necessary to decrypt the identity information received by the data acquisition server through the public key set in advance for the client. And then analyzing a current client user name and a client ID contained in the digital signature from the decrypted identity information, determining whether a target client user name corresponding to the client ID in the identity information is the same as the current client user name according to a pre-stored corresponding relationship between the client user name and the client ID, and determining that the data acquisition client passes the authentication when the target client user name is determined to be the same as the current client user name.
It should be noted that not all steps and modules in the above flows and system structure diagrams are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The system structure described in the above embodiments may be a physical structure or a logical structure, that is, some modules may be implemented by the same physical entity, or some modules may be implemented by a plurality of physical entities, or some components in a plurality of independent devices may be implemented together.
In the above embodiments, the hardware unit may be implemented mechanically or electrically. For example, a hardware element may comprise permanently dedicated circuitry or logic (such as a dedicated processor, FPGA or ASIC) to perform the corresponding operations. The hardware elements may also comprise programmable logic or circuitry, such as a general purpose processor or other programmable processor, that may be temporarily configured by software to perform the corresponding operations. The specific implementation (mechanical, or dedicated permanent, or temporarily set) may be determined based on cost and time considerations.
While the invention has been shown and described in detail in the drawings and in the preferred embodiments, it is not intended to limit the invention to the embodiments disclosed, and it will be apparent to those skilled in the art that various combinations of the code auditing means in the various embodiments described above may be used to obtain further embodiments of the invention, which are also within the scope of the invention.

Claims (10)

1. The data acquisition method is characterized by being applied to a data acquisition server side and comprising the following steps:
sending a data acquisition instruction to a data acquisition client so that the data acquisition client acquires data to be acquired required by the data acquisition instruction;
receiving identity information of the data acquisition client, the data to be acquired and an abstract of the data to be acquired, wherein the identity information is a digital signature of the data acquisition client encrypted by a private key;
according to the identity information of the data acquisition client, performing identity authentication on the data acquisition client;
after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired;
and when the data verification of the data to be acquired is passed, storing the data to be acquired.
2. The method of claim 1,
before the sending of the data acquisition instruction to the data acquisition client, the method further comprises:
receiving externally input configuration information, wherein the configuration information comprises: the method comprises the steps that a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time are obtained;
generating the data acquisition instruction according to the configuration information so that the data acquisition client acquires data between the data acquisition starting time and the data acquisition ending time;
the receiving the identity information of the data acquisition client, the data to be acquired and the abstract of the data to be acquired sent by the data acquisition client comprises:
and receiving the identity information, the data to be collected and the abstract of the data to be collected, which are transmitted to the interface corresponding to the server data receiving interface number by the data collection client through the interface corresponding to the client data uploading interface number.
3. The method of claim 1,
the digital signature comprises: a current client user name and a client ID;
the performing identity authentication on the data acquisition client according to the identity information of the data acquisition client comprises:
decrypting the identity information through a public key set for the client in advance;
analyzing the current client user name and the client ID from the decrypted identity information;
determining whether a target client user name corresponding to the client ID in the identity information exists in a pre-stored corresponding relationship between the client user name and the client ID;
when the target client user name exists, determining whether the target client user name is the same as the current client user name;
and when the target client user name is determined to be the same as the current client user name, determining that the data acquisition client passes the authentication.
4. The method according to any one of claims 1 to 3,
the abstract of the data to be collected is generated by processing the data to be collected by the data collection client by using a cryptographic hash algorithm;
the data verification of the data to be collected sent by the data collection client according to the abstract of the data to be collected comprises the following steps:
analyzing the data to be acquired sent by the data acquisition client;
processing the analyzed data to be acquired by using the password hash algorithm to generate a data acquisition server side abstract;
determining whether the data acquisition server side abstract and the abstract sent by the data acquisition client side are the same;
and when the data acquisition server side abstract and the abstract sent by the data acquisition client side are determined to be the same, determining that the data verification of the data to be acquired is passed.
5. The data acquisition method is characterized by being applied to a data acquisition client, and comprises the following steps:
receiving a data acquisition instruction sent by a data acquisition server;
acquiring data to be acquired required by the data acquisition instruction;
processing the data to be acquired by utilizing a cryptographic hash algorithm to generate an abstract of the data to be acquired;
and sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server, so that the data collection server performs identity authentication on the data collection client according to the identity information and performs data verification on the data to be collected according to the abstract of the data to be collected.
6. The method of claim 5,
after receiving the data acquisition instruction sent by the data acquisition server, the method further comprises:
analyzing a client data uploading interface number, a server data receiving interface number, data acquisition starting time and data acquisition ending time from the data acquisition instruction;
acquiring the data to be acquired between the data acquisition starting time and the data acquisition ending time according to the data acquisition starting time and the data acquisition ending time;
the sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server side comprises the following steps:
and transmitting the identity information, the data to be collected and the abstract of the data to be collected to an interface corresponding to the server data receiving interface number through an interface corresponding to the client data uploading interface number.
7. Data acquisition server side, its characterized in that includes:
the instruction sending module is used for sending a data acquisition instruction to a data acquisition client so that the data acquisition client acquires data to be acquired required by the data acquisition instruction;
the identity information receiving module is used for receiving the identity information of the data acquisition client, the data to be acquired and the abstract of the data to be acquired, which are sent by the data acquisition client according to the instruction sending module, wherein the identity information is a digital signature encrypted by a private key of the data acquisition client;
the instruction processing module is used for carrying out identity authentication on the data acquisition client according to the identity information of the data acquisition client; after the data acquisition client passes the authentication, performing data verification on the data to be acquired sent by the data acquisition client according to the abstract of the data to be acquired; and when the data verification of the data to be acquired is passed, storing the data to be acquired.
8. Data acquisition client, its characterized in that includes:
the instruction receiving module is used for receiving a data acquisition instruction sent by the data acquisition server;
the data acquisition module is used for acquiring data to be acquired which is required by the data acquisition instruction received by the instruction receiving module;
the data processing module is used for processing the data to be acquired by the data acquisition module by utilizing a cryptographic hash algorithm to generate an abstract of the data to be acquired; and sending identity information, the data to be collected and the abstract of the data to be collected to the data collection server, so that the data collection server performs identity authentication on the data collection client according to the identity information and performs data verification on the data to be collected according to the abstract of the data to be collected.
9. An electronic device, comprising: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor, configured to invoke the machine readable program to perform the method of any of claims 1 to 4.
10. Computer readable medium, characterized in that it has stored thereon computer instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 4.
CN202010610664.5A 2020-06-30 2020-06-30 Data acquisition method, data acquisition server, client and electronic equipment Pending CN111769954A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010610664.5A CN111769954A (en) 2020-06-30 2020-06-30 Data acquisition method, data acquisition server, client and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010610664.5A CN111769954A (en) 2020-06-30 2020-06-30 Data acquisition method, data acquisition server, client and electronic equipment

Publications (1)

Publication Number Publication Date
CN111769954A true CN111769954A (en) 2020-10-13

Family

ID=72724141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010610664.5A Pending CN111769954A (en) 2020-06-30 2020-06-30 Data acquisition method, data acquisition server, client and electronic equipment

Country Status (1)

Country Link
CN (1) CN111769954A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095569A1 (en) * 2001-01-17 2002-07-18 Jerdonek Robert A. Apparatus for pre-authentication of users using one-time passwords
CN102421096A (en) * 2011-12-22 2012-04-18 厦门雅迅网络股份有限公司 Method for safely transmitting data based on wireless network
CN106850680A (en) * 2017-03-20 2017-06-13 株洲中车时代电气股份有限公司 A kind of intelligent identity identification method and device for Transit Equipment
CN109861992A (en) * 2019-01-10 2019-06-07 深圳英飞拓智能技术有限公司 A kind of information interacting method and across scene method for tracing of monitor terminal
CN110535649A (en) * 2019-04-15 2019-12-03 清华大学 Data circulation method, system and service platform, first terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095569A1 (en) * 2001-01-17 2002-07-18 Jerdonek Robert A. Apparatus for pre-authentication of users using one-time passwords
CN102421096A (en) * 2011-12-22 2012-04-18 厦门雅迅网络股份有限公司 Method for safely transmitting data based on wireless network
CN106850680A (en) * 2017-03-20 2017-06-13 株洲中车时代电气股份有限公司 A kind of intelligent identity identification method and device for Transit Equipment
CN109861992A (en) * 2019-01-10 2019-06-07 深圳英飞拓智能技术有限公司 A kind of information interacting method and across scene method for tracing of monitor terminal
CN110535649A (en) * 2019-04-15 2019-12-03 清华大学 Data circulation method, system and service platform, first terminal equipment

Similar Documents

Publication Publication Date Title
EP4216081A1 (en) Information verification method, related apparatus, device, and storage medium
US6848048B1 (en) Method and apparatus for providing verifiable digital signatures
CN108023874B (en) Single sign-on verification device and method and computer readable storage medium
CN108040065B (en) Login-free method and device after webpage skipping, computer equipment and storage medium
US11539690B2 (en) Authentication system, authentication method, and application providing method
CN111435913B (en) Identity authentication method and device for terminal of Internet of things and storage medium
JP5105291B2 (en) Long-term signature server, long-term signature terminal, long-term signature terminal program
CN107248075B (en) Method and device for realizing bidirectional authentication and transaction of intelligent key equipment
CN109194625B (en) Client application protection method and device based on cloud server and storage medium
CN106571951B (en) Audit log obtaining method, system and device
CN109981255B (en) Method and system for updating key pool
JP2007028014A (en) Digital signature program, digital signature system, digital signature method and signature verification method
CN111884811B (en) Block chain-based data evidence storing method and data evidence storing platform
CN111181723B (en) Method and device for offline security authentication between Internet of things devices
US20190182050A1 (en) Method for authenticating a user based on an image relation rule and corresponding first user device, server and system
CN116074039A (en) File secure transmission method and system based on HTTPS protocol
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
CN109086588B (en) Authentication method and authentication equipment
CN106788983B (en) Communication data encryption method and device based on client/server mode
JP5734095B2 (en) Terminal device, server device, electronic certificate issuing system, electronic certificate receiving method, electronic certificate transmitting method, and program
CN114830572A (en) Data transmission method, device, equipment, system and storage medium
CN112053477A (en) Control system, method and device of intelligent door lock and readable storage medium
JP2009199147A (en) Communication control method and communication control program
CN111769954A (en) Data acquisition method, data acquisition server, client and electronic equipment
CN110139163A (en) A kind of method and relevant apparatus obtaining barrage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201013

RJ01 Rejection of invention patent application after publication