CN112702420A - Processing method and system for online and offline data interaction - Google Patents

Processing method and system for online and offline data interaction Download PDF

Info

Publication number
CN112702420A
CN112702420A CN202011526261.9A CN202011526261A CN112702420A CN 112702420 A CN112702420 A CN 112702420A CN 202011526261 A CN202011526261 A CN 202011526261A CN 112702420 A CN112702420 A CN 112702420A
Authority
CN
China
Prior art keywords
data
offline
standard data
online
interaction request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011526261.9A
Other languages
Chinese (zh)
Other versions
CN112702420B (en
Inventor
李朗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aiinpi Beijing Technology Co ltd
Original Assignee
Aiinpi Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aiinpi Beijing Technology Co ltd filed Critical Aiinpi Beijing Technology Co ltd
Priority to CN202011526261.9A priority Critical patent/CN112702420B/en
Publication of CN112702420A publication Critical patent/CN112702420A/en
Application granted granted Critical
Publication of CN112702420B publication Critical patent/CN112702420B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management

Abstract

The application discloses a processing method and a system for online and offline data interaction. The method comprises the following steps: receiving a data interaction request of an online terminal to an offline system; responding to the data interaction request, and generating first standard data; sending the first standard data to an offline system to acquire response data; generating second standard data according to the response data; and sending second standard data to the online terminal to complete the data interaction request. And the data interaction of the online and offline system is completed by performing corresponding conversion processing on the data interaction request of the online terminal and returning corresponding response data.

Description

Processing method and system for online and offline data interaction
Technical Field
The present application relates to the field of data interaction technologies, and in particular, to a method and a system for processing online and offline data interaction.
Background
Most of the data generated by the online internet software is different from the data generated by the offline traditional software, and the difficulty in combining the offline traditional software with the online internet software is great.
The conventional solutions basically continue the following flow: data generated by online software and data generated by offline software are isolated from each other, a specially assigned person is required to strip the data generated by the online software at intervals, and then the online software and the offline software are operated one by one according to the data.
In the process of realizing the prior art, the inventor finds that:
the traditional offline system is combined with internet software to achieve online and offline data communication, a large amount of manpower and material resources are often spent, and the problems that online software is not used well, offline system data is disordered and the like are caused due to the fact that the traditional offline system is not satisfactory. The online and offline data interaction processing method and system start from the pain point, and the system is invaded by light weight, so that the problems of safety, correctness and the like in the online and offline data communication process are solved.
Disclosure of Invention
The embodiment of the application provides a technical scheme for processing online and offline data interaction, which is used for solving the problems of safety, correctness and the like in the online and offline data communication process.
The application provides a processing method for online and offline data interaction, which comprises the following steps:
receiving a data interaction request of an online terminal to an offline system;
responding to the data interaction request, and generating first standard data;
sending the first standard data to an offline system to acquire response data;
generating second standard data according to the response data;
and sending second standard data to the online terminal to complete the data interaction request.
Further, in a preferred embodiment provided by the present application, the receiving a data interaction request from an online terminal to an offline system specifically includes:
calling preset connection parameters and establishing a connection relation with the online terminal;
and receiving a data interaction request of the online terminal according to the connection relation.
Further, in a preferred embodiment provided by the present application, the generating the first standard data in response to the data interaction request specifically includes:
decrypting the data interaction request according to a preset decryption mode to generate decrypted data;
and converting the obtained decrypted data according to a preset offline data format to generate first standard data which can be identified by the offline database.
Further, in a preferred embodiment provided by the present application, the decrypting the data interaction request according to a preset decryption manner to generate decrypted data specifically includes:
and decrypting the data interaction request by adopting the 3DES to generate decrypted data.
Further, in a preferred embodiment provided by the present application, the sending the first standard data to an offline system, and acquiring the response data specifically includes:
acquiring a target database connection parameter according to the first standard data;
establishing a connection relation with an offline target database according to the connection parameters of the target database;
and sending the first standard data according to the connection relation with the offline target database, and acquiring response data.
Further, in a preferred embodiment provided by the present application, establishing a connection relationship with an offline target database according to the connection parameters of the target database specifically includes:
encrypting the target database connection parameters according to a preset database encryption verification mode to generate encrypted connection parameters;
verifying the connection information according to the encrypted connection parameters and the offline target database;
and establishing a connection relation with the offline target database according to the verified connection information.
Further, in a preferred embodiment provided by the present application, the encrypting the target database connection parameter according to a preset database encryption verification method to generate an encrypted connection parameter specifically includes:
and encrypting the target database connection parameters according to the MD5 encryption mode to generate encrypted connection parameters.
Further, in a preferred embodiment provided by the present application, the generating the second standard data according to the response data specifically includes:
standardizing the response data according to a preset on-line data format to generate terminal standard data;
and encrypting the standard data of the terminal according to a preset encryption mode to generate second standard data which can be identified by the online terminal.
Further, in a preferred embodiment provided by the present application, the encrypting the standard data of the terminal according to a preset encryption manner to generate second standard data that can be recognized by the online terminal specifically includes:
and encrypting the terminal standard data according to a 3DES encryption mode to generate second standard data which can be identified by the online terminal.
The present application further provides a system for processing online and offline data interaction, comprising:
the receiving module is used for receiving a data interaction request of the online terminal to the offline system;
the first processing module is used for responding to the data interaction request and generating first standard data;
the offline sending module is used for sending the first standard data to an offline system and acquiring response data;
the second processing module is used for generating second standard data according to the response data;
and the on-line sending module is used for sending the second standard data to the on-line terminal to complete the data interaction request. The embodiment provided by the application has at least the following technical effects:
the light-weight intrusion system can well solve the problems of safety, correctness and the like in the online and offline data communication process.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of a processing method for online and offline data interaction according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a processing system for online and offline data interaction according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a method for processing online and offline data interaction provided in an embodiment of the present application specifically includes the following steps:
s100: and receiving a data interaction request of the online terminal to the offline system.
An online terminal is understood to be an online internet software, a system operating in a wide area network, such as an online shopping mall in particular. An offline system may be understood as offline legacy software. When the connection between data needs to be established between the online terminal and the offline system, a data interaction request generally needs to be sent first. For example, the online terminal requests to query a certain data of the offline system, and the online terminal needs to first send a data query request. It should be apparent that the data query request here can be understood as a data interaction request
Specifically, in a preferred embodiment provided by the present application, the receiving a data interaction request from an online terminal to an offline system specifically includes:
calling preset connection parameters and establishing a connection relation with the online terminal;
and receiving a data interaction request of the online terminal according to the connection relation.
The connection parameters can be preset in software, or can be manually input when in use. The connection parameters are mainly used as a group of verification information for establishing a connection relationship with the connection object. After the connection relationship is established, data may be transferred between the two software systems. For example, when a user wants to check certain data of his/her own offline system while using the online terminal, the user sends an inquiry request to the offline system by operating a specific function of the online terminal. It should be apparent that this query request may be considered a data interaction request.
S200: and responding to the data interaction request to generate first standard data.
Specifically, in a preferred embodiment provided by the present application, the generating the first standard data in response to the data interaction request specifically includes:
decrypting the data interaction request according to a preset decryption mode to generate decrypted data;
and converting the obtained decrypted data according to a preset offline data format to generate first standard data which can be identified by the offline database.
The data encryption technology is the most basic security technology in the network, and the security of the information transmitted in the network is mainly ensured by encrypting the data, so that the data encryption technology is an active security defense strategy, and can provide considerable security protection for the information with little cost. "encryption" is a technique to restrict access to data transmitted over a network. The encoded data resulting from the encryption of the original data (also called plaintext) by an encryption device (hardware or software) and a key is called ciphertext (ciphertext). The process of restoring the ciphertext to the original plaintext is called decryption, which is the inverse of encryption, but the decryptor must decrypt the ciphertext using the same type of encryption device and key. For example, the decryption mode should be set in the system in advance, so that the system can directly call the corresponding decryption function to perform the decryption operation when performing the decryption operation. The decryption mode should be the encryption mode before the corresponding data interaction request is sent. After the data interaction request is decrypted, corresponding data conversion is carried out on the decrypted data according to the data format of the target system, and therefore first standard data which can be identified by a corresponding target system database can be generated. It can be understood that the data format of the target system needs to be set in the system in advance.
Further, in a preferred embodiment provided by the present application, the decrypting the data interaction request according to a preset decryption manner to generate decrypted data specifically includes:
and decrypting the data interaction request by adopting the 3DES to generate decrypted data.
The 3DES (or called Triple DES) is a generic term for Triple Data Encryption Algorithm (TDEA) block cipher. It is equivalent to applying the DES encryption algorithm three times per block. Because of the enhancement of the computing power of the computer, the key length of the original DES password becomes easy to be cracked violently; 3DES is designed to provide a relatively simple method of avoiding similar attacks by increasing the key length of DES, rather than designing an entirely new block cipher algorithm.
S300: and sending the first standard data to an offline system to acquire response data.
Further, in a preferred embodiment provided in the present application, the sending the first standard data to the offline system, and acquiring the response data specifically includes:
acquiring a target database connection parameter according to the first standard data;
establishing a connection relation with an offline target database according to the connection parameters of the target database;
and sending the first standard data according to the connection relation with the offline target database, and acquiring response data.
Obviously, when establishing connection with the database, the connetor needs to verify the connection with the information such as the user name, the password, the database address and the like. The connetor can establish a connection relation with the target database only if knowing specific connection parameters. It can be understood that after the connection relationship with the target database is established, a series of operations can be performed on the target database according to the preset authority. For example, according to the database connection parameter part data in the first standard data, a connection relationship can be established with a target database of the offline system, the first standard data can be sent after the connection relationship is established, and then the target database returns specific response data according to the received first standard data.
Further, in a preferred embodiment provided by the present application, establishing a connection relationship with an offline target database according to the connection parameters of the target database specifically includes:
encrypting the target database connection parameters according to a preset database encryption verification mode to generate encrypted connection parameters;
verifying the connection information according to the encrypted connection parameters and the offline target database;
and establishing a connection relation with the offline target database according to the verified connection information.
It is obvious that the connection parameters are very important data information, and thus the security of the connection parameters is very important. The password in the connection parameter is generally stored in an encrypted form in the database, for example, when we need to store some password information for identity confirmation, if the password information is directly stored in the database in a plain code manner, the system administrator can easily obtain the original password information without using any security measures. Once such information is revealed, the password is also easily deciphered. In order to increase security, it is necessary to encrypt information that needs to be kept secret in the database, so that even if someone gets the entire database, the original cryptographic information cannot be obtained without a decryption algorithm.
Further, in a preferred embodiment provided in the present application, the encrypting the target database connection parameter according to a preset database encryption verification method to generate an encrypted connection parameter specifically includes:
and encrypting the target database connection parameters according to the MD5 encryption mode to generate encrypted connection parameters.
The MD5 message digest algorithm, a widely used cryptographic hash function, generates a 128-bit (16-byte) hash value to ensure the integrity of the message transmission. The user's password may be stored as an MD5 value (or similar other algorithm), and when the user connects, the system calculates the password entered by the user as an MD5 value, and then compares the value with the MD5 value stored in the system, and if the ciphertext is the same, the password may be considered correct, otherwise the password may be incorrect. Through such steps, the system can determine the validity of the user logging into the system without knowing the clear code of the user password. Therefore, the password of the user can be prevented from being known by the user with the authority of the system administrator, and the difficulty of cracking the password is increased to a certain extent.
S400: second standard data is generated according to the response data.
Specifically, in a preferred embodiment provided by the present application, the generating the second standard data according to the response data specifically includes:
standardizing the response data according to a preset on-line data format to generate terminal standard data;
and encrypting the standard data of the terminal according to a preset encryption mode to generate second standard data which can be identified by the online terminal.
It will be appreciated that the response data is the original data returned by the offline system, and the data format of the response data is either before encryption or the data format provided by the original offline system. It is obvious that the on-line terminal needs to identify the response data, and then the format of the response data needs to be converted into a data format that the on-line terminal can identify. Meanwhile, for data transmission security, the converted response data is encrypted to generate second standard data.
Further, in a preferred embodiment provided in the present application, the encrypting the standard data of the terminal according to a preset encryption manner to generate second standard data that can be recognized by the online terminal specifically includes:
and encrypting the terminal standard data according to a 3DES encryption mode to generate second standard data which can be identified by the online terminal.
It can be understood that the encrypted data generated by the 3DES encryption method needs to be decrypted by a decryption method corresponding to the 3DES encryption method. The encrypted data can be restored to the data before encryption only after the corresponding decryption. For example, a group of data information needs to be sent to the online terminal, and for the safety of information transmission, the data information is encrypted by 3DES to generate encrypted data information. When the encrypted data information is transmitted, the data security is effectively improved. After the online terminal receives the encrypted data information, the data before encryption can be recovered only by decrypting the encrypted data information by adopting 3 DES.
S500: and sending second standard data to the online terminal to complete the data interaction request.
Specifically, the second standard data is sent to the on-line terminal according to the connection relationship with the on-line terminal. After the on-line terminal receives the second standard data, the previous connection relation is finished, and the data interaction request sent by the on-line terminal is finished. The second standard data has a certain data format, so that specific data information can be acquired after the on-line terminal performs certain preprocessing on the second standard data.
Based on the same idea, the above processing method for online and offline data interaction provided in the embodiment of the present application further provides a processing system 100 for online and offline data interaction, as shown in fig. 2.
A processing system 100 for online and offline data interaction, comprising:
the receiving module 11 is configured to receive a data interaction request from an online terminal to an offline system;
the first processing module 12 is configured to respond to the data interaction request and generate first standard data;
the offline sending module 13 is configured to send the first standard data to an offline system to obtain response data;
a second processing module 14, configured to generate second standard data according to the response data;
and the online sending module 15 is configured to send the second standard data to the online terminal to complete the data interaction request.
A specific application of the processing system for online and offline data interaction herein may be understood as a software product. One specific application of the receiving module 11, the first processing module 12, the offline transmitting module 13, the second processing module 14, and the online transmitting module 15 can be understood as a functional function that can be independently encapsulated.
Further, in an embodiment provided in the present application, the receiving module 11 is configured to receive a data interaction request of an online terminal to an offline system, and specifically configured to:
calling preset connection parameters and establishing a connection relation with the online terminal;
and receiving a data interaction request of the online terminal according to the connection relation.
Further, in an embodiment provided in the present application, the first processing module 12 is configured to respond to the data interaction request, and generate first standard data, specifically, to:
decrypting the data interaction request according to a preset decryption mode to generate decrypted data;
and converting the obtained decrypted data according to a preset offline data format to generate first standard data which can be identified by the offline database.
Further, in an embodiment provided by the present application, the system decrypts the data interaction request by using 3DES to generate decrypted data.
Further, in an embodiment provided in the present application, the offline sending module 13 is configured to send the first standard data to an offline system, and acquire response data, and specifically configured to:
acquiring a target database connection parameter according to the first standard data;
establishing a connection relation with an offline target database according to the connection parameters of the target database;
and sending the first standard data according to the connection relation with the offline target database, and acquiring response data.
Further, in an embodiment provided by the present application, the connection relationship is established according to the connection parameters of the target database and the offline target database, and is specifically configured to:
encrypting the target database connection parameters according to a preset database encryption verification mode to generate encrypted connection parameters;
verifying the connection information according to the encrypted connection parameters and the offline target database;
and establishing a connection relation with the offline target database according to the verified connection information.
Further, in an embodiment provided by the present application, the system encrypts the target database connection parameter according to the MD5 encryption method to generate an encrypted connection parameter.
Further, in an embodiment provided in the present application, the second processing module 14 is configured to generate second standard data according to the response data, and specifically configured to:
standardizing the response data according to a preset on-line data format to generate terminal standard data;
and encrypting the standard data of the terminal according to a preset encryption mode to generate second standard data which can be identified by the online terminal.
Further, in an embodiment provided by the present application, the system encrypts the terminal standard data according to a 3DES encryption method to generate second standard data that can be recognized by the online terminal.
Further, in an embodiment provided in the present application, the online sending module 15 is configured to send second standard data to an online terminal, so as to complete the data interaction request.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A processing method for online and offline data interaction is characterized by comprising the following steps:
receiving a data interaction request of an online terminal to an offline system;
responding to the data interaction request, and generating first standard data;
sending the first standard data to an offline system to acquire response data;
generating second standard data according to the response data;
and sending second standard data to the online terminal to complete the data interaction request.
2. The method according to claim 1, wherein receiving a data interaction request from an online terminal to an offline system specifically comprises:
calling preset connection parameters and establishing a connection relation with the online terminal;
and receiving a data interaction request of the online terminal according to the connection relation.
3. The method according to claim 1, wherein generating first standard data in response to the data interaction request specifically includes:
decrypting the data interaction request according to a preset decryption mode to generate decrypted data;
and converting the obtained decrypted data according to a preset offline data format to generate first standard data which can be identified by the offline database.
4. The method according to claim 3, wherein decrypting the data interaction request according to a preset decryption manner to generate decrypted data specifically includes:
and decrypting the data interaction request by adopting the 3DES to generate decrypted data.
5. The method of claim 1, wherein sending the first standard data to an offline system to obtain the response data specifically comprises:
acquiring a target database connection parameter according to the first standard data;
establishing a connection relation with an offline target database according to the connection parameters of the target database;
and sending the first standard data according to the connection relation with the offline target database, and acquiring response data.
6. The method according to claim 5, wherein establishing a connection relationship with the offline target database according to the connection parameters of the target database specifically comprises:
encrypting the target database connection parameters according to a preset database encryption verification mode to generate encrypted connection parameters;
verifying the connection information according to the encrypted connection parameters and the offline target database;
and establishing a connection relation with the offline target database according to the verified connection information.
7. The method according to claim 6, wherein encrypting the target database connection parameter according to a preset database encryption verification manner to generate an encrypted connection parameter specifically comprises:
and encrypting the target database connection parameters according to the MD5 encryption mode to generate encrypted connection parameters.
8. The method according to claim 1, wherein generating the second standard data according to the response data specifically includes:
standardizing the response data according to a preset on-line data format to generate terminal standard data;
and encrypting the standard data of the terminal according to a preset encryption mode to generate second standard data which can be identified by the online terminal.
9. The method according to claim 8, wherein the encrypting the standard data of the terminal according to a preset encryption mode to generate the second standard data recognizable by the on-line terminal comprises:
and encrypting the terminal standard data according to a 3DES encryption mode to generate second standard data which can be identified by the online terminal.
10. A system for processing online and offline data interactions, comprising:
the receiving module is used for receiving a data interaction request of the online terminal to the offline system;
the first processing module is used for responding to the data interaction request and generating first standard data;
the offline sending module is used for sending the first standard data to an offline system and acquiring response data;
the second processing module is used for generating second standard data according to the response data;
and the on-line sending module is used for sending the second standard data to the on-line terminal to complete the data interaction request.
CN202011526261.9A 2020-12-22 2020-12-22 Processing method and system for online and offline data interaction Active CN112702420B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011526261.9A CN112702420B (en) 2020-12-22 2020-12-22 Processing method and system for online and offline data interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011526261.9A CN112702420B (en) 2020-12-22 2020-12-22 Processing method and system for online and offline data interaction

Publications (2)

Publication Number Publication Date
CN112702420A true CN112702420A (en) 2021-04-23
CN112702420B CN112702420B (en) 2023-01-31

Family

ID=75510128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011526261.9A Active CN112702420B (en) 2020-12-22 2020-12-22 Processing method and system for online and offline data interaction

Country Status (1)

Country Link
CN (1) CN112702420B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012013007A1 (en) * 2010-07-30 2012-02-02 蓝帽子(厦门)文化传播有限公司 Method for exchanging on-line and off-line game data interactively based on data communication
CN103152418A (en) * 2013-03-08 2013-06-12 上海伊邦医药信息科技有限公司 Data synchronization system and method for offline and online internet commodity retailing systems
CN105405028A (en) * 2015-10-28 2016-03-16 无锡峰巢美家网络科技有限公司 Online and offline retail data unified management system
CN106452773A (en) * 2015-08-06 2017-02-22 阿里巴巴集团控股有限公司 Data object interaction method and data object interaction equipment
CN106716970A (en) * 2015-06-30 2017-05-24 深圳市星电商科技有限公司 Information interaction processing method, system and terminal
CN110766523A (en) * 2019-10-25 2020-02-07 福建国通星驿网络科技有限公司 Method and terminal for realizing O2O

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012013007A1 (en) * 2010-07-30 2012-02-02 蓝帽子(厦门)文化传播有限公司 Method for exchanging on-line and off-line game data interactively based on data communication
CN103152418A (en) * 2013-03-08 2013-06-12 上海伊邦医药信息科技有限公司 Data synchronization system and method for offline and online internet commodity retailing systems
CN106716970A (en) * 2015-06-30 2017-05-24 深圳市星电商科技有限公司 Information interaction processing method, system and terminal
CN106452773A (en) * 2015-08-06 2017-02-22 阿里巴巴集团控股有限公司 Data object interaction method and data object interaction equipment
CN105405028A (en) * 2015-10-28 2016-03-16 无锡峰巢美家网络科技有限公司 Online and offline retail data unified management system
CN110766523A (en) * 2019-10-25 2020-02-07 福建国通星驿网络科技有限公司 Method and terminal for realizing O2O

Also Published As

Publication number Publication date
CN112702420B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN109728909B (en) Identity authentication method and system based on USBKey
US5784463A (en) Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US6941454B1 (en) System and method of sending and receiving secure data with a shared key
US20060095769A1 (en) System and method for initializing operation for an information security operation
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN111447214A (en) Method for centralized service of public key and password based on fingerprint identification
KR20010067966A (en) System and method of software-based commercial key escrow for pki environment
CN108880995B (en) Block chain-based unfamiliar social network user information and message pushing encryption method
CN112187798B (en) Bidirectional access control method and system applied to cloud-side data sharing
JP2004509399A (en) System for protecting objects distributed over a network
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN112532580B (en) Data transmission method and system based on block chain and proxy re-encryption
CN108768613A (en) A kind of ciphertext password method of calibration based on multiple encryption algorithms
US20060095770A1 (en) Method of establishing a secure e-mail transmission link
CN115276978A (en) Data processing method and related device
JPH10154977A (en) User certification system and method therefor
EP1125393B1 (en) Method of sending and receiving secure data with a shared key
KR100559958B1 (en) System and Method for Intermediate of Authentication Tool Between Mobile Communication Terminal
CN114154181A (en) Privacy calculation method based on distributed storage
CN114785527B (en) Data transmission method, device, equipment and storage medium
CN112702420B (en) Processing method and system for online and offline data interaction
JPH10240826A (en) Electronic contracting method
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
CN110113152B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and digital signature
CN114238912A (en) Digital certificate processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant