CN116980203A - Data processing method, device, terminal equipment and storage medium - Google Patents

Data processing method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN116980203A
CN116980203A CN202310940262.5A CN202310940262A CN116980203A CN 116980203 A CN116980203 A CN 116980203A CN 202310940262 A CN202310940262 A CN 202310940262A CN 116980203 A CN116980203 A CN 116980203A
Authority
CN
China
Prior art keywords
data
consumer
client
sensitive data
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310940262.5A
Other languages
Chinese (zh)
Inventor
李骁骁
李雨晨
邓锦达
马超
王平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN202310940262.5A priority Critical patent/CN116980203A/en
Publication of CN116980203A publication Critical patent/CN116980203A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a data processing method, a device, terminal equipment and a storage medium, wherein the method comprises the following steps: receiving a sensitive data consumption request initiated by a client; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. The invention ensures the safety of data and improves the resource utilization rate of data interaction.

Description

Data processing method, device, terminal equipment and storage medium
Technical Field
The present invention relates to the field of digitizing, and in particular, to a data processing method, apparatus, terminal device, and storage medium.
Background
With the deep development of enterprise digital transformation, data are transmitted by adopting a data interaction platform. Currently existing common transmission exchange components, such as FTP (File Transfer Protocol )/SFTP (Secure File Transfer Protocol, secure file transfer protocol) components and MQ (Message Queue) file transfer components, can provide a "loosely coupled" data interaction platform, so as to solve the problems of application decoupling, asynchronous Message, flow peak clipping, and the like.
However, the existing data interaction platform has the problems that the data application is not timely enough and cannot meet the requirement of efficient data interaction, after the resource application, different consumers need to allocate different queues to ensure the application safety of the data, and resource waste is easy to cause.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present application and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The application mainly aims to provide a data processing method, a device, terminal equipment and a storage medium, and aims to solve the problems of low real-time performance, safety and resource utilization rate of data interaction between systems.
To achieve the above object, the present application provides a data processing method, including:
Receiving a sensitive data consumption request initiated by a client;
generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier;
receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request;
encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data.
Optionally, the step of receiving the sensitive data consumption request initiated by the client further includes:
judging whether the sensitive data consumption request is compliant or not;
if the sensitive data consumption request is compliant, executing the steps of: and generating a secret key and consumer information according to the sensitive data consumption request and sending the secret key and the consumer information to a client.
Optionally, the step of generating a key and consumer information according to the sensitive data consumption request and sending the key and consumer information to the client comprises:
Generating a secret key through a preset symmetric encryption algorithm according to the sensitive data consumption request;
and generating the consumer information according to the sensitive data consumption request, and sending the secret key and the consumer information to a client.
Optionally, the step of receiving, through a preset public resource, a real-time verification request sent by the client, and querying a key corresponding to a consumer identifier in the real-time verification request includes:
receiving a real-time verification request sent by the client through a verification queue in the public resource;
and inquiring a key corresponding to the consumer identification in the real-time verification request.
Optionally, the step of encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through the public resource, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, so that the consumer consumes the decrypted sensitive data includes:
encrypting sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key;
Generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue of the public resource;
and sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to a key corresponding to the consumer identifier in the data message, and the consumer consumes the decrypted sensitive data.
Optionally, the step of generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue in the common resource further includes:
and confirming that the data message is successfully sent according to a data confirmation protocol.
Optionally, the step of sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message, so that the consumer consumes the decrypted sensitive data includes:
Sending the data message to the client through the data transmission queue so that the client judges whether the consumer identifier corresponding to the sensitive data encrypted in the data message is the same as the consumer identifier corresponding to the consumer;
and if the consumer identifier corresponding to the encrypted sensitive data is the same as the consumer identifier corresponding to the consumer, the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message so as to enable the consumer to consume the decrypted sensitive data.
Optionally, the step of sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message, so that the consumer consumes the decrypted sensitive data further includes:
and confirming the successful consumption of the decrypted sensitive data according to a data confirmation protocol.
The embodiment of the application also provides a data processing device, which comprises:
the request receiving module is used for receiving a sensitive data consumption request initiated by a client;
The request sending module is used for generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to the client, wherein the consumer information comprises a consumer identifier;
the request verification module is used for receiving a real-time verification request sent by the client through a preset public resource and inquiring a key corresponding to a consumer identifier in the real-time verification request;
and the data encryption consumption module is used for encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through the public resource so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier to consume the decrypted sensitive data by the consumer.
The embodiment of the application also provides a terminal device, which comprises a memory, a processor and a data processing program stored on the memory and capable of running on the processor, wherein the data processing program realizes the steps of the data processing method when being executed by the processor.
The embodiment of the application also provides a computer readable storage medium, wherein a data processing program is stored on the computer readable storage medium, and the data processing program realizes the steps of the data processing method when being executed by a processor.
The data processing method, the device, the terminal equipment and the storage medium provided by the embodiment of the application receive a sensitive data consumption request initiated by a client; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. The scheme provides the public resource and the independent key pair for data sharing, encrypts and decrypts the data and transmits the data in real time, improves the utilization rate of the data interaction platform resource on the premise of ensuring the data security, simultaneously ensures the timeliness of data delivery, and protects the privacy of the subscription data of the interaction platform consumers.
Drawings
FIG. 1 is a schematic diagram of functional modules of a terminal device to which a data processing apparatus of the present application belongs;
FIG. 2 is a flow chart of a first exemplary embodiment of a data processing method according to the present application;
FIG. 3 is a flow chart of a second exemplary embodiment of a data processing method of the present application;
FIG. 4 is a flow chart of a third exemplary embodiment of a data processing method according to the present application;
FIG. 5 is a flow chart of a fourth exemplary embodiment of a data processing method according to the present application;
FIG. 6 is a flow chart of a fifth exemplary embodiment of a data processing method according to the present application;
FIG. 7 is a schematic overall flow chart of another exemplary embodiment of a data processing method of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The main solutions of the embodiments of the present application are: receiving a sensitive data consumption request initiated by a client; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. The scheme provides the public resource and the independent key pair for data sharing, encrypts and decrypts the data and transmits the data in real time, improves the utilization rate of the data interaction platform resource on the premise of ensuring the data security, simultaneously ensures the timeliness of data delivery, and protects the privacy of the subscription data of the interaction platform consumers.
The application relates to the technical terms:
file transfer protocol/secure file transfer protocol component: FTP (File Transfer Protocol) or SFTP (Secure File Transfer Protocol) component, an application layer protocol for file transfer between clients and servers over a computer network.
Message queue file transfer component: MQ (Message Queue) file transfer component, which is an asynchronous communication mechanism utilizing message queues, decouples file transfer and processing processes and provides reliable and efficient file transfer services.
Kafka middleware: a high performance, distributed messaging middleware provides a high throughput, low latency messaging mechanism that can be used to build real-time streaming applications and data pipes.
Message: kafka transmits data in the form of messages that are published into Kafka queues to which consumers can subscribe and receive messages.
Public resources: topic, a class label of messages, corresponds to a logical message queue. The producer sends the message to a particular queue, and the consumer subscribes to the required queue to receive the message.
Symmetric encryption algorithm: is an algorithm that generates a set of relative keys for data encryption and data decryption. In the symmetric encryption algorithm, a sender encrypts plaintext using a key, and a receiver decrypts ciphertext using a corresponding key to recover original plaintext information.
The embodiment of the application considers that the real-time performance and the resource utilization rate of the data interaction among the related technical scheme systems are low, and the safety and the data processing efficiency of the data interaction cannot be ensured.
Based on the above, the embodiment of the application provides a solution, which improves the utilization rate of the data interaction platform resources on the premise of ensuring the data security, simultaneously ensures the timeliness of data delivery and protects the privacy of the subscription data of the interaction platform consumers.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a terminal device to which a data processing apparatus of the present application belongs. The data processing means may be a device independent of the terminal device, capable of data processing, which may be carried on the terminal device in the form of hardware or software. The terminal equipment can be intelligent mobile equipment with a data processing function such as a mobile phone and a tablet personal computer, and can also be fixed terminal equipment or a server with a data processing function.
In this embodiment, the terminal device to which the data processing apparatus belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores an operating system and a data processing program, and the data processing apparatus may store the received and processed data information in the memory 130; the output module 110 may be a display screen, a speaker, etc. The communication module 140 may include a WIFI module, a mobile communication module, a bluetooth module, and the like, and communicates with an external device or a server through the communication module 140.
Wherein the data processing program in the memory 130 when executed by the processor performs the steps of:
receiving a sensitive data consumption request initiated by a client;
generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier;
receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request;
encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
judging whether the sensitive data consumption request is compliant or not;
if the sensitive data consumption request is compliant, executing the steps of: and generating a secret key and consumer information according to the sensitive data consumption request and sending the secret key and the consumer information to a client.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
generating a secret key through a preset symmetric encryption algorithm according to the sensitive data consumption request;
and generating the consumer information according to the sensitive data consumption request, and sending the secret key and the consumer information to a client.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
receiving a real-time verification request sent by the client through a verification queue in the public resource;
and inquiring a key corresponding to the consumer identification in the real-time verification request.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
encrypting sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key;
generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue of the public resource;
and sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to a key corresponding to the consumer identifier in the data message, and the consumer consumes the decrypted sensitive data.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
and confirming that the data message is successfully sent according to a data confirmation protocol.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
sending the data message to the client through the data transmission queue so that the client judges whether the consumer identifier corresponding to the sensitive data encrypted in the data message is the same as the consumer identifier corresponding to the consumer;
and if the consumer identifier corresponding to the encrypted sensitive data is the same as the consumer identifier corresponding to the consumer, the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message so as to enable the consumer to consume the decrypted sensitive data.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
and confirming the successful consumption of the decrypted sensitive data according to a data confirmation protocol.
According to the scheme, the sensitive data consumption request initiated by the client is received; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. The scheme provides the public resource and the independent key pair for data sharing, encrypts and decrypts the data and transmits the data in real time, improves the utilization rate of the data interaction platform resource on the premise of ensuring the data security, simultaneously ensures the timeliness of data delivery, and protects the privacy of the subscription data of the interaction platform consumers.
The method embodiment of the application is proposed based on the above-mentioned terminal equipment architecture but not limited to the above-mentioned architecture.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first exemplary embodiment of a data processing method according to the present application. The data processing method comprises the following steps:
step S10: receiving a sensitive data consumption request initiated by a client;
in order to acquire or process information containing sensitive data to meet specific requirements or business objectives, a request initiated by a client to consume the sensitive data is received. Through the data consumption request, the client can acquire the appointed sensitive data to carry out subsequent consumption operation.
The specific implementation manner of processing the sensitive data consumption request in the actual application scenario may vary according to the system design and security requirements. In practical applications, in order to protect the security of sensitive data, measures such as encryption, access control, audit and the like may be involved.
Step S20: generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises an account number password, a public resource index and a consumer identifier;
and generating a key and corresponding consumer information according to the sensitive data consumption request and sending the key and the corresponding consumer information to the client.
After receiving the sensitive data consumption request initiated by the client, the consumer can connect with the Kafka server according to the account password returned by the server to ensure that only legal consumers can acquire the sensitive data. The public resource is a queue for carrying out data sharing in Kafka, is used for subscribing different types of data by a consumer, can avoid repeated allocation of the queue for multiple times under the condition of large data flow of the queue, and causes resource waste, and the public resource index is an index for subscribing specific public resources according to the requirements of the consumer. The consumer identification is a unique identifier that identifies and tracks the consumer's request and data usage.
In particular, a set of key pairs may be generated when processing sensitive data consumption requests. The key pair is a character generated according to an encryption algorithm for encrypting and decrypting sensitive data. The purpose of generating the key pair is to ensure confidentiality and integrity of the data during transmission and storage. The key correspondence should be sufficiently complex and secure to prevent unauthorized access and hacking.
Step S30: receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request;
in order to inform the server that the data consumption preparation is completed, after the data transmission channel is constructed, the client sends a verification request to the public resource, and the system inquires a key corresponding to the consumer identification in the real-time verification request.
Wherein the authentication request may contain information such as the consumer's system identification, other necessary authentication parameters, etc. After receiving the verification request, the server can verify the request, so that only legal and verified consumers can receive the data message sent by the server, and consume the sensitive data.
Step S40: encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data.
In order to protect the security and the data consumption of the sensitive data, a consumer identifier is used for acquiring a corresponding key, the sensitive data is encrypted by using the consumer identifier and the acquired key, the encrypted sensitive data is sent to a client through a public resource, after the client receives the encrypted sensitive data, the client decrypts the encrypted sensitive data by using the corresponding key, and the decrypted sensitive data can be used by consumers.
Wherein, by encrypting the sensitive data, unauthorized visitors can be prevented from acquiring the plaintext data. Even if the data is intercepted during transmission, it is impossible to decrypt and use the sensitive data. The client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, which is equivalent to the access authority of the data, and only the authorized user can access and use the data, so that the sensitive data of the consumer is ensured to be protected in the transmission and processing process, and the decrypted sensitive data can be made into corresponding business processing logic according to specific requirements. In general, a secure mechanism is provided to protect the security of sensitive data during transmission and processing, while ensuring that only authorized users can access and use the data.
According to the scheme, the sensitive data consumption request initiated by the client is received; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises an account number password, a public resource index and a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. On the premise of ensuring data safety, the utilization rate of the data interaction platform resources is improved, the timeliness of data delivery is ensured, and the privacy of the subscription data of the interaction platform consumers is protected.
Referring to fig. 3, fig. 3 is a flowchart illustrating a metadata storage management method according to a second exemplary embodiment of the present application.
Based on the first embodiment, a second embodiment of the present application is proposed, which differs from the first embodiment in that:
in this embodiment, the step of receiving the sensitive data consumption request initiated by the client further includes:
step S101: judging whether the sensitive data consumption request is compliant or not;
step S102: if the sensitive data consumption request is compliant, executing the steps of: and generating a secret key and consumer information according to the sensitive data consumption request and sending the secret key and the consumer information to a client.
Specifically, firstly, a client initiates a request, submits an application for consuming sensitive data order, a server receives the request and judges whether the request of the client is compliant, if the request is refused, the flow is ended;
then, after the server receives the request, if the client agrees to the consumption application, the next step is executed.
And judging whether the sensitive data consumption request of the client is compliant or not for verifying the identity and the authority of the client. Ensuring that only authorized clients can initiate sensitive data consumption requests can be achieved through the use of authentication and authorization mechanisms (e.g., tokens, API keys, etc.).
Wherein the compliance of the request may be checked based on defined compliance rules. Such as checking whether the sensitive data consumption request meets the prescribed access rights, whether the sensitive data protection requirements are met, etc. If not, the request may be denied or marked as non-compliance. In addition, sensitive data may be classified and tagged, and information concerning the type, purpose, timeliness, etc. of the data involved in the sensitive data consumption request may be checked to determine the sensitivity level and access restriction of each data item.
According to the scheme, whether the sensitive data consumption request is compliant or not is judged; if the sensitive data consumption request is compliant, executing the steps of: and generating a secret key and consumer information according to the sensitive data consumption request and sending the secret key and the consumer information to a client. The method and the device ensure compliance of the client request and user privacy protection, provide an authorization management mechanism and ensure validity and safety of sensitive data in the use process.
Referring to fig. 4, fig. 4 is a flowchart illustrating a metadata storage management method according to a third exemplary embodiment of the present application.
Based on the second embodiment, a third embodiment of the present application is proposed, which differs from the second embodiment in that:
In this embodiment, the step of generating the key and the consumer information according to the sensitive data consumption request and sending the key and the consumer information to the client includes:
step S201: generating a secret key through a preset symmetric encryption algorithm according to the sensitive data consumption request;
step S202: and generating the consumer information according to the sensitive data consumption request, and sending the secret key and the consumer information to a client.
Specifically, firstly, according to a sensitive data consumption request sent by a client, a preset symmetric encryption algorithm is used for generating encryption and decryption of a data key. The symmetric encryption algorithm may be an AES symmetric encryption algorithm, wherein a secure random number generator is used to generate a key pair for data encryption and data decryption. However, the symmetric encryption and decryption scheme in the data transmission process is not limited to the AES symmetric encryption algorithm, and the encryption and decryption scheme above may be replaced.
And finally, generating consumer information according to the sensitive data consumption request, and sending the generated key and the consumer information to the client. The generated secret key and the consumer information can be packaged into a message body, the packaged message body is sent to the client, and the message can be sent to the client in a network transmission mode.
More specifically, the key PK is generated according to a symmetric encryption algorithm, and Kafka consumer information (account password, data_topic, verification topic, consumer identification (S)) is transmitted to the client together, wherein both the data transmission topic and the verification topic are common resources (topic) for data sharing by the Kafka service.
At this time, the server establishes a channel for transmitting real-time data to the downstream consumer:
a) Account number password: the downstream system needs to be connected with the kafka server according to the account number password of the consumer;
b) After formally starting monitoring, the server side sends data needed by downstream to the data_topic for downstream monitoring consumption, and the downstream has only consumer rights;
c) After the downstream system prepares the environment, sending a verification message to the check_topic to inform the downstream of the preparation before consumption of the server and the downstream of the producer permission;
d) Consumer system identification (S): the server side distributes system identification for downstream system, which is used to manage the affiliated system of message.
The key is generated by using a preset symmetric encryption algorithm on the sensitive data, and the key is transmitted to the client, so that only the client with the correct key can decrypt and access the sensitive data. Thus, confidentiality of data can be effectively protected, and unauthorized persons can be prevented from acquiring and reading sensitive data.
The consumer is connected with the Kafka server by using the account number and password, and data can be transmitted among the server, the public resource, the client and the consumer. Data transmission between the consumer and the server may be via a network, the consumer subscribes to one or more queues, the server will transmit messages to the consumer according to the subscribed queues, and the consumer receives message data from the server via the network using a network communication protocol (e.g., TCP/IP).
By generating consumer information and sending it to the client, the identity of the client can be verified and confirmed to have the corresponding rights to access and consume sensitive data. In this way, only clients with authorized connections can be ensured to receive and process sensitive data, and the security of the data and the compliance of client consumption are enhanced.
According to the scheme, the secret key is generated through a preset symmetric encryption algorithm according to the sensitive data consumption request; and generating the consumer information according to the sensitive data consumption request, and sending the secret key and the consumer information to a client. By generating the key and sending the consumer information, the connection between the consumer and the server is realized, so that the protection of sensitive data, the authentication and authorization of the client and the safe data transmission are realized, and the safety of the data is improved.
Referring to fig. 5, fig. 5 is a flowchart illustrating a metadata storage management method according to a fourth exemplary embodiment of the present application.
Based on the first embodiment, a fourth embodiment of the present application is proposed, which differs from the first embodiment in that:
in this embodiment, the step of receiving, through a preset public resource, a real-time verification request sent by the client, and querying a key corresponding to a consumer identifier in the real-time verification request includes:
step S301: receiving a real-time verification request sent by the client through a verification queue in the public resource;
step S302: and inquiring a key corresponding to the consumer identification in the real-time verification request.
Specifically, first, a real-time authentication request sent by a client is received through an authentication queue in a common resource.
And finally, inquiring a key corresponding to the consumer identification in the real-time verification request according to the system.
More specifically, first, after the client finishes the system docking preparation, the client sends a verification message to a verification queue in the public resource to inform the server that the data consumption preparation is finished. The verification queue is a verification queue in public resources and is used for receiving real-time verification requests sent by the clients, and subscribing and receiving the real-time verification requests sent by the clients through the verification queue.
And finally, analyzing the received real-time verification request, and extracting the consumer identification. Using the consumer identification as a key, a database or cache or the like storing the keys is queried for the corresponding key. If the corresponding key is queried, the key is returned to the server for further operation.
In particular, for the storage of the key, a suitable storage mode, such as a relational database, a key value storage and the like, can be selected according to the specific situation. Secure communication protocols and encryption schemes may be used in querying the key to secure the transmission of the key.
According to the scheme, the real-time verification request sent by the client is received through the verification queue in the public resource; and inquiring a key corresponding to the consumer identification in the real-time verification request. By using a queue and message mechanism, real-time communication between the client and the server is possible. After the client sends the verification request, the server can timely receive and respond to the verification request, and real-time data interaction is realized.
Referring to fig. 6, fig. 6 is a flowchart illustrating a metadata storage management method according to a fifth exemplary embodiment of the present application.
Based on the fourth embodiment, a fifth embodiment of the present application is proposed, which differs from the fourth embodiment in that:
In this embodiment, the step of encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through the public resource, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, so that the consumer consumes the decrypted sensitive data includes:
step S401: encrypting sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key;
step S402: generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue of the public resource;
step S403: and sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to a key corresponding to the consumer identifier in the data message, and the consumer consumes the decrypted sensitive data.
Specifically, firstly, sensitive data is encrypted according to a consumer identifier and a corresponding key, wherein the data encryption by using the key generated by a symmetric encryption algorithm can convert the sensitive data into an encrypted data form which cannot be directly read.
The encrypted sensitive data is then combined with the consumer identification to generate a data message, which is sent to a data transmission queue of the common resource. The data message comprises encrypted sensitive data and corresponding consumer identifications, and the data transmission queue is used as a transfer station for data transmission, so that the data message can be ensured to be transmitted from the server side to the client side.
And finally, after the client receives the data message, decrypting the encrypted sensitive data according to the key corresponding to the consumer identifier in the data message, wherein the decryption process uses a public key for decrypting the data corresponding to the key pair generated by the symmetric encryption algorithm, the encrypted data is restored into a data form which can be directly read, and the sensitive data obtained after decryption can be used by consumers.
By encryption and decryption, sensitive data can be protected from access or disclosure by unauthorized persons. Only clients with the corresponding keys are able to decrypt and use the data. Sensitive data is converted into an encrypted data form through an encryption algorithm, so that the security of the data is improved. Meanwhile, the client decrypts the encrypted data through the corresponding key, and restores the encrypted data into a readable data form for consumers to use.
In the real-time data transmission scene based on kafka, the method greatly improves the utilization rate of kafka resources on the premise of guaranteeing the safety of sensitive data. And meanwhile, timeliness of data delivery is guaranteed, and privacy of respective subscription data of consumers is protected.
Further, in this embodiment, the step of generating a data message by combining the encrypted sensitive data with the consumer identifier, and sending the data message to a data transmission queue in the common resource further includes:
step S4021: and confirming that the data message is successfully sent according to a data confirmation protocol.
Specifically, after the data is successfully transmitted to the data transmission queue of the public resource, the successful data transmission is confirmed according to the data confirmation protocol.
Wherein, by using the Kafka data confirmation protocol to confirm that the data uploading is successful, the reliability and consistency of the data in the transmitting process can be ensured. As a data confirmation mechanism, the method can help a sender monitor whether the message successfully arrives in a corresponding queue in the Kafka service, and the message is processed according to the need, so that repeated data transmission is avoided, and platform resources are wasted.
Further, in this embodiment, the step of sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message, so that the consumer consumes the decrypted sensitive data includes:
step S4031: sending the data message to the client through the data transmission queue so that the client judges whether the consumer identifier corresponding to the sensitive data encrypted in the data message is the same as the consumer identifier corresponding to the consumer;
step S4032: and if the consumer identifier corresponding to the encrypted sensitive data is the same as the consumer identifier corresponding to the consumer, the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message so as to enable the consumer to consume the decrypted sensitive data.
In particular, to confirm whether the sensitive data belongs to the consumer,
firstly, the data message is sent to the client through the data transmission queue, and the client judges the consumer identification corresponding to the sensitive data encrypted in the data message and the consumer identification corresponding to the consumer.
And finally, if the consumer identifier corresponding to the encrypted sensitive data in the data message is the same as the consumer identifier corresponding to the consumer, the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message so as to enable the consumer to consume the decrypted sensitive data. And if the consumer identifier corresponding to the encrypted sensitive data in the data message is the same as the consumer identifier corresponding to the consumer, the encrypted and assembled sensitive data belongs to the consumer, and the data can be continuously decrypted and consumed. If the consumer identifier corresponding to the encrypted sensitive data in the data message is not the same as the consumer identifier corresponding to the consumer, the encrypted and assembled sensitive data is not the consumer, and the consumer has no authority to access or decrypt the data.
It should be noted that, in order to ensure the security of sensitive data processing, each system can only consume the data subscribed by each system and cannot acquire the data information subscribed by other systems, so that the privacy security in the data application process can be ensured.
Further, as an implementation manner, the step of sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message, so that the consumer consumes the decrypted sensitive data further includes:
Step S4033: and confirming the successful consumption of the decrypted sensitive data according to a data confirmation protocol.
Wherein, after successfully consuming the decrypted sensitive data, the consumer sends a confirmation message to the producer or the related party according to the specification of the data confirmation protocol. The confirmation message may contain some metadata such as consumer identification, message identifier, etc. for the producer to confirm and track. By using a data validation protocol, it can be ensured whether the decrypted sensitive data is successfully consumed. If a confirmation message is received, indicating that the decrypted sensitive data has been successfully consumed; otherwise, operations such as retry, error log recording and the like can be performed according to specific conditions. The sending and processing of the confirmation message can provide a reliable confirmation mechanism, so that the producer can acquire the consumption state in time and process correspondingly. This helps to improve the reliability and consistency of the data transfer and ensures that the sensitive data is correctly used after being decrypted and that subsequent data processing is performed after confirming that the data is consumed.
More specifically, the following details the steps of decrypting and consuming data for data encryption and data monitoring:
firstly, the server side prepares to send a data message according to the verification request of the subscriber, wherein the consumer identification S corresponding to the consumer is required to be definitely determined in the message, and the consumer code is not required to be encrypted. Sensitive data information is encrypted by a key according to a key PK established with the consumer system. Transmitting the assembled data to a public topic, and confirming that the data uploading is successful according to the ack protocol of kafka, namely a data confirmation protocol;
The second step, downstream consumer monitors the message in public topic, analyze after receiving the message, judge whether consumer label S is equal to consumer label that is distributed while establishing connection with server, if not, discard this piece of data, need not to process;
thirdly, if the consumer identification in the message is equal to the consumer identification allocated when the connection is established with the server, the piece of data belongs to the current consumer, sensitive data is required to be decrypted by using the corresponding public key, corresponding processing work is normally completed, and then the completion of consumption is confirmed according to an ack mechanism in kafka;
and fourthly, after the consumer mode of the producer is established, namely the consumer system is connected with the kafka system, the kafka system automatically pushes data needed by all downstream systems into a common topic of the kafka in real time, downstream monitoring consumption is continuously repeated, and a real-time monitoring consumption flow is established.
In sum, based on the real-time application of the kafka realization sensitive data, the scheme of sharing the topic and independent key pairs is provided, so that the utilization rate of topic resources is greatly improved, and the cost of independently and repeatedly constructing the topic for each system is reduced.
According to the scheme, the sensitive data corresponding to the consumer identification is encrypted according to the consumer identification and the corresponding secret key; generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue of the public resource; and sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to a key corresponding to the consumer identifier in the data message, and the consumer consumes the decrypted sensitive data. Through the encryption and decryption process of the sensitive data and the data confirmation mechanism, the verified client can decrypt the data, so that the protection and the safe transmission of the sensitive data are realized, and the privacy and the integrity of the sensitive data are ensured.
As another exemplary embodiment, the present embodiment realizes real-time sharing of sensitive data based on kafka, and a flow of a data processing method realized by a data processing apparatus is as shown in fig. 7:
the client initiates a subscription request of the consumption sensitive data, the server judges the request after receiving the request, and if the request is not compliant, the process is ended. If the request is compliant, the server generates a key and information of the consumer according to a symmetric encryption algorithm. The key and the consumer information are sent to the client to realize the connection between the consumer system and the kafka server. The client sends a notification to the ready topic, and the server is notified that the client is ready to complete, and waits for the data to be sent for consumption. The server receives the notification, starts the task that the data is ready to be sent to the client, inquires the key corresponding to the data, encrypts the sensitive data according to the key, and fills the sensitive data and the consumer system identifier into the data message body. And sending the sensitive data to a public topic, namely, a data transmission topic, and confirming the sending of the sensitive data by using an ack mechanism. The client monitors the sensitive data of the public topic in real time, judges whether the sensitive data needs to be processed according to the system identification, if so, decrypts the sensitive data according to the public key corresponding to the secret key, and finishes the data consumption processing as required. Finally, the kafka sensitive data consumption is informed according to the ack mechanism.
The method comprises the steps of guaranteeing safe delivery of data and simultaneously greatly improving the effective utilization rate of platform resources (topic); an upstream real-time butt joint channel and a downstream real-time butt joint channel are established through kafka, so that timeliness of data delivery is guaranteed, and data processing efficiency in a full-link flow is greatly improved; the security of sensitive data processing is ensured, each system can only consume and use the data subscribed by each system and cannot acquire the data information subscribed by other systems; privacy security in the data application process can be guaranteed.
According to the scheme, the sensitive data consumption request initiated by the client is received; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises an account number password, a public resource index and a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. The scheme provides the public resource and the independent key pair for data sharing, encrypts and decrypts the data and transmits the data in real time, improves the utilization rate of the data interaction platform resource on the premise of ensuring the data security, simultaneously ensures the timeliness of data delivery, and protects the privacy of the subscription data of the interaction platform consumers.
In addition, an embodiment of the present application further provides a data processing apparatus, where the data processing apparatus includes:
the request receiving module is used for receiving a sensitive data consumption request initiated by a client;
the request sending module is used for generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to the client, wherein the consumer information comprises a consumer identifier;
the request verification module is used for receiving a real-time verification request sent by the client through a preset public resource and inquiring a key corresponding to a consumer identifier in the real-time verification request;
and the data encryption consumption module is used for encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through the public resource so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier to consume the decrypted sensitive data by the consumer.
The principle and implementation process of data processing are implemented in this embodiment, please refer to the above embodiments, and are not repeated here.
In addition, the embodiment of the application also provides a terminal device, which comprises a memory, a processor and a data processing program stored on the memory and capable of running on the processor, wherein the data processing program realizes the steps of the data processing method when being executed by the processor.
Because the data processing program is executed by the processor and adopts all the technical schemes of all the embodiments, the data processing program at least has all the beneficial effects brought by all the technical schemes of all the embodiments and is not described in detail herein.
Furthermore, an embodiment of the present application also proposes a computer-readable storage medium having stored thereon a data processing program which, when executed by a processor, implements the steps of the data processing method as described above.
Because the data processing program is executed by the processor and adopts all the technical schemes of all the embodiments, the data processing program at least has all the beneficial effects brought by all the technical schemes of all the embodiments and is not described in detail herein.
Compared with the prior art, the data processing method, the device, the terminal equipment and the storage medium provided by the embodiment of the application receive the sensitive data consumption request initiated by the client; generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier; receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request; encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data. The scheme is based on Kafka to complete real-time data sharing delivery, effectively solves the problems that the real-time performance and the resource utilization rate of data interaction between systems are low, and the safety and the data processing efficiency of the data interaction cannot be guaranteed, improves the utilization rate of the data interaction platform resources on the premise of guaranteeing the data safety, guarantees the timeliness of the data delivery, and protects the privacy of the subscription data of consumers of the interaction platform.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (11)

1. A data processing method, characterized in that the data processing method comprises the steps of:
receiving a sensitive data consumption request initiated by a client;
generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to a client, wherein the consumer information comprises a consumer identifier;
receiving a real-time verification request sent by the client through a preset public resource, and inquiring a key corresponding to a consumer identifier in the real-time verification request;
encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through public resources, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, and the consumer consumes the decrypted sensitive data.
2. The data processing method of claim 1, wherein the step of receiving a client-initiated sensitive data consumption request is followed by:
judging whether the sensitive data consumption request is compliant or not;
if the sensitive data consumption request is compliant, executing the steps of: and generating a secret key and consumer information according to the sensitive data consumption request and sending the secret key and the consumer information to a client.
3. The data processing method of claim 2, wherein the step of generating a key and consumer information from the sensitive data consumption request and transmitting to a client comprises:
generating a secret key through a preset symmetric encryption algorithm according to the sensitive data consumption request;
and generating the consumer information according to the sensitive data consumption request, and sending the secret key and the consumer information to a client.
4. The data processing method as claimed in claim 1, wherein the step of receiving a real-time authentication request sent by the client through a preset public resource, and querying a key corresponding to a consumer identifier in the real-time authentication request includes:
receiving a real-time verification request sent by the client through a verification queue in the public resource;
And inquiring a key corresponding to the consumer identification in the real-time verification request.
5. The data processing method as claimed in claim 4, wherein the step of encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and transmitting the encrypted sensitive data to the client through the public resource, so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier, so that the consumer consumes the decrypted sensitive data includes:
encrypting sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key;
generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue of the public resource;
and sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to a key corresponding to the consumer identifier in the data message, and the consumer consumes the decrypted sensitive data.
6. The data processing method of claim 5, wherein the step of generating a data message by combining the encrypted sensitive data with the consumer identification, and sending the data message to a data transmission queue in the common resource further comprises:
and confirming that the data message is successfully sent according to a data confirmation protocol.
7. The data processing method according to claim 5, wherein the step of sending the data message to the client through the data transmission queue, so that the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message, so that the consumer consumes the decrypted sensitive data includes:
sending the data message to the client through the data transmission queue so that the client judges whether the consumer identifier corresponding to the sensitive data encrypted in the data message is the same as the consumer identifier corresponding to the consumer;
and if the consumer identifier corresponding to the encrypted sensitive data is the same as the consumer identifier corresponding to the consumer, the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message so as to enable the consumer to consume the decrypted sensitive data.
8. The data processing method according to claim 5, wherein the step of sending the data message to the client through the data transmission queue so that the client decrypts the encrypted sensitive data in the data message according to the key corresponding to the consumer identifier in the data message, so that the consumer consumes the decrypted sensitive data further comprises:
and confirming the successful consumption of the decrypted sensitive data according to a data confirmation protocol.
9. A data processing apparatus, the apparatus comprising:
the request receiving module is used for receiving a sensitive data consumption request initiated by a client;
the request sending module is used for generating a key and consumer information according to the sensitive data consumption request and sending the key and the consumer information to the client, wherein the consumer information comprises a consumer identifier;
the request verification module is used for receiving a real-time verification request sent by the client through a preset public resource and inquiring a key corresponding to a consumer identifier in the real-time verification request;
and the data encryption consumption module is used for encrypting the sensitive data corresponding to the consumer identifier according to the consumer identifier and the corresponding key, and sending the encrypted sensitive data to the client through the public resource so that the client decrypts the encrypted sensitive data according to the key corresponding to the consumer identifier to consume the decrypted sensitive data by the consumer.
10. A data processing apparatus, the apparatus comprising: memory, a processor and a data processing program stored on the memory and executable on the processor, the data processing program being configured to implement the steps of the data processing method according to any one of claims 1 to 8.
11. A storage medium having stored thereon a data processing program which, when executed by a processor, implements the steps of the data processing method according to any one of claims 1 to 8.
CN202310940262.5A 2023-07-27 2023-07-27 Data processing method, device, terminal equipment and storage medium Pending CN116980203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310940262.5A CN116980203A (en) 2023-07-27 2023-07-27 Data processing method, device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310940262.5A CN116980203A (en) 2023-07-27 2023-07-27 Data processing method, device, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116980203A true CN116980203A (en) 2023-10-31

Family

ID=88484518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310940262.5A Pending CN116980203A (en) 2023-07-27 2023-07-27 Data processing method, device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116980203A (en)

Similar Documents

Publication Publication Date Title
CN101340443B (en) Session key negotiating method, system and server in communication network
CN101510877B (en) Single-point logging-on method and system, communication apparatus
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN101103630B (en) Method and system for authorizing multimedia multicasting
CN1933393B (en) Inter-entity coupling method, apparatus and system for content protection
US7716467B1 (en) Encryption gateway service
KR20130129429A (en) Identity management method and device for mobile terminal
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN110225050B (en) JWT token management method
CN102195957A (en) Resource sharing method, device and system
CN102457507A (en) Secure sharing method, device and system for cloud computing resources
CN102638459A (en) Authentication information transmission system, authentication information transmission service platform and authentication information transmission method
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN109729000B (en) Instant messaging method and device
KR102567737B1 (en) Method providing secure message service and apparatus therefor
CN109583154A (en) A kind of system and method based on Web middleware access intelligent code key
CN115022868A (en) Satellite terminal entity authentication method, system and storage medium
CN114390524B (en) Method and device for realizing one-key login service
CN102971739A (en) Protecting account security settings using strong proofs
CN106817228A (en) Data charging method and device
CN107104888B (en) Safe instant messaging method
US7966662B2 (en) Method and system for managing authentication and payment for use of broadcast material
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN102208980A (en) Communication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination