CN114257448A - Data docking transmission method and device and storage medium - Google Patents

Data docking transmission method and device and storage medium Download PDF

Info

Publication number
CN114257448A
CN114257448A CN202111566807.8A CN202111566807A CN114257448A CN 114257448 A CN114257448 A CN 114257448A CN 202111566807 A CN202111566807 A CN 202111566807A CN 114257448 A CN114257448 A CN 114257448A
Authority
CN
China
Prior art keywords
docking
access token
data
transmission
token information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111566807.8A
Other languages
Chinese (zh)
Inventor
孙雪松
胡欣
韩琪
罗联鑫
崔丽娟
任豪
刘湘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202111566807.8A priority Critical patent/CN114257448A/en
Publication of CN114257448A publication Critical patent/CN114257448A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The application relates to the technical field of data transmission, and provides a data docking transmission method, a device, a storage medium and electronic equipment for realizing data docking transmission among different systems, wherein the method comprises the steps of sending a public key and a private key paired based on a domestic encryption algorithm and access token information to an access terminal, and receiving a data docking request generated by the access terminal according to the public key and the access token; and identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to the identification result. According to the data transmission docking method disclosed by the application, the traditional login authentication mode based on the user name and the password is replaced by issuing management of the access token, and the domestic encryption algorithm is used for providing guarantee for data transmission, so that the safety of data docking transmission between the public security management information system and different special line systems is effectively improved.

Description

Data docking transmission method and device and storage medium
Technical Field
The present application relates to the field of information transmission technologies, and in particular, to a data docking transmission method, an apparatus, and a storage medium.
Background
With the rapid development of internet technology, the speed and scale of information collection and transmission are more and more required. When security management is performed on diversified different special enterprises such as hotel industry, old goods industry, ceremony industry, seal industry, printing industry and the like, data transmission management is performed on the security special enterprises which need to access the data acquisition systems of the different enterprises to the security special system used by the public security organization, and because the data acquisition systems used by the enterprises are different, how to efficiently and quickly perform system butt joint on the data acquisition systems of the different enterprises and the security special system used by the public security organization becomes a problem which needs to be solved urgently. In order to solve the problem, a third-party system is accessed to a public security special operation system for data docking and reporting in a password login mode through a user when the public security special operation system is used for multiple purposes, the traditional data docking scheme is inconvenient to implement, the security of the data docking and reporting process is poor, and the data security is difficult to guarantee.
Disclosure of Invention
In view of the above, embodiments of the present application provide a check code generation scheme to at least partially solve the above problem.
In a first aspect, an embodiment of the present application provides a variety of data docking transmission methods, which are applied to a server, and include:
a public key and a private key which are paired based on a domestic encryption algorithm, and access token information;
sending the public key and the access token information to an access terminal;
receiving a data docking request generated by the access terminal according to the public key and the access token;
and identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to the identification result.
Optionally, in an embodiment of the application, the identifying, according to the private key and the access token information, the data docking request, and performing data docking transmission according to a result of the identifying, includes:
decrypting the data docking request according to the private key to obtain a decryption result;
identifying and detecting the decryption result according to the access token to obtain an identification result;
determining a docking interface according to the identification result;
and carrying out data docking transmission according to the docking interface.
Optionally, in an embodiment of the present application, the performing identification detection on the decryption result according to the access token to obtain an identification result includes:
analyzing the decrypted docking request to acquire access token information of the docking request;
and matching the access token information of the docking request according to the access token analysis, and determining the matching result as the result of the identification detection.
Optionally, in an embodiment of the present application, the data interfacing transmission method further includes:
judging the validity period of the access token information;
and according to the judgment result, carrying out renewal or overdue processing on the access token information.
Optionally, in an embodiment of the present application, the docking interface is an HTTP interface.
In a second aspect, an embodiment of the present application further provides another data docking transmission method, applied to an access end, including:
receiving a public key and access token information in a key pair generated based on a domestic encryption algorithm and issued by a server;
generating a docking request by using the public key and the access token information;
and sending the docking request to a server to perform data docking transmission according to a result of the server identifying the docking request by using a private key in the public key pair and the access token information.
Optionally, in an embodiment of the present application, the performing data docking transmission according to a result of the server identifying the docking request by using a private key in the public key pair and the access token information includes:
determining a data docking interface according to the identification processing result;
and establishing a docking channel between the access end and the service end according to the docking interface so as to perform data docking transmission.
In a third aspect, an embodiment of the present application further provides a data interfacing transmission apparatus, including:
the generation module is used for generating a public key and a private key which are paired based on a domestic encryption algorithm and access token information;
the sending module is used for sending the public key and the access token information to an access end;
the receiving module is used for receiving a data docking request generated by the access terminal according to the public key and the access token;
and the docking module is used for identifying the data docking request according to the private key and the access token information and performing data docking transmission according to the identification result.
In a fourth aspect, the present application further provides another data interfacing transmission apparatus, including:
the acquisition module is used for receiving a public key and access token information in a key pair generated based on a domestic encryption algorithm and issued by a server;
the application module is used for generating a docking request by utilizing the public key and the access token information;
and the transmission module is used for sending the docking request to a server so as to perform data docking transmission according to the result of the identification processing on the docking request by the server by using the private key in the public key pair and the access token information.
In a fifth aspect, embodiments of the present application further provide a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements any one of the data interfacing transmission methods according to the first aspect or the second aspect of the present application.
In a sixth aspect, an embodiment of the present application further provides an electronic device, including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction, where the executable instruction causes the processor to perform an operation corresponding to any one of the data interfacing transmission methods according to the first aspect or the second aspect of the present application.
The embodiment of the application provides a data docking transmission method, a device, a storage medium and electronic equipment, wherein the method comprises the steps of sending a public key and a private key paired based on a domestic encryption algorithm and access token information to an access terminal, and receiving a data docking request generated by the access terminal according to the public key and the access token; and identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to the identification result. According to the data transmission docking method disclosed by the application, the traditional login authentication mode based on the user name and the password is replaced by issuing management of the access token, and the domestic encryption algorithm is used for providing guarantee for data transmission, so that the safety of data docking transmission between the public security management information system and different special line systems is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart of a data transmission interfacing method according to an embodiment of the present application;
fig. 2 is a flowchart of another data docking transmission method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data interfacing transmission apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of another data docking transmission device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application shall fall within the scope of the protection of the embodiments in the present application.
The following further describes specific implementations of embodiments of the present application with reference to the drawings of the embodiments of the present application.
The first embodiment,
An embodiment of the present application provides a data docking transmission method, which is applied to a server, as shown in fig. 1, where fig. 1 is a flowchart of a data transmission docking method provided in an embodiment of the present application, and the data transmission docking method includes:
s101, a public key and a private key which are paired based on a domestic encryption algorithm, and access token information.
In the embodiment of the application, a domestic encryption algorithm, such as an asymmetric encryption algorithm, is used for generating paired public and private key pairs, so that the data security of the transmission process after the encryption is tried can be effectively improved. Meanwhile, the data docking transmission request is controlled in a mode of generating access TOKEN information such as TOKEN information to manage and issue access authority, and convenience and safety of a data docking transmission process can be effectively improved.
Specifically, in an implementation manner of the embodiment of the present application, preferably, the domestic encryption algorithm includes, but is not limited to, an SM3 cipher digest algorithm, and information identification and detection are performed by using the algorithm in a form of generating a ciphertext digest, so that convenience in identifying and detecting received encrypted data can be effectively improved while data security and accuracy are ensured.
And S102, sending the public key and the access token information to an access terminal.
In the embodiment of the present application, the access end refers to an end having a data docking transmission requirement, for example, a special operation enterprise that needs to perform data docking transmission with a security special operation system used by a public security agency, such as a customer identity management system used by different enterprise companies in the hotel industry, the old goods industry, the pawn industry, the seal industry, the printing industry, and the like.
In one implementation of this embodiment, the public key and the access token information are preferably transmitted to the access terminal using a dedicated data transmission line, so as to further improve the security of the public key and access token issuing process.
S103, receiving a data docking request generated by the access terminal according to the public key and the access token.
In an embodiment of the present application, the data docking request may further ensure timeliness and security of data transmission, so that a dedicated data transmission line used when sending the public key and the access token information may be used for data transmission, such as receiving information.
S104, identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to the result of the identification.
In a specific application scenario of this embodiment, the private key in the generated key pair is used to decrypt the data docking request, and if decryption is possible, it indicates that the party that sends the access right of the access end and the server end that sends the docking request is consistent, and the process of sending the data, i.e., the public key and the access token, is safe and accurate.
Specifically, in an implementation manner of the embodiment of the present application, identifying and detecting the decryption result according to the access token to obtain an identification result includes:
analyzing the decrypted docking request to acquire access token information of the docking request; and matching the access token information of the docking request according to the access token analysis, and determining the matching result as the result of the identification detection. In the embodiment of the application, the access token issued to the access terminal is identified and detected, so that the identification processing efficiency can be improved while the accuracy of the identification processing result is ensured.
Optionally, in this embodiment of the present application, through using the private key and the access token, identification detection is performed on the access token in the received data docking request to determine whether the user system that sends the data docking request has a legal docking authority, and a result of the identification detection is determined as a result of the identification processing described in this embodiment. If the access request can be analyzed according to the private key, the analyzed result can be identified, and the access token information contained in the analyzed result is consistent with the access token information issued to the access terminal, the access terminal and the service terminal are represented by a pair joint method, and the access terminal and the service terminal are allowed to carry out a system data docking transmission request. Therefore, convenience and safety of data docking transmission between systems are improved.
Preferably, in an embodiment of the present application, the identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to a result of the identifying process includes: and decrypting the data docking request according to the private key to obtain a decryption result, identifying and detecting the decryption result according to the access token to obtain an identification result, determining a docking interface according to the identification result, and performing data docking transmission according to the docking interface. In the embodiment of the application, the special docking interface is determined by analyzing according to the identification result in the docking request, so that data transmission docking is performed through the docking interface, the accuracy and the safety of data docking transmission between the server side and the access side can be further improved, and the efficiency of data transmission after system docking is further improved.
Optionally, in an embodiment of the present application, the docking interface is an HTTP interface. In the embodiment of the application, the docking interface is determined to be the HTTP interface, so that the docking transmission implementation mode between systems is simpler and more convenient while the data docking security is ensured, the access flexibility is good, and the data transmission is convenient and efficient.
Optionally, in an implementation manner of the embodiment of the present application, the data docking transmission method further includes: and judging the validity period of the access token information, and performing renewal or overdue processing on the access token information according to the judgment result. In the embodiment of the application, the flexibility of data docking transmission can be further improved by judging the validity period of the access token. Specifically, in a specific implementation scenario, for example, the access TOKEN may be implemented in a form of a refreshable TOKEN message, in this embodiment, the TOKEN 0 message is generated at the server. The data information is used for being transmitted to the access terminal and carrying the data information for proving the legal status of the access terminal when the access terminal initiates a data docking transmission request each time. In a specific application scenario of this embodiment, the TOKEN information is renewed in the form of an interface, and meanwhile, the server may also discard the TOKEN information after expiration, which is not described herein again.
The embodiment of the application provides a data docking transmission method, which comprises the steps of sending a public key and a private key paired based on a domestic encryption algorithm and access token information to an access terminal, and receiving a data docking request generated by the access terminal according to the public key and the access token; and identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to the identification result. According to the data transmission docking method disclosed by the application, the traditional login authentication mode based on the user name and the password is replaced by issuing management of the access token, and the domestic encryption algorithm is used for providing guarantee for data transmission, so that the safety of data docking transmission between the public security management information system and different special line systems is effectively improved.
Example II,
An embodiment of the present application further provides another data docking transmission method, as shown in fig. 2, fig. 2 is a flowchart of another data docking transmission method provided in the embodiment of the present application, where the data docking transmission method is applied to an access end, and includes:
s201, receiving a public key and access token information in a key pair generated based on a domestic encryption algorithm and issued by a server.
Specifically, in an implementation manner of the embodiment of the present application, the access TOKEN information is implemented by displaying refreshable TOKEN information, and the generated refreshable TOKEN information is used as the access TOKEN information, so that the security and the convenience of the generated access TOKEN information can be significantly improved.
S202, generating a docking request by utilizing the public key and the access token information.
Specifically, in the embodiment of the present application, the obtained public key and the access token are used to generate a corresponding docking request, where the docking request may include related information such as a system identifier or other identifiers used for indicating the identity of a system user in a docking station, so as to ensure the integrity and security of information included in the generated docking request.
S203, sending the docking request to a server to perform data docking transmission according to the result of the server identifying the docking request by using the private key in the public key pair and the access token information.
The data docking transmission is performed according to the result of the server side identifying the docking request by using the private key in the public key pair and the access token information, and includes: determining a data docking interface according to the identification processing result; and establishing a docking channel between the access end and the service end according to the docking interface so as to perform data docking transmission. In the embodiment of the application, a data transmission channel is established through the determined docking interface to perform communication docking between systems and subsequent data transmission, so that the accuracy of direct docking of the systems and the safety of data transmission are improved.
According to the data docking transmission method provided by the embodiment of the application, a public key and access token information in a key pair generated based on a domestic encryption algorithm issued by a server are received, a docking request is generated by using the public key and the access token information, the docking request is sent to the server, and data docking transmission is performed according to the result of identification processing of the docking request by using a private key in the public key pair and the access token information by the server. The traditional login authentication mode based on the user name and the password is replaced by the access token issued by the receiving server, and the domestic encryption algorithm is used for providing guarantee for data transmission, so that the safety of data butt joint transmission between the public security management information system and different special systems is effectively improved.
Example III,
An embodiment of the present application further provides a data docking transmission device, as shown in fig. 3, fig. 3 is a schematic structural diagram of a data docking transmission device 30 provided in the embodiment of the present application, where the data docking transmission device 30 includes:
a generating module 301, configured to generate a public key and a private key paired based on a domestic encryption algorithm, and access token information;
a sending module 302, configured to send the public key and the access token information to an access end;
a receiving module 303, configured to receive a data docking request generated by the access terminal according to the public key and the access token;
and the docking module 304 is configured to perform identification processing on the data docking request according to the private key and the access token information, and perform data docking transmission according to a result of the identification processing.
Optionally, in an embodiment of the present application, the docking module 304 is further configured to:
decrypting the data docking request according to the private key to obtain a decryption result;
identifying and detecting the decryption result according to the access token to obtain an identification result;
determining a docking interface according to the identification result;
and carrying out data docking transmission according to the docking interface.
Optionally, the docking module 304 is further configured to:
analyzing the decrypted docking request to acquire access token information of the docking request;
and matching the access token information of the docking request according to the access token analysis, and determining the matching result as the result of the identification detection.
Optionally, in an implementation manner of the embodiment of the present application, the data docking transmission device further includes a determining module (not shown in the drawings), where the determining module is configured to:
judging the validity period of the access token information;
and according to the judgment result, carrying out renewal or overdue processing on the access token information.
Optionally, in an embodiment of the present application, the docking interface is an HTTP interface.
As shown in fig. 4, fig. 4 is a schematic structural diagram of another data docking transmission device 40 provided in an embodiment of the present application, where the data docking transmission device 40 includes:
an obtaining module 401, configured to receive a public key and access token information in a key pair generated based on a domestic encryption algorithm and issued by a server;
an application module 402, configured to generate a docking request using the public key and the access token information;
a transmission module 403, configured to send the docking request to a server, so as to perform data docking transmission according to a result that the server uses the private key in the public key pair and the access token information to identify the docking request.
Optionally, in an embodiment of the present application, the transmission module 403 is further configured to:
determining a data docking interface according to the identification processing result;
and establishing a docking channel between the access end and the service end according to the docking interface so as to perform data docking transmission.
Example four,
The embodiment of the present application further provides a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements any one of the data docking transmission methods described in the first embodiment or the second embodiment of the present application.
An embodiment of the present application further provides an electronic device, as shown in fig. 5, fig. 5 is a schematic structural diagram of the electronic device provided in the embodiment of the present application, and the electronic device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein:
the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508.
A communication interface 504 for communicating with other electronic devices or servers.
The processor 502 is configured to execute the program 510, and may specifically execute the relevant steps in the above-described check code generation method embodiment.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an application Specific Integrated circuit asic, or one or more Integrated circuits configured to implement embodiments of the present application. The intelligent device comprises one or more processors which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 510 may specifically be used to cause the processor 502 to perform the following operations:
in an alternative embodiment, the program 510 is also for causing the processor 502 to be at
For specific implementation of each step in the program 510, reference may be made to corresponding steps and corresponding descriptions in units in the foregoing embodiments of the check code generation method, which are not described herein again. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described devices and modules may refer to the corresponding process descriptions in the foregoing method embodiments, and are not described herein again.
In addition, the data interfacing transmission method of the present embodiment may be executed by any suitable electronic device with data processing capability, including but not limited to: server, mobile terminal (such as mobile phone, PAD, etc.), PC, etc.
The deadlock processing apparatus of this embodiment is used to implement the corresponding deadlock processing method in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, which are not described herein again. In addition, the functional implementation of each module in the deadlock processing apparatus of this embodiment can refer to the description of the corresponding part in the foregoing method embodiment, and is not described herein again.
Thus, particular embodiments of the present subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may be advantageous.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, AtmelAT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular transactions or implement particular abstract data types. The application may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (11)

1. A data docking transmission method is applied to a server side, and is characterized by comprising the following steps:
a public key and a private key which are paired based on a domestic encryption algorithm, and access token information;
sending the public key and the access token information to an access terminal;
receiving a data docking request generated by the access terminal according to the public key and the access token;
and identifying the data docking request according to the private key and the access token information, and performing data docking transmission according to the identification result.
2. The data docking transmission method according to claim 1, wherein the identifying process is performed on the data docking request according to the private key and the access token information, and the data docking transmission is performed according to a result of the identifying process, and the method includes:
decrypting the data docking request according to the private key to obtain a decryption result;
identifying and detecting the decryption result according to the access token to obtain an identification result;
determining a docking interface according to the identification result;
and carrying out data docking transmission according to the docking interface.
3. The data docking transmission method according to claim 2, wherein the performing identification detection on the decryption result according to the access token to obtain an identification result includes:
analyzing the decrypted docking request to acquire access token information of the docking request;
and matching the access token information of the docking request according to the access token analysis, and determining the matching result as the result of the identification detection.
4. The data docking transmission method of claim 3, further comprising:
judging the validity period of the access token information;
and according to the judgment result, carrying out renewal or overdue processing on the access token information.
5. The data docking transmission method of claim 2, wherein the docking interface is an HTTP interface.
6. A data docking transmission method is applied to an access end, and is characterized by comprising the following steps:
receiving a public key and access token information in a key pair generated based on a domestic encryption algorithm and issued by a server;
generating a docking request by using the public key and the access token information;
and sending the docking request to a server to perform data docking transmission according to a result of the server identifying the docking request by using a private key in the public key pair and the access token information.
7. The data docking transmission method according to claim 6, wherein the performing data docking transmission according to a result of the server recognizing the docking request by using the private key in the public key pair and the access token information includes:
determining a data docking interface according to the identification processing result;
and establishing a docking channel between the access end and the service end according to the docking interface so as to perform data docking transmission.
8. A data interfacing transmission apparatus, comprising:
the generation module is used for generating a public key and a private key which are paired based on a domestic encryption algorithm and access token information;
the sending module is used for sending the public key and the access token information to an access end;
the receiving module is used for receiving a data docking request generated by the access terminal according to the public key and the access token;
and the docking module is used for identifying the data docking request according to the private key and the access token information and performing data docking transmission according to the identification result.
9. A data interfacing transmission apparatus, comprising:
the acquisition module is used for receiving a public key and access token information in a key pair generated based on a domestic encryption algorithm and issued by a server;
the application module is used for generating a docking request by utilizing the public key and the access token information;
and the transmission module is used for sending the docking request to a server so as to perform data docking transmission according to the result of the identification processing on the docking request by the server by using the private key in the public key pair and the access token information.
10. A computer storage medium, on which a computer program is stored which, when being executed by a processor, carries out a data docking transmission method according to any one of claims 1 to 7.
11. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the data docking transmission method according to any one of claims 1-7.
CN202111566807.8A 2021-12-20 2021-12-20 Data docking transmission method and device and storage medium Pending CN114257448A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111566807.8A CN114257448A (en) 2021-12-20 2021-12-20 Data docking transmission method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111566807.8A CN114257448A (en) 2021-12-20 2021-12-20 Data docking transmission method and device and storage medium

Publications (1)

Publication Number Publication Date
CN114257448A true CN114257448A (en) 2022-03-29

Family

ID=80793392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111566807.8A Pending CN114257448A (en) 2021-12-20 2021-12-20 Data docking transmission method and device and storage medium

Country Status (1)

Country Link
CN (1) CN114257448A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6310888B1 (en) * 1997-12-30 2001-10-30 Iwork Software, Llc System and method for communicating data
US20190213587A1 (en) * 2018-01-11 2019-07-11 Early Warning Services, Llc Systems and methods for responsive data transfer and anonymizing data using tokenizing and encrypting
US20200285652A1 (en) * 2019-03-06 2020-09-10 Sap Se Elastic in-memory database provisioning on database-as-a-service
CN112261002A (en) * 2020-09-25 2021-01-22 山东浪潮通软信息科技有限公司 Data interface docking method and device
CN113225352A (en) * 2021-05-28 2021-08-06 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6310888B1 (en) * 1997-12-30 2001-10-30 Iwork Software, Llc System and method for communicating data
US20190213587A1 (en) * 2018-01-11 2019-07-11 Early Warning Services, Llc Systems and methods for responsive data transfer and anonymizing data using tokenizing and encrypting
US20200285652A1 (en) * 2019-03-06 2020-09-10 Sap Se Elastic in-memory database provisioning on database-as-a-service
CN112261002A (en) * 2020-09-25 2021-01-22 山东浪潮通软信息科技有限公司 Data interface docking method and device
CN113225352A (en) * 2021-05-28 2021-08-06 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108900464B (en) Electronic device, block chain-based data processing method, and computer storage medium
CN112333198B (en) Secure cross-domain login method, system and server
CN111932426B (en) Identity management method, device and equipment based on trusted hardware
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN111680305A (en) Data processing method, device and equipment based on block chain
CN111191268A (en) Storage method, device and equipment capable of verifying statement
CN104580316A (en) Software authorization management method and software authorization management system
CN114218592A (en) Sensitive data encryption and decryption method and device, computer equipment and storage medium
CN111190974B (en) Method, device and equipment for forwarding and acquiring verifiable statement
CN111669408A (en) Identity registration and authentication method and device
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
CN113239853A (en) Biological identification method, device and equipment based on privacy protection
CN112788001A (en) Data encryption-based data processing service processing method, device and equipment
CN112287376A (en) Method and device for processing private data
CN110235141B (en) Biometric feature recognition method and electronic device
CN109088872B (en) Using method and device of cloud platform with service life, electronic equipment and medium
CN114386104A (en) Method for storing sensitive data, data reading method and device
CN108566389B (en) Cross-application fingerprint identity authentication method and device
CN113282959A (en) Service data processing method and device and electronic equipment
CN113515778A (en) Multi-party privacy data fusion method and device and electronic equipment
CN109191122B (en) Method and device for acquiring transaction information certificate
CN114257448A (en) Data docking transmission method and device and storage medium
CN114363088B (en) Method and device for requesting data
CN112365264A (en) UTXO model-based hidden transaction method and device and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination