WO2023071133A1 - Tagged network information service generation and application method and apparatus, device and medium - Google Patents

Tagged network information service generation and application method and apparatus, device and medium Download PDF

Info

Publication number
WO2023071133A1
WO2023071133A1 PCT/CN2022/090749 CN2022090749W WO2023071133A1 WO 2023071133 A1 WO2023071133 A1 WO 2023071133A1 CN 2022090749 W CN2022090749 W CN 2022090749W WO 2023071133 A1 WO2023071133 A1 WO 2023071133A1
Authority
WO
WIPO (PCT)
Prior art keywords
network information
label
tag
encryption
basic
Prior art date
Application number
PCT/CN2022/090749
Other languages
French (fr)
Chinese (zh)
Inventor
沈勇
张之浩
朱杰
刘明
余惠强
程晓艳
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2023071133A1 publication Critical patent/WO2023071133A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Definitions

  • the present application relates to the technical field of network data security, in particular to methods, devices, equipment, and storage media for generating and applying tagged network information services.
  • identification or quality traceability labels to facilitate the identification of suppliers and trace the production process, such as product identity labels, production batch numbers, etc., which can be used by consumers to identify producers, and producers can easily identify problematic products that affect quality cause, take corrective measures in a timely manner.
  • the embodiment of the present application proposes a tagged network information service generation method, including:
  • the network information service encryption label is written into a preset position in the network information service to obtain a labeled network information service.
  • the embodiment of the present application proposes a tagged network information service application method, including:
  • the corresponding network service is located according to the basic network information.
  • the embodiment of the present application proposes a tagged network information service generation device, including:
  • the basic network information acquisition module is used to obtain the basic network information of the network information service
  • a tag basic information generating module configured to generate tag basic information according to the basic network information
  • An encryption module configured to encrypt the basic information of the label according to preset encryption rules, and generate the network information service encryption label
  • the tagged network information service generation module is used to write the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service.
  • the embodiment of the present application proposes a tagged network information service application device, including:
  • a tagged network information service acquisition module configured to obtain tagged network information services
  • a network information service encrypted label extraction module configured to extract the network information service encrypted label from the labeled network information service
  • the tag basic information extraction module is used to extract the tag basic information of the network information service encrypted tag according to preset encryption rules
  • a basic network information extraction module configured to obtain corresponding basic network information according to the basic information of the label
  • a network service module configured to locate corresponding network services according to the basic network information.
  • an electronic device including:
  • the program is stored in the memory, and the processor executes a tagged network information service generation method or a tagged network information service application method;
  • the tagged network information service generation method includes:
  • the tagged network information service application method includes:
  • the corresponding network service is located according to the basic network information.
  • the embodiment of the present application provides a storage medium, the storage medium is a computer-readable storage medium, and the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer execute A tagged network information service generation method or a tagged network information service application method;
  • the tagged network information service generation method includes:
  • the tagged network information service application method includes:
  • the corresponding network service is located according to the basic network information.
  • the tagged network information service generation and application method, device, device, and storage medium proposed in the embodiments of the present application can add tag information to network information services in combination with various preset encryption rules to obtain encrypted tags for network information services, which is convenient for users of network services
  • the network information service encryption label to identify the network service provider
  • Various feedbacks of information services save labor costs, so as to quickly trace and repair quality problems.
  • Fig. 1 is a flowchart of a method for generating tagged network information services provided by an embodiment of the present application.
  • Fig. 2 is a flow chart of a tagged network information service application method provided by an embodiment of the present application.
  • Fig. 3 is a structural block diagram of an apparatus for generating tagged network information services provided by another embodiment of the present application.
  • Fig. 4 is a structural block diagram of a tagged network information service application device provided by another embodiment of the present application.
  • FIG. 5 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
  • a digital signature (also known as a public key digital signature) is a digital string that only the sender of the message can generate and cannot be forged by others. This digital string is also an effective proof of the authenticity of the message sent by the sender of the message. It is a method for authenticating digital information similar to an ordinary physical signature written on paper, but implemented using techniques in the field of public key cryptography.
  • a set of digital signatures usually defines two complementary operations, one for signing and the other for verification. Simply put, the so-called digital signature is some data attached to the data unit, or a cryptographic transformation of the data unit, which allows the receiver of the data unit to confirm the source of the data unit and the integrity of the data unit security and protect data against forgery by people (eg recipients).
  • Digital signatures can be obtained based on both public key cryptosystem and private key cryptosystem, mainly digital signatures based on public key cryptosystem, including ordinary digital signatures and special digital signatures.
  • Common digital signature algorithms include RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm and finite automaton digital signature algorithm, etc.
  • Special digital signatures include blind signatures, proxy signatures, group signatures, non-repudiation signatures, fair blind signatures, threshold signatures, signatures with message recovery functions, etc., which are closely related to specific application environments.
  • Digital envelope refers to the data obtained after the sender uses the public key of the receiver to encrypt the symmetric key, and its purpose is to ensure the security of the symmetric key transmission.
  • the recipient needs to use his own private key to open the digital envelope to obtain the symmetric key.
  • the digital envelope technology combines the advantages of symmetric key encryption and public key encryption, solves the security issue of symmetric key release and the slow speed of public key encryption, and improves security, scalability and efficiency.
  • Private key encryption algorithms use a single private key to encrypt and decrypt data. Since any party with the key can use the key to decrypt data, the key must be protected from unauthorized agents. Private key encryption is also known as symmetric encryption because the same key is used for both encryption and decryption. Private-key encryption algorithms are very fast (compared to public-key algorithms), and are especially suitable for performing cryptographic transformations on larger data streams. Typically, a private key algorithm (called a block cipher) is used to encrypt one block of data at a time.
  • Key is a parameter entered in an algorithm for converting plaintext to ciphertext or converting ciphertext to plaintext. Keys are divided into symmetric keys and asymmetric keys. According to whether the encryption key and decryption key used in the cryptographic algorithm are the same, whether the decryption process can be deduced from the encryption process (or the encryption process can be deduced from the decryption process), the cryptosystem can be divided into symmetric cryptosystem and asymmetric cryptosystem , respectively as follows: 1) Symmetric key encryption, also known as private key encryption or session key encryption algorithm, that is, the sender and receiver of information use the same key to encrypt and decrypt data.
  • Symmetric key encryption also known as private key encryption or session key encryption algorithm
  • Asymmetric key encryption system also known as public key encryption. It needs to use different keys to complete the encryption and decryption operations respectively, one is released publicly, that is, the public key, and the other is kept secretly by the user, that is, the private key.
  • the information sender uses the public key to encrypt, while the information receiver uses the private key to decrypt.
  • the public key mechanism is flexible, but encryption and decryption are much slower than symmetric key encryption.
  • the embodiments of the present application provide a method for generating network information services, an application method, a device, and a storage medium, which can add label information to network information services in combination with various preset encryption rules to obtain encrypted labels for network information services, which facilitates the creation of network services.
  • Users can identify network service providers according to the network information service encryption label, and it is also convenient for the provider to automatically identify various information of its services according to the network information service encryption label, and automatically process various feedbacks from users, which can improve service efficiency and respond to users in a timely manner.
  • Various feedbacks from network information services save manpower costs, so as to achieve rapid traceability and repair of quality problems.
  • Embodiments of the present application provide tagged network information service generation methods and devices, electronic equipment, and storage media, which are specifically described through the following embodiments. First, the method for generating tagged network information services in the embodiments of the present application is described.
  • the tagged network information service generation method and application method provided by the embodiments of the present application relate to the technical field of network data security.
  • the tagged network information service generation method and application method provided in the embodiments of the present application can be applied to a terminal, can also be applied to a server, and can also be software running on a terminal or a server.
  • the terminal can be a smart phone, a tablet computer, a notebook computer, a desktop computer or a smart watch, etc.
  • the server can be an independent server, or can provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage , network services, cloud communications, middleware services, domain name services, security services, content delivery network (Content Delivery Network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms; software can be used to implement tagging Application of network information service generation method and application method, etc., but not limited to the above forms.
  • the application can be used in numerous general purpose or special purpose computer system environments or configurations. Examples: personal computers, server computers, handheld or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, including A distributed computing environment for any of the above systems or devices, etc.
  • This application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including storage devices.
  • Fig. 1 is an optional flow chart of a method for generating tagged network information services provided by an embodiment of the present application.
  • the method in Fig. 1 may include but is not limited to steps S101 to S105.
  • Step S101 acquiring basic network information of network information services.
  • the basic network information includes: network service name, person in charge of network service, one or more of network service publishing time information or feedback information submission method, wherein the person in charge of network service includes: department in charge of network service and Network service responsible person, network service time information includes: network service publishing time and network service time window. It can be understood that the basic network information is used as an example here, but it does not mean that there are only the above-mentioned types.
  • a network information service provider organization may have two application scenarios in order to quickly identify whether the network service belongs to the organization, and help the organization quickly locate internal responsible departments and contacts, so as to quickly respond to various service requests:
  • the organization discovers a security weakness in a network information service that needs to be repaired urgently through an automated vulnerability scanner, then the organization can automatically locate the network service based on the feedback from the scanner (for example, basic network information can be obtained from the feedback information) Responsible departments and contacts, automatically assign remediation tasks and track progress.
  • the basic network information includes at least: the name of the network service.
  • the organization can directly determine the department in charge of the network service and the person in charge of the network service from the name of the network service.
  • the organization needs to combine the The service release time and the corresponding network service time window (it is possible that different service time windows correspond to different responsible persons) determine the network service responsible department and the network service responsible person.
  • the organization also needs to use the feedback information submission method Determine the service channels of network information services (such as different network service platforms, etc.), so as to determine the responsible department and person in charge of network services.
  • the organization can automatically locate the network service according to the user feedback (for example, basic network information can be obtained from the feedback information) Responsible departments and contacts, automatically assign repair tasks and track progress.
  • the basic network information includes at least: the name of the network service and the method of submitting the feedback information.
  • the organization can directly determine the responsible department and person in charge of the network service from the name of the network service and the method of submitting the feedback information.
  • the organization needs to determine the network service responsible department and the network service responsible person in combination with the network service release time and the corresponding network service time window (different service time windows may correspond to different responsible persons).
  • Step S102 generating basic label information according to basic network information.
  • step S102 there are two ways to obtain the basic information of the label, which are:
  • the preset tag content format is used, and the preset format may be an internally agreed format, which is not specifically limited here, and the basic network information is directly generated into the tag content.
  • the label content is obtained according to the first method. If the label content is long, the label content can be pre-stored in the internal preset database. Each label content generates a label number, and the label can be queried through the label number. content, so the label number corresponds to the content of the label one by one.
  • the basic information of the label can be obtained, that is, the basic information of the label can be the content of the label, or the number of the label, or the form of the content of the label + the number of the label.
  • Step S103 encrypting the basic tag information according to the preset encryption rules to generate an encrypted tag for network information services.
  • the web information service encryption tag is used to embed the web information service to generate tagged web information service.
  • the preset encryption rules are divided into: tag content encryption rules and tag number encryption rules.
  • the tag content encryption rules include one or more of the following:
  • the encrypted private key can effectively prevent the content of the label from being tampered with, which is not only convenient for users to verify, but also convenient for service providers to verify themselves .
  • the encrypted private key is a key of an asymmetric algorithm
  • the network information service encrypted label obtained by encrypting the digital signature and the content of the label includes a corresponding digital certificate.
  • the content of the tag is encrypted using the encrypted private key to generate an encrypted tag for network information services.
  • the encryption private key is a key of an asymmetric algorithm, and the content of the tag is directly encrypted using the encryption private key as an encrypted tag for network information services.
  • the preset key is a key of an asymmetric algorithm.
  • the content of the label is first encrypted to generate a digital envelope, and then an encrypted network information service label is generated according to the digital envelope.
  • the network information service encrypted label obtained according to the first label content encryption rule or the second label content encryption rule is used again to encrypt the private key (the encrypted private key here can be based on actual needs) Select) to encrypt to generate a digital signature, and then encrypt according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
  • the label content can be displayed in plain text, that is, the network information service encrypted label is the basic label information displayed in plain text .
  • the label number encryption rules include one or more of the following:
  • the encrypted private key is used to generate a digital signature according to the tag number, and encryption is performed according to the digital signature and the tag number to obtain an encrypted tag for network information services.
  • the encrypted private key is a key of an asymmetric algorithm, and the network information service encrypted label obtained by encrypting according to the digital signature and the label number includes a corresponding digital certificate.
  • the encrypted private key is a key of an asymmetric algorithm, and the above-mentioned directly uses the encrypted private key to encrypt the tag BiNA as the network information service encrypted tag.
  • the preset key can be used to encrypt the label number to generate a digital envelope, and generate a network information service encrypted label according to the digital envelope.
  • the preset key is a key of an asymmetric algorithm.
  • the network information service encryption label obtained according to the fourth label number encryption rule or the fifth label number encryption rule is used again to encrypt the private key (the encryption private key here can be based on actual needs) Select) to encrypt to generate a digital signature, and then encrypt according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
  • the tag content can be stored inside Store in plain text in the database, and then display the tag number in the encrypted tag of the network information service.
  • Step S104 writing the network information service encryption tag into a preset location in the network information service to obtain a tagged network information service.
  • the preset location may be a location that is convenient for users to obtain, such as Banner information, where Banner is a setting that is often used by network services to provide users with some basic information about services, and tagged network information services refer to the information in the network information services.
  • banner is a setting that is often used by network services to provide users with some basic information about services
  • tagged network information services refer to the information in the network information services.
  • Including the above network information service encryption label and corresponding label production instructions it is convenient for users to analyze and use labels according to the label production instructions.
  • the following table is an example of some common network information services and their default banner information.
  • the tagged network information service is launched to provide corresponding network information services for relevant users.
  • the tagged network information service provided in this embodiment includes a network information service encryption tag, it can be agreed with the network service provider on different service status nodes of the network information service, for example, an online tagged network service is installed- On different service status nodes such as call-update, the corresponding encrypted label information of network information services (or basic network information after decryption operation) can be displayed according to requirements, so that users can get corresponding feedback in time when they need feedback path.
  • the tagged network information service generation method proposed in the embodiment of this application obtains the basic network information of the network information service, generates tag basic information according to the basic network information, encrypts the tag basic information according to preset encryption rules, and generates network information service encryption.
  • a tag writing the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service.
  • the embodiment of the present application can combine multiple preset encryption rules to add label information to network information services to obtain network information service encryption labels, which is convenient for network service users to identify network service providers based on network information service encryption labels, and also facilitates providers to identify network service providers based on network information
  • the service encryption label automatically identifies various information of its services, automatically processes various feedbacks from users, can improve service efficiency, respond to various feedbacks from users on network information services in a timely manner, save labor costs, and achieve rapid traceability of quality problems and fixes.
  • Fig. 2 is an optional flow chart of a tagged network information service application method provided by an embodiment of the present application, including but not limited to steps S210 to S250.
  • Step S210 obtaining tagged network information services.
  • what the user obtains from the network information services is tagged network information services.
  • Step S220 extracting the network information service encryption tag from the tagged network information service.
  • the user obtains the encrypted label of the network information service through a preset acquisition method, such as a preset path, a preset method, or a preset location (for example, Banner information).
  • the network information service encryption label is generated according to the tagged network information service generation method in the above embodiment. Since the tagged network information service means that the network information service includes the network information service encryption label and the corresponding label production instructions, the user can obtain the various components of the network information service encryption label according to the label production instructions, such as the preset encryption rules.
  • Step S230 according to the preset encryption rules, extract the basic label information of the network information service encrypted label, and further, extract the encrypted information of the network information service encrypted label.
  • the preset encryption rule is the first tag content encryption rule
  • the tag content and the digital signature of the network information service encrypted tag are extracted using the corresponding encryption key.
  • the encrypted information is a digital signature
  • the user needs to verify the validity of the label, mainly to verify the validity of the digital signature and the validity of the signature certificate corresponding to the digital signature. After the verification is passed, go to step S240.
  • step S240 the corresponding basic network information is acquired according to the basic label information.
  • the corresponding basic network information is obtained by decoding the format of the basic label information.
  • Step S250 providing corresponding network services according to the basic network information.
  • both internal and external users will determine which organization the provider of the network information service is based on the digital signature. For example, no matter whether the basic tag information is encrypted or not, the organization can use the preset private key to decrypt it. If the basic tag information is the tag number, the organization can query the tag content corresponding to the tag number through the internal database), the organization can Automatically quickly locate the network service based on the basic information of the label, and which department should handle the user's feedback or improve the quality of the service.
  • the user can uniquely identify the service provider through the digital signature, and the service provider can automatically locate the internal responsible team and contact person of the service through the basic information of the label in the feedback.
  • the service status node of the tagged network information service can be obtained according to an agreement with the network service provider, and in different The network status node displays the corresponding basic network information, so that users can get the corresponding feedback path in time when they need to give feedback.
  • the organization can base on the user feedback (For example, basic network information can be obtained from feedback information), quickly locate internal responsible departments and contacts, so as to quickly respond to various service requests, automatically locate responsible departments and contacts for network services, automatically assign repair tasks and track schedule.
  • the basic network information includes at least: the name of the network service, the release time of the network service, the corresponding time window of the network service, and the method of submitting feedback information, so as to determine the responsible department and person in charge of the network service.
  • the tagged network information service application method proposed in the embodiment of the present application obtains the tagged network information service, extracts the network information service encryption tag from the tagged network information service, and extracts the tag of the network information service encryption tag according to the preset encryption rules Basic information, obtain the corresponding basic network information according to the basic information of the label, and locate the corresponding network service according to the basic network information.
  • the embodiment of the present application can combine multiple preset encryption rules to add label information to network information services to obtain network information service encryption labels, which is convenient for network service users to identify network service providers based on network information service encryption labels, and also facilitates providers to identify network service providers based on network information
  • the service encryption label automatically identifies various information of its services, automatically processes various feedbacks from users, can improve service efficiency, respond to various feedbacks from users on network information services in a timely manner, save labor costs, and achieve rapid traceability of quality problems and fixes.
  • the embodiment of the present application also provides a tagged network information service generation device, which can realize the above-mentioned tagged network information service generation method.
  • Figure 3 is an optional example of a tagged network information service generation device provided in the embodiment of the present application. Structure block diagram, including:
  • a basic network information acquisition module 310 configured to acquire basic network information of network information services
  • the label basic information generation module 320 is used for generating label basic information according to the basic network information
  • An encryption module 330 configured to encrypt the basic information of the label according to preset encryption rules to generate an encrypted label for network information services
  • the tagged network information service generating module 340 is configured to write the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service.
  • the embodiment of the present application also provides a network information service encryption label application device, which can implement the above-mentioned network information service encryption label application method.
  • Figure 4 is an optional labeling network information service application device provided in the embodiment of the application. Structure block diagram, including:
  • a tagged network information service acquisition module 410 configured to acquire tagged network information services
  • the network information service encrypted label extraction module 420 is used to extract the network information service encrypted label from the labeled network information service
  • the basic label information extraction module 430 is used to extract the basic label information of the encrypted label of the network information service according to the preset encryption rules;
  • a basic network information extraction module 440 configured to obtain corresponding basic network information according to the basic information of the label
  • the network service module 450 is configured to locate corresponding network services according to the basic network information.
  • the specific implementation manner of the tagged network information service generation apparatus of this embodiment is basically the same as the specific implementation manner of the above-mentioned tagged network information service generation method, and will not be repeated here.
  • the embodiment of the present application also provides an electronic device, including:
  • the programs are stored in the memory, and the processor executes the at least one program to implement a tagged network information service generation method or a tagged network information service application method;
  • the tagged network information service generation method includes:
  • the tagged network information service application method includes:
  • the corresponding network service is located according to the basic network information.
  • the electronic device may be any intelligent terminal including a mobile phone, a tablet computer, a personal digital assistant (PDA for short), a vehicle-mounted computer, and the like.
  • a mobile phone a tablet computer
  • PDA personal digital assistant
  • FIG. 5 illustrates a hardware structure of an electronic device in another embodiment.
  • the electronic device includes:
  • the processor 501 may be implemented by a general-purpose CPU (Central Processing Unit, central processing unit), a microprocessor, an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, and is used to execute related programs to realize The technical solutions provided by the embodiments of the present application;
  • a general-purpose CPU Central Processing Unit, central processing unit
  • a microprocessor an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, and is used to execute related programs to realize The technical solutions provided by the embodiments of the present application;
  • ASIC Application Specific Integrated Circuit
  • the memory 502 may be implemented in the form of a ROM (ReadOnly Memory, read only memory), a static storage device, a dynamic storage device, or a RAM (Random Access Memory, random access memory).
  • the memory 502 can store operating systems and other application programs. When implementing the technical solutions provided by the embodiments of this specification through software or firmware, the relevant program codes are stored in the memory 502 and called by the processor 501 to execute the implementation of this application.
  • Example tagged network information service generation method
  • the input/output interface 503 is used to realize information input and output;
  • the communication interface 504 is used to realize the communication interaction between the device and other devices, and the communication can be realized through a wired method (such as USB, network cable, etc.), or can be realized through a wireless method (such as a mobile network, WIFI, Bluetooth, etc.); and
  • a bus 505 which transmits information between various components of the device (such as a processor 501, a memory 502, an input/output interface 503 and a communication interface 504);
  • the processor 501 , the memory 502 , the input/output interface 503 and the communication interface 504 are connected to each other within the device through the bus 505 .
  • the embodiment of the present application also provides a storage medium, the storage medium is a computer-readable storage medium, and the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer execute a tagged network An information service generation method or a tagged network information service application method;
  • the tagged network information service generation method includes:
  • the tagged network information service application method includes:
  • the corresponding network service is located according to the basic network information.
  • the tagged network information service generation method, application method, device, and storage medium proposed in the embodiments of the present application can add tag information to network information services in combination with various preset encryption rules to obtain encrypted tags for network information services, which is convenient for users of network services according to
  • the network information service encryption label identifies the network service provider, and it is also convenient for the provider to automatically identify various information of its services according to the network information service encryption label, and automatically process various feedbacks from users, which can improve service efficiency and respond to users' requests for network information in a timely manner.
  • Various feedbacks on services save manpower costs, so as to achieve rapid traceability and repair of quality problems.
  • the computer-readable storage medium may be non-volatile or volatile.
  • memory can be used to store non-transitory software programs and non-transitory computer-executable programs.
  • the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage devices.
  • the memory optionally includes memory located remotely from the processor, which remote memory may be connected to the processor via a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • At least one (item) means one or more, and “multiple” means two or more.
  • “And/or” is used to describe the association relationship of associated objects, indicating that there can be three types of relationships, for example, “A and/or B” can mean: only A exists, only B exists, and A and B exist at the same time , where A and B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an “or” relationship.
  • At least one of the following” or similar expressions refer to any combination of these items, including any combination of single or plural items.
  • At least one item (piece) of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c ", where a, b, c can be single or multiple.
  • the disclosed devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
  • the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including multiple instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, referred to as ROM), random access memory (Random Access Memory, referred to as RAM), magnetic disk or optical disc, etc., which can store programs. medium.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or optical disc etc., which can store programs. medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the present application provide a tagged network information service generation and application method and apparatus, a device and a medium, and relate to the technical field of network data security. The tagged network information service generation method comprises: acquiring basic network information of a network information service, generating basic tag information according to the basic network information, encrypting the basic tag information according to a preset encryption rule, and generating a network information service encryption tag. Embodiments of the present application can add tag information to a network information service in combination with various preset encryption rules, obtaining a network information service encryption tag, helping a user of the network service to identify a network service provider according to the network information service encryption tag, as well as helping the provider to automatically identify various information of the service according to the network information service encryption tag and automatically process various types of user feedback, improving service efficiency, and automatically respond to various types of user feedback related to the network information service in a timely fashion, reducing labor costs.

Description

标签化网络信息服务生成及应用方法、装置、设备、介质Generation and application method, device, equipment and medium of tagged network information service
本申请要求于2021年10月28日提交中国专利局、申请号为202111266593.2,发明名称为“标签化网络信息服务生成及应用方法、装置、设备、介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202111266593.2 submitted to the China Patent Office on October 28, 2021, and the invention title is "method, device, equipment, and medium for generating and applying tagged network information services", all of which The contents are incorporated by reference in this application.
技术领域technical field
本申请涉及网络数据安全技术领域,尤其涉及标签化网络信息服务生成及应用方法、装置、设备、存储介质。The present application relates to the technical field of network data security, in particular to methods, devices, equipment, and storage media for generating and applying tagged network information services.
背景技术Background technique
当今世界随着数字化程度加深,社会上各种各样的组织正将其业务流程数字化,由此创建了大量的网络信息服务,例如HTTP服务,POP3服务,SSH服务等,人们在越来越多的领域直接消费数字产品,创造了越来越多的网络信息服务。With the deepening of digitalization in today's world, various organizations in society are digitizing their business processes, thus creating a large number of network information services, such as HTTP services, POP3 services, SSH services, etc., people are more and more In the field of direct consumption of digital products, more and more network information services have been created.
不同于现实世界,有身份鉴别或质量追溯标签,以利于鉴别提供者、追溯生产过程,比如产品身份标签、生产批号等,消费者可用来鉴别生产者,生产者对于问题产品便于查清影响质量的原因,及时采取纠正措施。Different from the real world, there are identification or quality traceability labels to facilitate the identification of suppliers and trace the production process, such as product identity labels, production batch numbers, etc., which can be used by consumers to identify producers, and producers can easily identify problematic products that affect quality cause, take corrective measures in a timely manner.
技术问题technical problem
以下是发明人意识到的现有技术的技术问题:在数字世界中,对于网络信息服务,缺乏有效识别生产者的标签、追踪生产企业里面具体负责部门、联系人等信息的标签,发生质量问题,一时间难以快速追溯和修复。The following are the technical problems of the prior art realized by the inventor: In the digital world, for network information services, there is a lack of labels for effectively identifying producers, and labels for tracking information such as specific responsible departments and contacts in production enterprises, and quality problems occur , it is difficult to quickly trace and repair for a while.
技术解决方案technical solution
第一方面,本申请实施例提出了一种标签化网络信息服务生成方法,包括:In the first aspect, the embodiment of the present application proposes a tagged network information service generation method, including:
获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
根据所述基本网络信息生成标签基本信息;generating basic label information according to the basic network information;
根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;encrypting the basic tag information according to preset encryption rules to generate the network information service encrypted tag;
将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。The network information service encryption label is written into a preset position in the network information service to obtain a labeled network information service.
第二方面,本申请实施例提出了一种标签化网络信息服务应用方法,包括:In the second aspect, the embodiment of the present application proposes a tagged network information service application method, including:
获取标签化网络信息服务;Obtain tagged network information services;
从所述标签化网络信息服务中提取网络信息服务加密标签;Extracting a network information service encryption tag from the tagged network information service;
根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;According to preset encryption rules, extract the basic label information of the network information service encryption label;
根据所述标签基本信息获取对应的基本网络信息;Obtain corresponding basic network information according to the basic information of the tag;
根据所述基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
第三方面,本申请实施例提出了一种标签化网络信息服务生成装置,包括:In the third aspect, the embodiment of the present application proposes a tagged network information service generation device, including:
基本网络信息获取模块,用于获取网络信息服务的基本网络信息;The basic network information acquisition module is used to obtain the basic network information of the network information service;
标签基本信息生成模块,用于根据所述基本网络信息生成标签基本信息;A tag basic information generating module, configured to generate tag basic information according to the basic network information;
加密模块,用于根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;An encryption module, configured to encrypt the basic information of the label according to preset encryption rules, and generate the network information service encryption label;
标签化网络信息服务生成模块,用于将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。The tagged network information service generation module is used to write the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service.
第四方面,本申请实施例提出了一种标签化网络信息服务应用装置,包括:In the fourth aspect, the embodiment of the present application proposes a tagged network information service application device, including:
标签化网络信息服务获取模块,用于获取标签化网络信息服务;A tagged network information service acquisition module, configured to obtain tagged network information services;
网络信息服务加密标签提取模块,用于从所述标签化网络信息服务中提取网络信息服务加密标签;A network information service encrypted label extraction module, configured to extract the network information service encrypted label from the labeled network information service;
标签基本信息提取模块,用于根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;The tag basic information extraction module is used to extract the tag basic information of the network information service encrypted tag according to preset encryption rules;
基本网络信息提取模块,用于根据所述标签基本信息获取对应的基本网络信息;A basic network information extraction module, configured to obtain corresponding basic network information according to the basic information of the label;
网络服务模块,用于根据所述基本网络信息定位对应的网络服务。A network service module, configured to locate corresponding network services according to the basic network information.
第五方面,本申请实施例提出了一种电子设备,包括:In the fifth aspect, the embodiment of the present application proposes an electronic device, including:
至少一个存储器;at least one memory;
至少一个处理器;at least one processor;
至少一个程序;at least one program;
所述程序被存储在存储器中,处理器执行一种标签化网络信息服务生成方法或一种标签化网络信息服务应用方法;The program is stored in the memory, and the processor executes a tagged network information service generation method or a tagged network information service application method;
其中,所述标签化网络信息服务生成方法包括:Wherein, the tagged network information service generation method includes:
获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
根据所述基本网络信息生成标签基本信息;generating basic label information according to the basic network information;
根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;encrypting the basic tag information according to preset encryption rules to generate the network information service encrypted tag;
将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务;Writing the network information service encryption tag into a preset position in the network information service to obtain a tagged network information service;
其中,所述标签化网络信息服务应用方法包括:Wherein, the tagged network information service application method includes:
获取标签化网络信息服务;Obtain tagged network information services;
从所述标签化网络信息服务中提取网络信息服务加密标签;Extracting a network information service encryption tag from the tagged network information service;
根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;According to preset encryption rules, extract the basic label information of the network information service encryption label;
根据所述标签基本信息获取对应的基本网络信息;Obtain corresponding basic network information according to the basic information of the tag;
根据所述基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
第六方面,本申请实施例提出了一种存储介质,该存储介质是计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行一种标签化网络信息服务生成方法或一种标签化网络信息服务应用方法;In the sixth aspect, the embodiment of the present application provides a storage medium, the storage medium is a computer-readable storage medium, and the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer execute A tagged network information service generation method or a tagged network information service application method;
其中,所述标签化网络信息服务生成方法包括:Wherein, the tagged network information service generation method includes:
获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
根据所述基本网络信息生成标签基本信息;generating basic label information according to the basic network information;
根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;encrypting the basic tag information according to preset encryption rules to generate the network information service encrypted tag;
将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务;Writing the network information service encryption tag into a preset position in the network information service to obtain a tagged network information service;
其中,所述标签化网络信息服务应用方法包括:Wherein, the tagged network information service application method includes:
获取标签化网络信息服务;Obtain tagged network information services;
从所述标签化网络信息服务中提取网络信息服务加密标签;Extracting a network information service encryption tag from the tagged network information service;
根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;According to preset encryption rules, extract the basic label information of the network information service encryption label;
根据所述标签基本信息获取对应的基本网络信息;Obtain corresponding basic network information according to the basic information of the tag;
根据所述基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
有益效果Beneficial effect
本申请实施例提出的标签化网络信息服务生成及应用方法、装置、设备、存储介质,能够结合多种预设加密规则为网络信息服务添加标签信息得到网络信息服务加密标签,便于网络服务的用户根据网络信息服务加密标签识别网络服务提供者,也便于提供者根据网络信息服务加密标签自动识别其服务的各种信息,自动化地处理用户的各种反馈,能够提高服务效率,及时响应用户对网络信息服务的各种反馈,节约人力成本,从而达到对质量问题的快速追溯和修复。The tagged network information service generation and application method, device, device, and storage medium proposed in the embodiments of the present application can add tag information to network information services in combination with various preset encryption rules to obtain encrypted tags for network information services, which is convenient for users of network services According to the network information service encryption label to identify the network service provider, it is also convenient for the provider to automatically identify various information of its services according to the network information service encryption label, and automatically process various feedbacks from users, which can improve service efficiency and timely respond to user requests from the network. Various feedbacks of information services save labor costs, so as to quickly trace and repair quality problems.
附图说明Description of drawings
图1是本申请实施例提供的标签化网络信息服务生成方法的流程图。Fig. 1 is a flowchart of a method for generating tagged network information services provided by an embodiment of the present application.
图2是本申请实施例提供的标签化网络信息服务应用方法的流程图。Fig. 2 is a flow chart of a tagged network information service application method provided by an embodiment of the present application.
图3是本申请另一实施例提供的标签化网络信息服务生成装置的结构框图。Fig. 3 is a structural block diagram of an apparatus for generating tagged network information services provided by another embodiment of the present application.
图4是本申请另一实施例提供的标签化网络信息服务应用装置的结构框图。Fig. 4 is a structural block diagram of a tagged network information service application device provided by another embodiment of the present application.
图5是本申请实施例提供的电子设备的硬件结构示意图。FIG. 5 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
本发明的实施方式Embodiments of the present invention
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.
需要说明的是,虽然在装置示意图中进行了功能模块划分,在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于装置中的模块划分,或流程图中的顺序执行所示出或描述的步骤。It should be noted that although the functional modules are divided in the schematic diagram of the device, and the logical sequence is shown in the flowchart, in some cases, it can be executed in a different order than the module division in the device or the flowchart in the flowchart. steps shown or described.
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同。本文中所使用的术语只是为了描述本申请实施例的目的,不是旨在限制本申请。Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein are only for the purpose of describing the embodiments of the present application, and are not intended to limit the present application.
首先,对本申请中涉及的若干名词进行解析:First, analyze some nouns involved in this application:
数字签名:数字签名(又称公钥数字签名)是只有信息的发送者才能产生的别人无法伪造的一段数字串,这段数字串同时也是对信息的发送者发送信息真实性的一个有效证明。它是一种类似写在纸上的普通的物理签名,但是在使用了公钥加密领域的技术来实现的,用于鉴别数字信息的方法。一套数字签名通常定义两种互补的运算,一个用于签名,另一个用于验证。简单地说,所谓数字签名就是附加在数据单元上的一些数据,或是对数据单元所作的密码变换,这种数据或变换允许数据单元的接收者用以确认数据单元的来源和数据单元的完整性并保护数据,防止被人(例如接收者)进行伪造。它是对电子形式的消息进行签名的一种方法,一个签名消息能在一个通信网络中传输。基于公钥密码体制和私钥密码体制都可以获得数字签名,主要是基于公钥密码体制的数字签名,包括普通数字签名和特殊数字签名。普通数字签名算法有RSA、ElGamal、Fiat-Shamir、Guillou-Quisquarter、Schnorr、Ong-Schnorr-Shamir数字签名算法、Des/DSA,椭圆曲线数字签名算法和有限自动机数字签名算法等。特殊数字签名有盲签名、代理签名、群签名、不可否认签名、公平盲签名、门限签名、具有消息恢复功能的签名等,它与具体应用环境密切相关。Digital signature: A digital signature (also known as a public key digital signature) is a digital string that only the sender of the message can generate and cannot be forged by others. This digital string is also an effective proof of the authenticity of the message sent by the sender of the message. It is a method for authenticating digital information similar to an ordinary physical signature written on paper, but implemented using techniques in the field of public key cryptography. A set of digital signatures usually defines two complementary operations, one for signing and the other for verification. Simply put, the so-called digital signature is some data attached to the data unit, or a cryptographic transformation of the data unit, which allows the receiver of the data unit to confirm the source of the data unit and the integrity of the data unit security and protect data against forgery by people (eg recipients). It is a method of signing messages in electronic form so that a signed message can be transmitted over a communication network. Digital signatures can be obtained based on both public key cryptosystem and private key cryptosystem, mainly digital signatures based on public key cryptosystem, including ordinary digital signatures and special digital signatures. Common digital signature algorithms include RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm and finite automaton digital signature algorithm, etc. Special digital signatures include blind signatures, proxy signatures, group signatures, non-repudiation signatures, fair blind signatures, threshold signatures, signatures with message recovery functions, etc., which are closely related to specific application environments.
数字信封:是指发送方使用接收方的公钥来加密对称密钥后所得的数据,其目的是用来确保对称密钥传输的安全性。采用数字信封时,接收方需要使用自己的私钥才能打开数字信封得到对称密钥。数字信封技术结合了对称密钥加密和公钥加密的优点,解决了对称密钥的发布安全问题,和公钥加密速度慢问题,提高了安全性、扩展性和效率等。Digital envelope: refers to the data obtained after the sender uses the public key of the receiver to encrypt the symmetric key, and its purpose is to ensure the security of the symmetric key transmission. When using a digital envelope, the recipient needs to use his own private key to open the digital envelope to obtain the symmetric key. The digital envelope technology combines the advantages of symmetric key encryption and public key encryption, solves the security issue of symmetric key release and the slow speed of public key encryption, and improves security, scalability and efficiency.
私钥:私钥加密算法使用单个私钥来加密和解密数据。由于具有密钥的任意一方都可以使用该密钥解密数据,因此必须保护密钥不被未经授权的代理得到。私钥加密又称为对称加密,因为同一密钥既用于加密又用于解密。私钥加密算法非常快(与公钥算法相比),特别适用于对较大的数据流执行加密转换。通常,私钥算法(称为块密码)用于一次加密一个数据块。Private key: Private key encryption algorithms use a single private key to encrypt and decrypt data. Since any party with the key can use the key to decrypt data, the key must be protected from unauthorized agents. Private key encryption is also known as symmetric encryption because the same key is used for both encryption and decryption. Private-key encryption algorithms are very fast (compared to public-key algorithms), and are especially suitable for performing cryptographic transformations on larger data streams. Typically, a private key algorithm (called a block cipher) is used to encrypt one block of data at a time.
密钥:是在明文转换为密文或将密文转换为明文的算法中输入的参数。密钥分为对称密钥与非对称密钥。根据密码算法所使用的加密密钥和解密密钥是否相同、能否由加密过程推导出解密过程(或者由解密过程推导出加密过程),可将密码体制分为对称密码体制和非对称密码体制,分别如下所述:1)对称密钥加密,又称私钥加密或会话密钥加密算法,即信息的发送方和接收方使用同一个密钥去加密和解密数据。它的最大优势是加/解密速度快,适合于对大数据量进行加密,但密钥管理困难。2)非对称密钥加密系统,又称公钥密钥加密。它需 要使用不同的密钥来分别完成加密和解密操作,一个公开发布,即公开密钥,另一个由用户自己秘密保存,即私用密钥。信息发送者用公开密钥去加密,而信息接收者则用私用密钥去解密。公钥机制灵活,但加密和解密速度却比对称密钥加密慢得多。Key: is a parameter entered in an algorithm for converting plaintext to ciphertext or converting ciphertext to plaintext. Keys are divided into symmetric keys and asymmetric keys. According to whether the encryption key and decryption key used in the cryptographic algorithm are the same, whether the decryption process can be deduced from the encryption process (or the encryption process can be deduced from the decryption process), the cryptosystem can be divided into symmetric cryptosystem and asymmetric cryptosystem , respectively as follows: 1) Symmetric key encryption, also known as private key encryption or session key encryption algorithm, that is, the sender and receiver of information use the same key to encrypt and decrypt data. Its biggest advantage is that the encryption/decryption speed is fast, and it is suitable for encrypting large amounts of data, but key management is difficult. 2) Asymmetric key encryption system, also known as public key encryption. It needs to use different keys to complete the encryption and decryption operations respectively, one is released publicly, that is, the public key, and the other is kept secretly by the user, that is, the private key. The information sender uses the public key to encrypt, while the information receiver uses the private key to decrypt. The public key mechanism is flexible, but encryption and decryption are much slower than symmetric key encryption.
当今世界随着数字化程度加深,社会上各种各样的组织正将其业务流程数字化,由此创建了大量的网络信息服务,例如HTTP服务,POP3服务,SSH服务等,人们在越来越多的领域直接消费数字产品,创造了越来越多的网络信息服务。With the deepening of digitalization in today's world, various organizations in society are digitizing their business processes, thus creating a large number of network information services, such as HTTP services, POP3 services, SSH services, etc., people are more and more In the field of direct consumption of digital products, more and more network information services have been created.
在物理世界中我们对于产品会进行必要的、可靠的标签,以利于鉴别提供者、追溯生产过程,比如产品身份标签、生产批号等。这对消费者和生产者同样意义重大:消费者可用来鉴别生产者;生产者对于问题产品便于查清影响质量的原因,及时采取纠正措施。不同于现实世界,在数字世界中,对于网络信息服务,缺乏有效识别生产者的标签、追踪生产企业里面具体负责部门、联系人等信息的标签,发生质量问题,一时间难以快速追溯和修复。In the physical world, we will carry out necessary and reliable labels on products to facilitate the identification of suppliers and trace the production process, such as product identity labels, production batch numbers, etc. This is of great significance to both consumers and producers: consumers can use it to identify producers; producers can easily find out the reasons that affect the quality of problematic products, and take corrective measures in time. Different from the real world, in the digital world, for network information services, there is no label to effectively identify the producer, and to track the specific responsible department, contact person and other information in the production enterprise. When quality problems occur, it is difficult to quickly trace and fix them.
基于此,本申请实施例提供一种网络信息服务生成方法、应用方法、设备及存储介质,能够结合多种预设加密规则为网络信息服务添加标签信息得到网络信息服务加密标签,便于网络服务的用户根据网络信息服务加密标签识别网络服务提供者,也便于提供者根据网络信息服务加密标签自动识别其服务的各种信息,自动化地处理用户的各种反馈,能够提高服务效率,及时响应用户对网络信息服务的各种反馈,节约人力成本,从而达到对质量问题的快速追溯和修复。Based on this, the embodiments of the present application provide a method for generating network information services, an application method, a device, and a storage medium, which can add label information to network information services in combination with various preset encryption rules to obtain encrypted labels for network information services, which facilitates the creation of network services. Users can identify network service providers according to the network information service encryption label, and it is also convenient for the provider to automatically identify various information of its services according to the network information service encryption label, and automatically process various feedbacks from users, which can improve service efficiency and respond to users in a timely manner. Various feedbacks from network information services save manpower costs, so as to achieve rapid traceability and repair of quality problems.
本申请实施例提供标签化网络信息服务生成方法和装置、电子设备、存储介质,具体通过如下实施例进行说明,首先描述本申请实施例中的标签化网络信息服务生成方法。Embodiments of the present application provide tagged network information service generation methods and devices, electronic equipment, and storage media, which are specifically described through the following embodiments. First, the method for generating tagged network information services in the embodiments of the present application is described.
本申请实施例提供的标签化网络信息服务生成方法和应用方法,涉及网络数据安全技术领域。本申请实施例提供的标签化网络信息服务生成方法和应用方法可应用于终端中,也可应用于服务器端中,还可以是运行于终端或服务器端中的软件。在一些实施例中,终端可以是智能手机、平板电脑、笔记本电脑、台式计算机或者智能手表等;服务器可以是独立的服务器,也可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、内容分发网络(Content Delivery Network,CDN)、以及大数据和人工智能平台等基础云计算服务的云服务器;软件可以是实现标签化网络信息服务生成方法和应用方法的应用等,但并不局限于以上形式。The tagged network information service generation method and application method provided by the embodiments of the present application relate to the technical field of network data security. The tagged network information service generation method and application method provided in the embodiments of the present application can be applied to a terminal, can also be applied to a server, and can also be software running on a terminal or a server. In some embodiments, the terminal can be a smart phone, a tablet computer, a notebook computer, a desktop computer or a smart watch, etc.; the server can be an independent server, or can provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage , network services, cloud communications, middleware services, domain name services, security services, content delivery network (Content Delivery Network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms; software can be used to implement tagging Application of network information service generation method and application method, etc., but not limited to the above forms.
本申请可用于众多通用或专用的计算机系统环境或配置中。例如:个人计算机、服务器计算机、手持设备或便携式设备、平板型设备、多处理器系统、基于微处理器的系统、置顶盒、可编程的消费电子设备、网络PC、小型计算机、大型计算机、包括以上任何系统或设备的分布式计算环境等等。本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The application can be used in numerous general purpose or special purpose computer system environments or configurations. Examples: personal computers, server computers, handheld or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, including A distributed computing environment for any of the above systems or devices, etc. This application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.
图1是本申请实施例提供的标签化网络信息服务生成方法的一个可选的流程图,图1中的方法可以包括但不限于包括步骤S101至步骤S105。Fig. 1 is an optional flow chart of a method for generating tagged network information services provided by an embodiment of the present application. The method in Fig. 1 may include but is not limited to steps S101 to S105.
步骤S101,获取网络信息服务的基本网络信息。Step S101, acquiring basic network information of network information services.
在一实施例中,基本网络信息包括:网络服务名称、网络服务负责人、网络服务发布时间信息或反馈信息提交方式的一种或一种以上,其中网络服务负责人包括:网络服务负责部门和网络服务责任人,网络服务时间信息包括:网络服务发布时间和网络服务时间窗。可以理解的是,在此对基本网络信息做示例,不代表其仅有上述几种类型。In one embodiment, the basic network information includes: network service name, person in charge of network service, one or more of network service publishing time information or feedback information submission method, wherein the person in charge of network service includes: department in charge of network service and Network service responsible person, network service time information includes: network service publishing time and network service time window. It can be understood that the basic network information is used as an example here, but it does not mean that there are only the above-mentioned types.
在一实施例中,由于网信息络服务的内容不同,其需要的加密标签目的也相应不同,因此基本网络信息的选择也不同。例如一个网络信息服务提供组织为了快速识别网络服务是否为本组织所属,并帮助本组织快速定位内部负责部门和联系人,以便快速响应各种对服务的请求,可能有两种应用场景:In one embodiment, since the content of the network information network service is different, the purpose of the encryption tag required is also different, so the selection of the basic network information is also different. For example, a network information service provider organization may have two application scenarios in order to quickly identify whether the network service belongs to the organization, and help the organization quickly locate internal responsible departments and contacts, so as to quickly respond to various service requests:
1)该组织通过自动化的漏洞扫描器发现了一个网络信息服务有安全弱点急需修复,则该组织可根据扫描器的反馈(例如可以从反馈信息中获取基本网络信息),自动化的定位网络服务的负责部门和联系人,自动分配修复任务并追踪进度。该场景中,基本网络信息至少包括:网络服务名称,一种可能情况,该组织能从网络服务名称中直接确定网络服务负责部门和网络服务责任人,另一种可能情况,该组织需要结合网络服务发布时间以及对应的网络服务时间窗(有可能不同的服务时间窗对应不同的责任人)确定网络服务负责部门和网络服务责任人,又一种可能情况,该组织还需要借助反馈信息提交方式确定网络信息服务的服务途径(例如不同的网络服务平台等),从而确定网络服务负责部门和网络服务责任人。1) The organization discovers a security weakness in a network information service that needs to be repaired urgently through an automated vulnerability scanner, then the organization can automatically locate the network service based on the feedback from the scanner (for example, basic network information can be obtained from the feedback information) Responsible departments and contacts, automatically assign remediation tasks and track progress. In this scenario, the basic network information includes at least: the name of the network service. In one possible situation, the organization can directly determine the department in charge of the network service and the person in charge of the network service from the name of the network service. In another possible situation, the organization needs to combine the The service release time and the corresponding network service time window (it is possible that different service time windows correspond to different responsible persons) determine the network service responsible department and the network service responsible person. In another possible situation, the organization also needs to use the feedback information submission method Determine the service channels of network information services (such as different network service platforms, etc.), so as to determine the responsible department and person in charge of network services.
2)用户发现网络信息服务一个质量问题,可快速确定网络信息服务的提供者,并向其反馈,该组织可根据用户反馈(例如可以从反馈信息中获取基本网络信息),自动化的定位网络服务的负责部门和联系人,自动分配修复任务并追踪进度。该场景中,基本网络信息至少包括:网络服务名称和反馈信息提交方式,一种可能情况,该组织能从网络服务名称和反馈信息提交方式直接确定网络服务负责部门和网络服务责任人,另一种可能情况,该组织需要结合网络服务发布时间以及对应的网络服务时间窗(有可能不同的服务时间窗对应不同的责任人)确定网络服务负责部门和网络服务责任人。2) When a user finds a quality problem in the network information service, he can quickly determine the provider of the network information service and give feedback to it. The organization can automatically locate the network service according to the user feedback (for example, basic network information can be obtained from the feedback information) Responsible departments and contacts, automatically assign repair tasks and track progress. In this scenario, the basic network information includes at least: the name of the network service and the method of submitting the feedback information. In one possible situation, the organization can directly determine the responsible department and person in charge of the network service from the name of the network service and the method of submitting the feedback information. In this possible situation, the organization needs to determine the network service responsible department and the network service responsible person in combination with the network service release time and the corresponding network service time window (different service time windows may correspond to different responsible persons).
步骤S102,根据基本网络信息生成标签基本信息。Step S102, generating basic label information according to basic network information.
在一实施例中,对于步骤S102,有两种方式得到标签基本信息,分别是:In one embodiment, for step S102, there are two ways to obtain the basic information of the label, which are:
1)根据基本网络信息生成标签内容。该方式中按照预设的标签内容格式,其中预设格式可以是内部约定的格式,在此不做具体限定,直接将基本网络信息生成标签内容。1) Generate tag content based on basic network information. In this method, the preset tag content format is used, and the preset format may be an internally agreed format, which is not specifically limited here, and the basic network information is directly generated into the tag content.
2)将标签内容存储在预设数据库中,得到对应的标签编号。该方式中标签内容根据第一种方式得到,如果标签内容较长,则可以将标签内容预先存储在内部预设的数据库中,每个标签内容生成一个标签编号,通过标签编号能够查询到该标签内容,因此标签编号与该标签内容一一对应。2) Store the label content in the preset database, and obtain the corresponding label number. In this method, the label content is obtained according to the first method. If the label content is long, the label content can be pre-stored in the internal preset database. Each label content generates a label number, and the label can be queried through the label number. content, so the label number corresponds to the content of the label one by one.
按照上述两种方式得到标签基本信息,即标签基本信息可以是标签内容,也可以是标签编号,或者是标签内容+标签编号的形式。According to the above two methods, the basic information of the label can be obtained, that is, the basic information of the label can be the content of the label, or the number of the label, or the form of the content of the label + the number of the label.
步骤S103,根据预设加密规则对标签基本信息进行加密,生成网络信息服务加密标签。Step S103, encrypting the basic tag information according to the preset encryption rules to generate an encrypted tag for network information services.
在一实施例中,网络信息服务加密标签用于嵌入网络信息服务,以生成标签化网络信息服务。根据标签基本信息的形式将预设加密规则分为:标签内容加密规则和标签编号加密规则。In one embodiment, the web information service encryption tag is used to embed the web information service to generate tagged web information service. According to the form of basic tag information, the preset encryption rules are divided into: tag content encryption rules and tag number encryption rules.
当标签基本信息为标签内容时,标签内容加密规则包括以下一种或多种:When the basic tag information is the tag content, the tag content encryption rules include one or more of the following:
1)第一标签内容加密规则:1) First tag content encryption rules:
利用加密私钥根据标签内容生成数字签名,然后根据数字签名和标签内容进行加密,得到网络信息服务加密标签,数字签名能有效防止标签内容被篡改,不仅便于用户验证,也便于服务提供者自行验证。在一实施例中,加密私钥为非对称算法的密钥,根据数字签名和标签内容进行加密得到的网络信息服务加密标签,其中包含对应的数字证书。Use the encrypted private key to generate a digital signature based on the content of the label, and then encrypt it based on the digital signature and the content of the label to obtain an encrypted label for network information services. The digital signature can effectively prevent the content of the label from being tampered with, which is not only convenient for users to verify, but also convenient for service providers to verify themselves . In one embodiment, the encrypted private key is a key of an asymmetric algorithm, and the network information service encrypted label obtained by encrypting the digital signature and the content of the label includes a corresponding digital certificate.
2)第二标签内容加密规则:2) Encryption rules for the content of the second label:
利用加密私钥对标签内容加密生成网络信息服务加密标签。在一实施例中,加密私钥为非对称算法的密钥,上述直接利用加密私钥对标签内容进行加密作为网络信息服务加密标签。The content of the tag is encrypted using the encrypted private key to generate an encrypted tag for network information services. In one embodiment, the encryption private key is a key of an asymmetric algorithm, and the content of the tag is directly encrypted using the encryption private key as an encrypted tag for network information services.
或利用预设密钥对标签内容加密生成数字信封,然后根据数字信封生成网络信息服务加密标签。在一实施例中,预设密钥为非对称算法的密钥,当标签内容较长时,首先对标签内容加密生成数字信封,然后根据数字信封生成网络信息服务加密标签。Or use a preset key to encrypt the label content to generate a digital envelope, and then generate a network information service encrypted label according to the digital envelope. In one embodiment, the preset key is a key of an asymmetric algorithm. When the content of the label is long, the content of the label is first encrypted to generate a digital envelope, and then an encrypted network information service label is generated according to the digital envelope.
3)第三标签内容加密规则:3) Third tag content encryption rules:
利用加密私钥对根据第一标签内容加密规则或第二标签内容加密规则得到的网络信息服务加密标签加密生成数字签名,根据数字签名和网络信息服务加密标签进行加密,得到更新的网络信息服务加密标签。在一实施例中,为了实现防篡改机制,对根据第一标签内容加密规则或第二标签内容加密规则得到的网络信息服务加密标签再次利用加密私钥(此处的加密 私钥可以根据实际需求选取)进行加密生成数字签名,然后根据数字签名和网络信息服务加密标签进行加密得到更新的网络信息服务加密标签。Use the encrypted private key to encrypt the network information service encryption label obtained according to the first label content encryption rule or the second label content encryption rule to generate a digital signature, encrypt according to the digital signature and the network information service encryption label, and obtain an updated network information service encryption Label. In one embodiment, in order to realize the anti-tampering mechanism, the network information service encrypted label obtained according to the first label content encryption rule or the second label content encryption rule is used again to encrypt the private key (the encrypted private key here can be based on actual needs) Select) to encrypt to generate a digital signature, and then encrypt according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
另外,可以理解的是,如果在可信环境中,为了快速定位网络信息服务包含的标签基本信息,可以将标签内容以明文的方式进行展示,即网络信息服务加密标签即明文展示的标签基本信息。In addition, it is understandable that in a trusted environment, in order to quickly locate the basic label information contained in the network information service, the label content can be displayed in plain text, that is, the network information service encrypted label is the basic label information displayed in plain text .
当标签基本信息为标签编号时,标签编号加密规则包括以下一种或多种:When the basic information of the label is the label number, the label number encryption rules include one or more of the following:
4)第四标签编号加密规则:4) Fourth tag number encryption rule:
利用加密私钥根据标签编号生成数字签名,根据数字签名和标签编号进行加密,得到网络信息服务加密标签。在一实施例中,加密私钥为非对称算法的密钥,根据数字签名和标签编号进行加密得到的网络信息服务加密标签,其中包含对应的数字证书。The encrypted private key is used to generate a digital signature according to the tag number, and encryption is performed according to the digital signature and the tag number to obtain an encrypted tag for network information services. In one embodiment, the encrypted private key is a key of an asymmetric algorithm, and the network information service encrypted label obtained by encrypting according to the digital signature and the label number includes a corresponding digital certificate.
5)第五标签编号加密规则:5) Encryption rules for the fifth label number:
利用加密私钥对标签编号加密生成网络信息服务加密标签。在一实施例中,加密私钥为非对称算法的密钥,上述直接利用加密私钥对标签比那好进行加密作为网络信息服务加密标签。Encrypt the tag number with the encrypted private key to generate an encrypted tag for network information services. In one embodiment, the encrypted private key is a key of an asymmetric algorithm, and the above-mentioned directly uses the encrypted private key to encrypt the tag BiNA as the network information service encrypted tag.
或利用预设密钥对标签编号加密生成数字信封,根据数字信封生成网络信息服务加密标签。在一实施例中,预设密钥为非对称算法的密钥,当标签编号较长时,首先对标签编号加密生成数字信封,然后根据数字信封生成网络信息服务加密标签。Or use the preset key to encrypt the label number to generate a digital envelope, and generate a network information service encrypted label according to the digital envelope. In one embodiment, the preset key is a key of an asymmetric algorithm. When the tag number is relatively long, first encrypt the tag number to generate a digital envelope, and then generate a network information service encryption tag according to the digital envelope.
6)第六标签编号加密规则:6) Sixth tag number encryption rules:
利用加密私钥对根据第四标签编号加密规则或第五标签编号加密规则得到的网络信息服务加密标签加密生成数字签名,根据数字签名和网络信息服务加密标签进行加密,得到更新的网络信息服务加密标签。在一实施例中,为了实现防篡改机制,对根据第四标签编号加密规则或第五标签编号加密规则得到的网络信息服务加密标签再次利用加密私钥(此处的加密私钥可以根据实际需求选取)进行加密生成数字签名,然后根据数字签名和网络信息服务加密标签进行加密得到更新的网络信息服务加密标签。Use the encrypted private key to encrypt the network information service encryption label obtained according to the fourth label number encryption rule or the fifth label number encryption rule to generate a digital signature, encrypt according to the digital signature and the network information service encryption label, and obtain an updated network information service encryption Label. In one embodiment, in order to realize the anti-tampering mechanism, the network information service encryption label obtained according to the fourth label number encryption rule or the fifth label number encryption rule is used again to encrypt the private key (the encryption private key here can be based on actual needs) Select) to encrypt to generate a digital signature, and then encrypt according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
另外,可以理解的是,如果在可信环境中,当标签内容较长时,为了控制网络信息服务加密标签的长度,同时为了快速定位网络信息服务包含的标签基本信息,可以将标签内容在内部数据库中以明文进行存储,然后在网络信息服务加密标签中展示标签编号即可。In addition, it is understandable that if in a trusted environment, when the tag content is long, in order to control the length of the network information service encrypted tag and to quickly locate the basic tag information contained in the network information service, the tag content can be stored inside Store in plain text in the database, and then display the tag number in the encrypted tag of the network information service.
可以理解的是,上述预设加密规则之间可以按照需求进行选择或者组合,例如将部分标签信息作为明文提供,部分提供密文;部分提供签名保护,部分不提供,均可以,在此不做具体限定。It is understandable that the above preset encryption rules can be selected or combined according to requirements. For example, some label information is provided as plain text, and some are provided as cipher text; some are provided with signature protection, and some are not. Specific limits.
步骤S104,将网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。Step S104, writing the network information service encryption tag into a preset location in the network information service to obtain a tagged network information service.
在一实施例中,预设位置可以是便于用户获得的位置,例如Banner信息,其中Banner是网络服务常用来向用户提供一些关于服务基本信息的设置,标签化网络信息服务指该网络信息服务中包含上述网络信息服务加密标签以及对应的标签制作说明,便于用户根据该标签制作说明解析使用标签。在一具体应用场景,如下表,为一些常见的网络信息服务以及其默认的Banner信息示例。In an embodiment, the preset location may be a location that is convenient for users to obtain, such as Banner information, where Banner is a setting that is often used by network services to provide users with some basic information about services, and tagged network information services refer to the information in the network information services. Including the above network information service encryption label and corresponding label production instructions, it is convenient for users to analyze and use labels according to the label production instructions. In a specific application scenario, the following table is an example of some common network information services and their default banner information.
标号label 网络信息服务Network Information Service 默认Banner信息样例Sample of default banner information
11 Nginxnginx Nginx/1.18.0;Nginx/1.18.0;
22 IISIIS Microsoft-IIS/8.0Microsoft-IIS/8.0
33 SSHSSH SSH-2.0-OPENSSH_6.0 P1SSH-2.0-OPENSSH_6.0 P1
44 Apache HTTPDApache HTTPD Apache/2.4.6Apache/2.4.6
在一实施例中,得到标签化网络信息服务后,将标签化网络信息服务进行上线,为相关用户提供对应的网络信息服务。In one embodiment, after the tagged network information service is obtained, the tagged network information service is launched to provide corresponding network information services for relevant users.
由于本实施例中提供的标签化网络信息服务中包含网络信息服务加密标签,因此可以和网络服务提供商约定在网络信息服务的不同服务状态节点上,例如一个上线的标签化网络服 务在安装-调用-更新等不同的服务状态节点上,均可以根据需求显示对应的网络信息服务加密标签信息(或者经过解密操作后的基本网络信息),以便用户在需要进行反馈时,能够及时得到对应的反馈路径。Since the tagged network information service provided in this embodiment includes a network information service encryption tag, it can be agreed with the network service provider on different service status nodes of the network information service, for example, an online tagged network service is installed- On different service status nodes such as call-update, the corresponding encrypted label information of network information services (or basic network information after decryption operation) can be displayed according to requirements, so that users can get corresponding feedback in time when they need feedback path.
本申请实施例提出的标签化网络信息服务生成方法,通过获取网络信息服务的基本网络信息,根据基本网络信息生成标签基本信息,根据预设加密规则对标签基本信息进行加密,生成网络信息服务加密标签,将网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。本申请实施例能够结合多种预设加密规则为网络信息服务添加标签信息得到网络信息服务加密标签,便于网络服务的用户根据网络信息服务加密标签识别网络服务提供者,也便于提供者根据网络信息服务加密标签自动识别其服务的各种信息,自动化地处理用户的各种反馈,能够提高服务效率,及时响应用户对网络信息服务的各种反馈,节约人力成本,从而达到对质量问题的快速追溯和修复。The tagged network information service generation method proposed in the embodiment of this application obtains the basic network information of the network information service, generates tag basic information according to the basic network information, encrypts the tag basic information according to preset encryption rules, and generates network information service encryption. A tag, writing the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service. The embodiment of the present application can combine multiple preset encryption rules to add label information to network information services to obtain network information service encryption labels, which is convenient for network service users to identify network service providers based on network information service encryption labels, and also facilitates providers to identify network service providers based on network information The service encryption label automatically identifies various information of its services, automatically processes various feedbacks from users, can improve service efficiency, respond to various feedbacks from users on network information services in a timely manner, save labor costs, and achieve rapid traceability of quality problems and fixes.
图2是本申请实施例提供的一种标签化网络信息服务应用方法的一个可选的流程图,包括但不限于步骤S210至S250。Fig. 2 is an optional flow chart of a tagged network information service application method provided by an embodiment of the present application, including but not limited to steps S210 to S250.
步骤S210,获取标签化网络信息服务,该实施例中,用户在网络信息服务中获得的是标签化标签化网络信息服务。Step S210, obtaining tagged network information services. In this embodiment, what the user obtains from the network information services is tagged network information services.
步骤S220,从标签化网络信息服务中提取网络信息服务加密标签。Step S220, extracting the network information service encryption tag from the tagged network information service.
在一实施例中,用户根据自己获取的标签化网络信息服务,通过预设的获取方式获取网络信息服务加密标签,预设的获取方式例如预设路径、预设方式或者预设位置(例如Banner信息)。网络信息服务加密标签根据上述实施例中标签化网络信息服务生成方法生成。由于标签化网络信息服务指该网络信息服务中包含网络信息服务加密标签以及对应的标签制作说明,用户可以根据标签制作说明得到网络信息服务加密标签的各组成部分,例如预设加密规则。In one embodiment, according to the tagged network information service obtained by the user, the user obtains the encrypted label of the network information service through a preset acquisition method, such as a preset path, a preset method, or a preset location (for example, Banner information). The network information service encryption label is generated according to the tagged network information service generation method in the above embodiment. Since the tagged network information service means that the network information service includes the network information service encryption label and the corresponding label production instructions, the user can obtain the various components of the network information service encryption label according to the label production instructions, such as the preset encryption rules.
步骤S230,根据预设加密规则,提取网络信息服务加密标签的标签基本信息,进一步地,提取网络信息服务加密标签的加密信息。Step S230, according to the preset encryption rules, extract the basic label information of the network information service encrypted label, and further, extract the encrypted information of the network information service encrypted label.
在一实施例中,例如预设加密规则是第一标签内容加密规则,则利用对应的加密密钥提取网络信息服务加密标签的标签内容和数字签名。当加密信息为数字签名时,用户需要进行标签有效性验证,主要是验证数字签名的有效性以及数字签名对应签名证书的有效性,验证通过后,进入步骤S240。In one embodiment, for example, if the preset encryption rule is the first tag content encryption rule, then the tag content and the digital signature of the network information service encrypted tag are extracted using the corresponding encryption key. When the encrypted information is a digital signature, the user needs to verify the validity of the label, mainly to verify the validity of the digital signature and the validity of the signature certificate corresponding to the digital signature. After the verification is passed, go to step S240.
步骤S240,根据标签基本信息获取对应的基本网络信息,该实施例中,从对标签基本信息的格式进行解码,得到对应的基本网络信息。In step S240, the corresponding basic network information is acquired according to the basic label information. In this embodiment, the corresponding basic network information is obtained by decoding the format of the basic label information.
步骤S250,根据基本网络信息提供对应的网络服务。Step S250, providing corresponding network services according to the basic network information.
在一实施例中,验证通过后,无论内外部用户,都根据数字签名确定此网络信息服务的提供者是哪个组织,同时该组织收到用户反馈时,只要根据反馈中带的标签基本信息(例如,无论标签基本信息是否加密,该组织都能使用预设的私钥进行解密,如果标签基本信息是标签编号,则组织能通过内部数据库查询到该标签编号对应的标签内容),该组织能自动根据标签基本信息快速定位是哪个网络服务,应该由哪个部门来处理用户的反馈或改进服务的质量。例如用户反馈某个服务有安全漏洞急需修复,用户通过数字签名能唯一确定服务提供者,服务提供者通过反馈中带的标签基本信息,自动化的定位服务的内部负责团队和联系人进行处置。In one embodiment, after the verification is passed, both internal and external users will determine which organization the provider of the network information service is based on the digital signature. For example, no matter whether the basic tag information is encrypted or not, the organization can use the preset private key to decrypt it. If the basic tag information is the tag number, the organization can query the tag content corresponding to the tag number through the internal database), the organization can Automatically quickly locate the network service based on the basic information of the label, and which department should handle the user's feedback or improve the quality of the service. For example, if a user reports that a service has a security vulnerability that needs to be repaired urgently, the user can uniquely identify the service provider through the digital signature, and the service provider can automatically locate the internal responsible team and contact person of the service through the basic information of the label in the feedback.
在一实施例中,由于本实施例中提供的标签化网络信息服务中包含网络信息服务加密标签,因此可以根据和网络服务提供商约定,获取标签化网络信息服务的服务状态节点,在不同的网络状态节点显示对应的基本网络信息,以便用户在需要进行反馈时,能够及时得到对应的反馈路径。In one embodiment, since the tagged network information service provided in this embodiment includes a network information service encryption tag, the service status node of the tagged network information service can be obtained according to an agreement with the network service provider, and in different The network status node displays the corresponding basic network information, so that users can get the corresponding feedback path in time when they need to give feedback.
例如用户发现网络信息服务一个质量问题,可根据显示的标签基本信息,快速确定网络信息服务的提供者,并向其反馈(例如一个网络信息服务的使用漏洞急需修复),该组织可根据用户反馈(例如可以从反馈信息中获取基本网络信息),快速定位内部负责部门和联系 人,以便快速响应各种对服务的请求,自动化的定位网络服务的负责部门和联系人,自动分配修复任务并追踪进度。该场景中,基本网络信息至少包括:网络服务名称、网络服务发布时间以及对应的网络服务时间窗和反馈信息提交方式,从而确定网络服务负责部门和网络服务责任人。For example, if a user finds a quality problem in the network information service, he can quickly determine the provider of the network information service according to the basic information displayed on the label, and give feedback to it (for example, a loophole in the use of the network information service needs to be repaired urgently), and the organization can base on the user feedback (For example, basic network information can be obtained from feedback information), quickly locate internal responsible departments and contacts, so as to quickly respond to various service requests, automatically locate responsible departments and contacts for network services, automatically assign repair tasks and track schedule. In this scenario, the basic network information includes at least: the name of the network service, the release time of the network service, the corresponding time window of the network service, and the method of submitting feedback information, so as to determine the responsible department and person in charge of the network service.
本申请实施例提出的标签化网络信息服务应用方法,通过获取标签化网络信息服务,从标签化网络信息服务中提取网络信息服务加密标签,根据预设加密规则,提取网络信息服务加密标签的标签基本信息,根据标签基本信息获取对应的基本网络信息,根据基本网络信息定位对应的网络服务。本申请实施例能够结合多种预设加密规则为网络信息服务添加标签信息得到网络信息服务加密标签,便于网络服务的用户根据网络信息服务加密标签识别网络服务提供者,也便于提供者根据网络信息服务加密标签自动识别其服务的各种信息,自动化地处理用户的各种反馈,能够提高服务效率,及时响应用户对网络信息服务的各种反馈,节约人力成本,从而达到对质量问题的快速追溯和修复。The tagged network information service application method proposed in the embodiment of the present application obtains the tagged network information service, extracts the network information service encryption tag from the tagged network information service, and extracts the tag of the network information service encryption tag according to the preset encryption rules Basic information, obtain the corresponding basic network information according to the basic information of the label, and locate the corresponding network service according to the basic network information. The embodiment of the present application can combine multiple preset encryption rules to add label information to network information services to obtain network information service encryption labels, which is convenient for network service users to identify network service providers based on network information service encryption labels, and also facilitates providers to identify network service providers based on network information The service encryption label automatically identifies various information of its services, automatically processes various feedbacks from users, can improve service efficiency, respond to various feedbacks from users on network information services in a timely manner, save labor costs, and achieve rapid traceability of quality problems and fixes.
本申请实施例还提供一种标签化网络信息服务生成装置,可以实现上述标签化网络信息服务生成方法,图3是本申请实施例提供的一种标签化网络信息服务生成装置的一个可选的结构框图,包括:The embodiment of the present application also provides a tagged network information service generation device, which can realize the above-mentioned tagged network information service generation method. Figure 3 is an optional example of a tagged network information service generation device provided in the embodiment of the present application. Structure block diagram, including:
基本网络信息获取模块310,用于获取网络信息服务的基本网络信息;A basic network information acquisition module 310, configured to acquire basic network information of network information services;
标签基本信息生成模块320,用于根据基本网络信息生成标签基本信息;The label basic information generation module 320 is used for generating label basic information according to the basic network information;
加密模块330,用于根据预设加密规则对标签基本信息进行加密,生成网络信息服务加密标签;An encryption module 330, configured to encrypt the basic information of the label according to preset encryption rules to generate an encrypted label for network information services;
标签化网络信息服务生成模块340,用于将网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。The tagged network information service generating module 340 is configured to write the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service.
本申请实施例还提供一种网络信息服务加密标签应用装置,可以实现上述网络信息服务加密标签应用方法,图4是本申请实施例提供的一种标签化网络信息服务应用装置的一个可选的结构框图,包括:The embodiment of the present application also provides a network information service encryption label application device, which can implement the above-mentioned network information service encryption label application method. Figure 4 is an optional labeling network information service application device provided in the embodiment of the application. Structure block diagram, including:
标签化网络信息服务获取模块410,用于获取标签化网络信息服务;A tagged network information service acquisition module 410, configured to acquire tagged network information services;
网络信息服务加密标签提取模块420,用于从标签化网络信息服务中提取网络信息服务加密标签;The network information service encrypted label extraction module 420 is used to extract the network information service encrypted label from the labeled network information service;
标签基本信息提取模块430,用于根据预设加密规则,提取网络信息服务加密标签的标签基本信息;The basic label information extraction module 430 is used to extract the basic label information of the encrypted label of the network information service according to the preset encryption rules;
基本网络信息提取模块440,用于根据标签基本信息获取对应的基本网络信息;A basic network information extraction module 440, configured to obtain corresponding basic network information according to the basic information of the label;
网络服务模块450,用于根据基本网络信息定位对应的网络服务。The network service module 450 is configured to locate corresponding network services according to the basic network information.
本实施例的标签化网络信息服务生成装置的具体实施方式与上述标签化网络信息服务生成方法的具体实施方式基本一致,在此不再赘述。The specific implementation manner of the tagged network information service generation apparatus of this embodiment is basically the same as the specific implementation manner of the above-mentioned tagged network information service generation method, and will not be repeated here.
本申请实施例还提供了一种电子设备,包括:The embodiment of the present application also provides an electronic device, including:
至少一个存储器;at least one memory;
至少一个处理器;at least one processor;
至少一个程序;at least one program;
所述程序被存储在存储器中,处理器执行所述至少一个程序以实现一种标签化网络信息服务生成方法或一种标签化网络信息服务应用方法;The programs are stored in the memory, and the processor executes the at least one program to implement a tagged network information service generation method or a tagged network information service application method;
其中,所述标签化网络信息服务生成方法包括:Wherein, the tagged network information service generation method includes:
获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
根据基本网络信息生成标签基本信息;Generate basic label information based on basic network information;
根据预设加密规则对标签基本信息进行加密,生成网络信息服务加密标签;Encrypt the basic information of the label according to the preset encryption rules to generate an encrypted label for network information services;
将网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务;Write the network information service encrypted label into the preset position in the network information service to obtain the labeled network information service;
其中,所述标签化网络信息服务应用方法包括:Wherein, the tagged network information service application method includes:
获取标签化网络信息服务;Obtain tagged network information services;
从标签化网络信息服务中提取网络信息服务加密标签;extracting network information service encryption tags from tagged network information services;
根据预设加密规则,提取网络信息服务加密标签的标签基本信息;According to the preset encryption rules, extract the basic label information of the encrypted label of the network information service;
根据标签基本信息获取对应的基本网络信息;Obtain the corresponding basic network information according to the basic information of the label;
根据基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
该电子设备可以为包括手机、平板电脑、个人数字助理(Personal Digital Assistant,简称PDA)、车载电脑等任意智能终端。The electronic device may be any intelligent terminal including a mobile phone, a tablet computer, a personal digital assistant (PDA for short), a vehicle-mounted computer, and the like.
请参阅图5,图5示意了另一实施例的电子设备的硬件结构,电子设备包括:Please refer to FIG. 5. FIG. 5 illustrates a hardware structure of an electronic device in another embodiment. The electronic device includes:
处理器501,可以采用通用的CPU(CentralProcessingUnit,中央处理器)、微处理器、应用专用集成电路(ApplicationSpecificIntegratedCircuit,ASIC)、或者一个或多个集成电路等方式实现,用于执行相关程序,以实现本申请实施例所提供的技术方案;The processor 501 may be implemented by a general-purpose CPU (Central Processing Unit, central processing unit), a microprocessor, an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, and is used to execute related programs to realize The technical solutions provided by the embodiments of the present application;
存储器502,可以采用ROM(ReadOnlyMemory,只读存储器)、静态存储设备、动态存储设备或者RAM(RandomAccessMemory,随机存取存储器)等形式实现。存储器502可以存储操作系统和其他应用程序,在通过软件或者固件来实现本说明书实施例所提供的技术方案时,相关的程序代码保存在存储器502中,并由处理器501来调用执行本申请实施例的标签化网络信息服务生成方法;The memory 502 may be implemented in the form of a ROM (ReadOnly Memory, read only memory), a static storage device, a dynamic storage device, or a RAM (Random Access Memory, random access memory). The memory 502 can store operating systems and other application programs. When implementing the technical solutions provided by the embodiments of this specification through software or firmware, the relevant program codes are stored in the memory 502 and called by the processor 501 to execute the implementation of this application. Example tagged network information service generation method;
输入/输出接口503,用于实现信息输入及输出;The input/output interface 503 is used to realize information input and output;
通信接口504,用于实现本设备与其他设备的通信交互,可以通过有线方式(例如USB、网线等)实现通信,也可以通过无线方式(例如移动网络、WIFI、蓝牙等)实现通信;和The communication interface 504 is used to realize the communication interaction between the device and other devices, and the communication can be realized through a wired method (such as USB, network cable, etc.), or can be realized through a wireless method (such as a mobile network, WIFI, Bluetooth, etc.); and
总线505,在设备的各个组件(例如处理器501、存储器502、输入/输出接口503和通信接口504)之间传输信息;A bus 505, which transmits information between various components of the device (such as a processor 501, a memory 502, an input/output interface 503 and a communication interface 504);
其中处理器501、存储器502、输入/输出接口503和通信接口504通过总线505实现彼此之间在设备内部的通信连接。The processor 501 , the memory 502 , the input/output interface 503 and the communication interface 504 are connected to each other within the device through the bus 505 .
本申请实施例还提供了一种存储介质,该存储介质是计算机可读存储介质,该计算机可读存储介质存储有计算机可执行指令,该计算机可执行指令用于使计算机执行一种标签化网络信息服务生成方法或一种标签化网络信息服务应用方法;The embodiment of the present application also provides a storage medium, the storage medium is a computer-readable storage medium, and the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer execute a tagged network An information service generation method or a tagged network information service application method;
其中,所述标签化网络信息服务生成方法包括:Wherein, the tagged network information service generation method includes:
获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
根据基本网络信息生成标签基本信息;Generate basic label information based on basic network information;
根据预设加密规则对标签基本信息进行加密,生成网络信息服务加密标签;Encrypt the basic information of the label according to the preset encryption rules to generate an encrypted label for network information services;
将网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务;Write the network information service encrypted label into the preset position in the network information service to obtain the labeled network information service;
其中,所述标签化网络信息服务应用方法包括:Wherein, the tagged network information service application method includes:
获取标签化网络信息服务;Obtain tagged network information services;
从标签化网络信息服务中提取网络信息服务加密标签;extracting network information service encryption tags from tagged network information services;
根据预设加密规则,提取网络信息服务加密标签的标签基本信息;According to the preset encryption rules, extract the basic label information of the encrypted label of the network information service;
根据标签基本信息获取对应的基本网络信息;Obtain the corresponding basic network information according to the basic information of the label;
根据基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
本申请实施例提出的标签化网络信息服务生成方法、应用方法、设备及存储介质,能够结合多种预设加密规则为网络信息服务添加标签信息得到网络信息服务加密标签,便于网络服务的用户根据网络信息服务加密标签识别网络服务提供者,也便于提供者根据网络信息服务加密标签自动识别其服务的各种信息,自动化地处理用户的各种反馈,能够提高服务效率,及时响应用户对网络信息服务的各种反馈,节约人力成本,从而达到对质量问题的快速追溯和修复。The tagged network information service generation method, application method, device, and storage medium proposed in the embodiments of the present application can add tag information to network information services in combination with various preset encryption rules to obtain encrypted tags for network information services, which is convenient for users of network services according to The network information service encryption label identifies the network service provider, and it is also convenient for the provider to automatically identify various information of its services according to the network information service encryption label, and automatically process various feedbacks from users, which can improve service efficiency and respond to users' requests for network information in a timely manner. Various feedbacks on services save manpower costs, so as to achieve rapid traceability and repair of quality problems.
所述计算机可读存储介质可以是非易失性,也可以是易失性。存储器作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序以及非暂态性计算机可执行程序。此外,存储器可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施方式中,存储器可选包括相对于处理器 远程设置的存储器,这些远程存储器可以通过网络连接至该处理器。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The computer-readable storage medium may be non-volatile or volatile. As a non-transitory computer-readable storage medium, memory can be used to store non-transitory software programs and non-transitory computer-executable programs. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage devices. In some embodiments, the memory optionally includes memory located remotely from the processor, which remote memory may be connected to the processor via a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
本申请实施例描述的实施例是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域技术人员可知,随着技术的演变和新应用场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。The embodiments described in the embodiments of the present application are to illustrate the technical solutions of the embodiments of the present application more clearly, and do not constitute a limitation to the technical solutions provided by the embodiments of the present application. Those skilled in the art know that with the evolution of technology and new For the emergence of application scenarios, the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems.
本领域技术人员可以理解的是,图1-5中示出的技术方案并不构成对本申请实施例的限定,可以包括比图示更多或更少的步骤,或者组合某些步骤,或者不同的步骤。Those skilled in the art can understand that the technical solutions shown in Figures 1-5 do not constitute a limitation to the embodiments of the present application, and may include more or fewer steps than those shown in the illustrations, or combine certain steps, or be different A step of.
以上所描述的装置实施例仅仅是示意性的,其中作为分离部件说明的单元可以是或者也可以不是物理上分开的,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。The device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、设备中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。Those of ordinary skill in the art can understand that all or some of the steps in the methods disclosed above, the functional modules/units in the system, and the device can be implemented as software, firmware, hardware, and an appropriate combination thereof.
本申请的说明书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth", etc. (if any) in the description of the present application and the above drawings are used to distinguish similar objects and not necessarily to describe specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessarily limited to the expressly listed instead, may include other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.
应当理解,在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”,其中a,b,c可以是单个,也可以是多个。It should be understood that in this application, "at least one (item)" means one or more, and "multiple" means two or more. "And/or" is used to describe the association relationship of associated objects, indicating that there can be three types of relationships, for example, "A and/or B" can mean: only A exists, only B exists, and A and B exist at the same time , where A and B can be singular or plural. The character "/" generally indicates that the contextual objects are an "or" relationship. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one item (piece) of a, b or c can mean: a, b, c, "a and b", "a and c", "b and c", or "a and b and c ", where a, b, c can be single or multiple.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括多指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等各种可以存储程序的介质。If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including multiple instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, referred to as ROM), random access memory (Random Access Memory, referred to as RAM), magnetic disk or optical disc, etc., which can store programs. medium.
以上参照附图说明了本申请实施例的优选实施例,并非因此局限本申请实施例的权利范 围。本领域技术人员不脱离本申请实施例的范围和实质内所作的任何修改、等同替换和改进,均应在本申请实施例的权利范围之内。The preferred embodiments of the embodiments of the present application have been described above with reference to the accompanying drawings, and are not intended to limit the scope of rights of the embodiments of the present application. Any modifications, equivalent replacements and improvements made by those skilled in the art without departing from the scope and essence of the embodiments of the present application shall fall within the scope of rights of the embodiments of the present application.

Claims (20)

  1. 一种标签化网络信息服务生成方法,其中,包括:A tagged network information service generation method, including:
    获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
    根据所述基本网络信息生成标签基本信息;generating basic label information according to the basic network information;
    根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;encrypting the basic tag information according to preset encryption rules to generate the network information service encrypted tag;
    将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。The network information service encryption label is written into a preset position in the network information service to obtain a labeled network information service.
  2. 根据权利要求1所述的标签化网络信息服务生成方法,其中,所述根据所述基本网络信息生成标签基本信息,包括:The method for generating labeled network information services according to claim 1, wherein said generating label basic information according to said basic network information comprises:
    根据所述基本网络信息生成所述标签内容;generating the label content according to the basic network information;
    将所述标签内容存储在预设数据库中,得到对应的标签编号;storing the label content in a preset database to obtain a corresponding label number;
    根据所述标签内容和/或所述标签编号得到所述标签基本信息。The basic tag information is obtained according to the tag content and/or the tag number.
  3. 根据权利要求1或2任一项所述的标签化网络信息服务生成方法,其中,所述预设加密规则包括:标签内容加密规则和标签编号加密规则,所述根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签,包括:The tagged network information service generation method according to any one of claims 1 or 2, wherein the preset encryption rules include: tag content encryption rules and tag number encryption rules, and the The basic information of the label is encrypted to generate the encrypted label of the network information service, including:
    所述标签基本信息为标签内容时,所述标签内容加密规则包括以下一种或多种:When the tag basic information is tag content, the tag content encryption rules include one or more of the following:
    第一标签内容加密规则:First label content encryption rules:
    利用加密私钥根据所述标签内容生成数字签名;Generate a digital signature according to the content of the label by using the encrypted private key;
    根据所述数字签名和所述标签内容进行加密,得到所述网络信息服务加密标签;Encrypting according to the digital signature and the content of the label to obtain the network information service encrypted label;
    第二标签内容加密规则:Encryption rules for the content of the second label:
    利用加密私钥对所述标签内容加密生成所述网络信息服务加密标签;Encrypting the tag content with an encrypted private key to generate the network information service encrypted tag;
    或,or,
    利用预设密钥对所述标签内容加密生成数字信封;Using a preset key to encrypt the content of the label to generate a digital envelope;
    根据所述数字信封生成所述网络信息服务加密标签;generating the network information service encryption label according to the digital envelope;
    第三标签内容加密规则:Third tag content encryption rules:
    利用加密私钥对根据所述第一标签内容加密规则或所述第二标签内容加密规则得到的所述网络信息服务加密标签加密生成数字签名;Encrypting the network information service encryption tag obtained according to the first tag content encryption rule or the second tag content encryption rule by using an encrypted private key to generate a digital signature;
    根据所述数字签名和所述网络信息服务加密标签进行加密,得到更新的所述网络信息服务加密标签;performing encryption according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label;
    所述标签基本信息为标签编号时,所述标签编号加密规则包括以下一种或多种:When the tag basic information is a tag number, the tag number encryption rules include one or more of the following:
    第四标签编号加密规则:Fourth label number encryption rules:
    利用加密私钥根据所述标签编号生成数字签名;Generate a digital signature based on the tag number using an encrypted private key;
    根据所述数字签名和所述标签编号进行加密,得到所述网络信息服务加密标签;Encrypting according to the digital signature and the label number to obtain the network information service encrypted label;
    第五标签编号加密规则:Fifth label number encryption rules:
    利用加密私钥对所述标签编号加密生成所述网络信息服务加密标签;Encrypting the tag number with an encrypted private key to generate the network information service encrypted tag;
    或,or,
    利用预设密钥对所述标签编号加密生成数字信封;Using a preset key to encrypt the label number to generate a digital envelope;
    根据所述数字信封生成所述网络信息服务加密标签;generating the network information service encryption label according to the digital envelope;
    第六标签编号加密规则:Sixth tag number encryption rules:
    利用加密私钥对根据所述第四标签编号加密规则或所述第五标签编号加密规则得到的所述网络信息服务加密标签加密生成数字签名;Encrypting the network information service encrypted tag obtained according to the fourth tag number encryption rule or the fifth tag number encryption rule by using an encrypted private key to generate a digital signature;
    根据所述数字签名和所述网络信息服务加密标签进行加密,得到更新的所述网络信息服务加密标签。Encryption is performed according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
  4. 一种标签化网络信息服务应用方法,其中,包括:A tagged network information service application method, including:
    获取标签化网络信息服务;Obtain tagged network information services;
    从所述标签化网络信息服务中提取网络信息服务加密标签;Extracting a network information service encryption tag from the tagged network information service;
    根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;According to preset encryption rules, extract the basic label information of the network information service encryption label;
    根据所述标签基本信息获取对应的基本网络信息;Obtain corresponding basic network information according to the basic information of the tag;
    根据所述基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
  5. 根据权利要求4所述的一种标签化网络信息服务应用方法,其中,还包括:根据预设加密规则,提取所述网络信息服务加密标签的加密信息;A tagged network information service application method according to claim 4, further comprising: extracting the encryption information of the network information service encryption tag according to preset encryption rules;
    当所述加密信息为数字签名时,则验证所述数字签名的有效性以及所述数字签名对应签名证书的有效性;When the encrypted information is a digital signature, verify the validity of the digital signature and the validity of the signature certificate corresponding to the digital signature;
    验证通过后,根据所述标签基本信息获取对应的基本网络信息。After the verification is passed, the corresponding basic network information is obtained according to the basic information of the tag.
  6. 根据权利要求5所述的一种标签化网络信息服务应用方法,其中,还包括:A tagged network information service application method according to claim 5, further comprising:
    获取所述标签化网络信息服务的服务状态节点;Acquiring the service status node of the tagged network information service;
    根据所述服务状态节点显示对应的基本网络信息。The corresponding basic network information is displayed according to the service status node.
  7. 一种标签化网络信息服务生成装置,其中,包括:A device for generating tagged network information services, including:
    基本网络信息获取模块,用于获取网络信息服务的基本网络信息;The basic network information acquisition module is used to obtain the basic network information of the network information service;
    标签基本信息生成模块,用于根据所述基本网络信息生成标签基本信息;A tag basic information generating module, configured to generate tag basic information according to the basic network information;
    加密模块,用于根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;An encryption module, configured to encrypt the basic information of the label according to preset encryption rules, and generate the network information service encryption label;
    标签化网络信息服务生成模块,用于将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务。The tagged network information service generation module is used to write the encrypted tag of the network information service into a preset position in the network information service to obtain the tagged network information service.
  8. 一种标签化网络信息服务应用装置,其中,包括:A tagged network information service application device, including:
    标签化网络信息服务获取模块,用于获取标签化网络信息服务;A tagged network information service acquisition module, configured to obtain tagged network information services;
    网络信息服务加密标签提取模块,用于从所述标签化网络信息服务中提取网络信息服务加密标签;A network information service encrypted label extraction module, configured to extract the network information service encrypted label from the labeled network information service;
    标签基本信息提取模块,用于根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;The tag basic information extraction module is used to extract the tag basic information of the network information service encrypted tag according to preset encryption rules;
    基本网络信息提取模块,用于根据所述标签基本信息获取对应的基本网络信息;A basic network information extraction module, configured to obtain corresponding basic network information according to the basic information of the label;
    网络服务模块,用于根据所述基本网络信息定位对应的网络服务。A network service module, configured to locate corresponding network services according to the basic network information.
  9. 一种电子设备,其中,包括:An electronic device, comprising:
    至少一个存储器;at least one memory;
    至少一个处理器;at least one processor;
    至少一个程序;at least one program;
    所述程序被存储在存储器中,处理器执行所述至少一个程序以实现:一种标签化网络信息服务生成方法或一种标签化网络信息服务应用方法;The program is stored in the memory, and the processor executes the at least one program to realize: a tagged network information service generation method or a tagged network information service application method;
    其中,所述标签化网络信息服务生成方法包括:Wherein, the tagged network information service generation method includes:
    获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
    根据所述基本网络信息生成标签基本信息;generating basic label information according to the basic network information;
    根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;encrypting the basic tag information according to preset encryption rules to generate the network information service encrypted tag;
    将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务;Writing the network information service encryption tag into a preset position in the network information service to obtain a tagged network information service;
    其中,所述标签化网络信息服务应用方法包括:Wherein, the tagged network information service application method includes:
    获取标签化网络信息服务;Obtain tagged network information services;
    从所述标签化网络信息服务中提取网络信息服务加密标签;Extracting a network information service encryption tag from the tagged network information service;
    根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;According to preset encryption rules, extract the basic label information of the network information service encryption label;
    根据所述标签基本信息获取对应的基本网络信息;Obtain corresponding basic network information according to the basic information of the tag;
    根据所述基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
  10. 根据权利要求9所述的电子设备,其中,所述根据所述基本网络信息生成标签基本信息,包括:The electronic device according to claim 9, wherein said generating basic label information according to said basic network information comprises:
    根据所述基本网络信息生成所述标签内容;generating the label content according to the basic network information;
    将所述标签内容存储在预设数据库中,得到对应的标签编号;storing the label content in a preset database to obtain a corresponding label number;
    根据所述标签内容或所述标签编号得到所述标签基本信息。The basic label information is obtained according to the label content or the label number.
  11. 根据权利要求9所述的电子设备,其中,所述根据所述基本网络信息生成标签基本信息,包括:The electronic device according to claim 9, wherein said generating basic label information according to said basic network information comprises:
    根据所述基本网络信息生成所述标签内容;generating the label content according to the basic network information;
    将所述标签内容存储在预设数据库中,得到对应的标签编号;storing the label content in a preset database to obtain a corresponding label number;
    根据所述标签内容和所述标签编号得到所述标签基本信息。The basic label information is obtained according to the label content and the label number.
  12. 根据权利要求9至11任一项所述的电子设备,其中,所述预设加密规则包括:标签内容加密规则和标签编号加密规则,所述根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签,包括:The electronic device according to any one of claims 9 to 11, wherein the preset encryption rules include: tag content encryption rules and tag number encryption rules, and the basic tag information is encrypted according to the preset encryption rules , generating the network information service encryption tag, including:
    所述标签基本信息为标签内容时,所述标签内容加密规则包括以下一种或多种:When the tag basic information is tag content, the tag content encryption rules include one or more of the following:
    第一标签内容加密规则:First label content encryption rules:
    利用加密私钥根据所述标签内容生成数字签名;Generate a digital signature according to the content of the label by using the encrypted private key;
    根据所述数字签名和所述标签内容进行加密,得到所述网络信息服务加密标签;Encrypting according to the digital signature and the content of the label to obtain the network information service encrypted label;
    第二标签内容加密规则:Encryption rules for the content of the second label:
    利用加密私钥对所述标签内容加密生成所述网络信息服务加密标签;Encrypting the tag content with an encrypted private key to generate the network information service encrypted tag;
    或,or,
    利用预设密钥对所述标签内容加密生成数字信封;Using a preset key to encrypt the content of the label to generate a digital envelope;
    根据所述数字信封生成所述网络信息服务加密标签;generating the network information service encryption label according to the digital envelope;
    第三标签内容加密规则:Third tag content encryption rules:
    利用加密私钥对根据所述第一标签内容加密规则或所述第二标签内容加密规则得到的所述网络信息服务加密标签加密生成数字签名;Encrypting the network information service encryption tag obtained according to the first tag content encryption rule or the second tag content encryption rule by using an encrypted private key to generate a digital signature;
    根据所述数字签名和所述网络信息服务加密标签进行加密,得到更新的所述网络信息服务加密标签;performing encryption according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label;
    所述标签基本信息为标签编号时,所述标签编号加密规则包括以下一种或多种:When the tag basic information is a tag number, the tag number encryption rules include one or more of the following:
    第四标签编号加密规则:Fourth label number encryption rules:
    利用加密私钥根据所述标签编号生成数字签名;Generate a digital signature based on the tag number using an encrypted private key;
    根据所述数字签名和所述标签编号进行加密,得到所述网络信息服务加密标签;Encrypting according to the digital signature and the label number to obtain the network information service encrypted label;
    第五标签编号加密规则:Fifth label number encryption rules:
    利用加密私钥对所述标签编号加密生成所述网络信息服务加密标签;Encrypting the tag number with an encrypted private key to generate the network information service encrypted tag;
    或,or,
    利用预设密钥对所述标签编号加密生成数字信封;Using a preset key to encrypt the label number to generate a digital envelope;
    根据所述数字信封生成所述网络信息服务加密标签;generating the network information service encryption label according to the digital envelope;
    第六标签编号加密规则:Sixth tag number encryption rules:
    利用加密私钥对根据所述第四标签编号加密规则或所述第五标签编号加密规则得到的所述网络信息服务加密标签加密生成数字签名;Encrypting the network information service encrypted tag obtained according to the fourth tag number encryption rule or the fifth tag number encryption rule by using an encrypted private key to generate a digital signature;
    根据所述数字签名和所述网络信息服务加密标签进行加密,得到更新的所述网络信息服务加密标签。Encryption is performed according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
  13. 根据权利要求9所述的电子设备,其中,一种标签化网络信息服务应用方法还包括:根据预设加密规则,提取所述网络信息服务加密标签的加密信息;The electronic device according to claim 9, wherein the labeling network information service application method further comprises: extracting the encryption information of the network information service encryption label according to a preset encryption rule;
    当所述加密信息为数字签名时,则验证所述数字签名的有效性以及所述数字签名对应签名证书的有效性;When the encrypted information is a digital signature, verify the validity of the digital signature and the validity of the signature certificate corresponding to the digital signature;
    验证通过后,根据所述标签基本信息获取对应的基本网络信息。After the verification is passed, the corresponding basic network information is obtained according to the basic information of the tag.
  14. 根据权利要求13所述的电子设备,其中,一种标签化网络信息服务应用方法还包括:The electronic device according to claim 13, wherein a tagged network information service application method further comprises:
    获取所述标签化网络信息服务的服务状态节点;Acquiring the service status node of the tagged network information service;
    根据所述服务状态节点显示对应的基本网络信息。The corresponding basic network information is displayed according to the service status node.
  15. 一种存储介质,所述存储介质为计算机可读存储介质,其中,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行:一种标签化网络信息服务生成方法或一种标签化网络信息服务应用方法;A storage medium, the storage medium is a computer-readable storage medium, wherein the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer execute: a tagged network information A service generation method or a tagged network information service application method;
    其中,所述标签化网络信息服务生成方法包括:Wherein, the tagged network information service generation method includes:
    获取网络信息服务的基本网络信息;Obtain basic network information for network information services;
    根据所述基本网络信息生成标签基本信息;generating basic label information according to the basic network information;
    根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签;encrypting the basic tag information according to preset encryption rules to generate the network information service encrypted tag;
    将所述网络信息服务加密标签写入网络信息服务中预设位置,得到标签化网络信息服务;Writing the network information service encryption tag into a preset position in the network information service to obtain a tagged network information service;
    其中,所述标签化网络信息服务应用方法包括:Wherein, the tagged network information service application method includes:
    获取标签化网络信息服务;Obtain tagged network information services;
    从所述标签化网络信息服务中提取网络信息服务加密标签;Extracting a network information service encryption tag from the tagged network information service;
    根据预设加密规则,提取所述网络信息服务加密标签的标签基本信息;According to preset encryption rules, extract the basic label information of the network information service encryption label;
    根据所述标签基本信息获取对应的基本网络信息;Obtain corresponding basic network information according to the basic information of the tag;
    根据所述基本网络信息定位对应的网络服务。The corresponding network service is located according to the basic network information.
  16. 根据权利要求15所述的存储介质,其中,所述根据所述基本网络信息生成标签基本信息,包括:The storage medium according to claim 15, wherein said generating basic label information according to said basic network information comprises:
    根据所述基本网络信息生成所述标签内容;generating the label content according to the basic network information;
    将所述标签内容存储在预设数据库中,得到对应的标签编号;storing the label content in a preset database to obtain a corresponding label number;
    根据所述标签内容或所述标签编号得到所述标签基本信息。The basic label information is obtained according to the label content or the label number.
  17. 根据权利要求15所述的存储介质,其中,所述根据所述基本网络信息生成标签基本信息,包括:The storage medium according to claim 15, wherein said generating basic label information according to said basic network information comprises:
    根据所述基本网络信息生成所述标签内容;generating the label content according to the basic network information;
    将所述标签内容存储在预设数据库中,得到对应的标签编号;storing the label content in a preset database to obtain a corresponding label number;
    根据所述标签内容和所述标签编号得到所述标签基本信息。The basic label information is obtained according to the label content and the label number.
  18. 根据权利要求15至17任一项所述的存储介质,其中,所述预设加密规则包括:标签内容加密规则和标签编号加密规则,所述根据预设加密规则对所述标签基本信息进行加密,生成所述网络信息服务加密标签,包括:The storage medium according to any one of claims 15 to 17, wherein the preset encryption rules include: tag content encryption rules and tag number encryption rules, and the basic tag information is encrypted according to the preset encryption rules , generating the network information service encryption tag, including:
    所述标签基本信息为标签内容时,所述标签内容加密规则包括以下一种或多种:When the tag basic information is tag content, the tag content encryption rules include one or more of the following:
    第一标签内容加密规则:First label content encryption rules:
    利用加密私钥根据所述标签内容生成数字签名;Generate a digital signature according to the content of the label by using the encrypted private key;
    根据所述数字签名和所述标签内容进行加密,得到所述网络信息服务加密标签;Encrypting according to the digital signature and the content of the label to obtain the network information service encryption label;
    第二标签内容加密规则:Encryption rules for the content of the second label:
    利用加密私钥对所述标签内容加密生成所述网络信息服务加密标签;Encrypting the tag content with an encrypted private key to generate the network information service encrypted tag;
    或,or,
    利用预设密钥对所述标签内容加密生成数字信封;Using a preset key to encrypt the content of the label to generate a digital envelope;
    根据所述数字信封生成所述网络信息服务加密标签;generating the network information service encryption label according to the digital envelope;
    第三标签内容加密规则:Third tag content encryption rules:
    利用加密私钥对根据所述第一标签内容加密规则或所述第二标签内容加密规则得到的所述网络信息服务加密标签加密生成数字签名;Encrypting the network information service encryption tag obtained according to the first tag content encryption rule or the second tag content encryption rule by using an encrypted private key to generate a digital signature;
    根据所述数字签名和所述网络信息服务加密标签进行加密,得到更新的所述网络信息服务加密标签;performing encryption according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label;
    所述标签基本信息为标签编号时,所述标签编号加密规则包括以下一种或多种:When the tag basic information is a tag number, the tag number encryption rules include one or more of the following:
    第四标签编号加密规则:Fourth label number encryption rules:
    利用加密私钥根据所述标签编号生成数字签名;Generate a digital signature based on the tag number using an encrypted private key;
    根据所述数字签名和所述标签编号进行加密,得到所述网络信息服务加密标签;Encrypting according to the digital signature and the label number to obtain the network information service encrypted label;
    第五标签编号加密规则:Fifth label number encryption rules:
    利用加密私钥对所述标签编号加密生成所述网络信息服务加密标签;Encrypting the tag number with an encrypted private key to generate the network information service encrypted tag;
    或,or,
    利用预设密钥对所述标签编号加密生成数字信封;Using a preset key to encrypt the label number to generate a digital envelope;
    根据所述数字信封生成所述网络信息服务加密标签;generating the network information service encryption label according to the digital envelope;
    第六标签编号加密规则:Sixth tag number encryption rules:
    利用加密私钥对根据所述第四标签编号加密规则或所述第五标签编号加密规则得到的所述网络信息服务加密标签加密生成数字签名;Encrypting the network information service encrypted tag obtained according to the fourth tag number encryption rule or the fifth tag number encryption rule by using an encrypted private key to generate a digital signature;
    根据所述数字签名和所述网络信息服务加密标签进行加密,得到更新的所述网络信息服务加密标签。Encryption is performed according to the digital signature and the network information service encryption label to obtain an updated network information service encryption label.
  19. 根据权利要求15所述的存储介质,其中,一种标签化网络信息服务应用方法还包括:根据预设加密规则,提取所述网络信息服务加密标签的加密信息;The storage medium according to claim 15, wherein the labeling network information service application method further comprises: extracting the encryption information of the network information service encryption label according to a preset encryption rule;
    当所述加密信息为数字签名时,则验证所述数字签名的有效性以及所述数字签名对应签名证书的有效性;When the encrypted information is a digital signature, verify the validity of the digital signature and the validity of the signature certificate corresponding to the digital signature;
    验证通过后,根据所述标签基本信息获取对应的基本网络信息。After the verification is passed, the corresponding basic network information is obtained according to the basic information of the tag.
  20. 根据权利要求19所述的存储介质,其中,一种标签化网络信息服务应用方法还包括:The storage medium according to claim 19, wherein a tagged network information service application method further comprises:
    获取所述标签化网络信息服务的服务状态节点;Acquiring the service status node of the tagged network information service;
    根据所述服务状态节点显示对应的基本网络信息。The corresponding basic network information is displayed according to the service status node.
PCT/CN2022/090749 2021-10-28 2022-04-29 Tagged network information service generation and application method and apparatus, device and medium WO2023071133A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111266593.2A CN113961956A (en) 2021-10-28 2021-10-28 Method, device, equipment and medium for generating and applying tagged network information service
CN202111266593.2 2021-10-28

Publications (1)

Publication Number Publication Date
WO2023071133A1 true WO2023071133A1 (en) 2023-05-04

Family

ID=79467993

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/090749 WO2023071133A1 (en) 2021-10-28 2022-04-29 Tagged network information service generation and application method and apparatus, device and medium

Country Status (2)

Country Link
CN (1) CN113961956A (en)
WO (1) WO2023071133A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116455585A (en) * 2023-06-15 2023-07-18 浪潮软件科技有限公司 Secure communication method and device based on multiple blind signatures

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113961956A (en) * 2021-10-28 2022-01-21 平安科技(深圳)有限公司 Method, device, equipment and medium for generating and applying tagged network information service
CN114915472B (en) * 2022-05-17 2024-04-05 广东电网有限责任公司 Security operation and maintenance control center, security operation and maintenance control method and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101794288A (en) * 2009-12-25 2010-08-04 北京大学 Network service description information acquisition method and network service description information acquisition device
CN104683321A (en) * 2013-12-02 2015-06-03 财团法人资讯工业策进会 Network service system and network service utilizing method thereof
CN109041033A (en) * 2018-09-14 2018-12-18 杭州若奇技术有限公司 Smart machine distribution method and system based on RFID
CN113469716A (en) * 2021-07-20 2021-10-01 山东省计算中心(国家超级计算济南中心) Product tracing method and system based on block chain and identification analysis
CN113961956A (en) * 2021-10-28 2022-01-21 平安科技(深圳)有限公司 Method, device, equipment and medium for generating and applying tagged network information service

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2431545B (en) * 2005-10-24 2011-01-12 Chien Yaw Wong Security-enhanced RFID system
EP1916627A1 (en) * 2006-10-27 2008-04-30 Deutsche Post AG Method for creating a label, computer program product, network node and system for carrying out the method
CN109347627B (en) * 2018-09-19 2023-08-29 平安科技(深圳)有限公司 Data encryption and decryption method and device, computer equipment and storage medium
CN110266640B (en) * 2019-05-13 2021-11-05 平安科技(深圳)有限公司 Single sign-on tamper-proof method and device, computer equipment and storage medium
CN112738113B (en) * 2020-12-31 2022-04-01 清华大学 Organization information label generation method and message transmission method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101794288A (en) * 2009-12-25 2010-08-04 北京大学 Network service description information acquisition method and network service description information acquisition device
CN104683321A (en) * 2013-12-02 2015-06-03 财团法人资讯工业策进会 Network service system and network service utilizing method thereof
CN109041033A (en) * 2018-09-14 2018-12-18 杭州若奇技术有限公司 Smart machine distribution method and system based on RFID
CN113469716A (en) * 2021-07-20 2021-10-01 山东省计算中心(国家超级计算济南中心) Product tracing method and system based on block chain and identification analysis
CN113961956A (en) * 2021-10-28 2022-01-21 平安科技(深圳)有限公司 Method, device, equipment and medium for generating and applying tagged network information service

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116455585A (en) * 2023-06-15 2023-07-18 浪潮软件科技有限公司 Secure communication method and device based on multiple blind signatures
CN116455585B (en) * 2023-06-15 2023-09-05 浪潮软件科技有限公司 Secure communication method and device based on multiple blind signatures

Also Published As

Publication number Publication date
CN113961956A (en) 2022-01-21

Similar Documents

Publication Publication Date Title
WO2023071133A1 (en) Tagged network information service generation and application method and apparatus, device and medium
WO2022252632A1 (en) Data encryption processing method and apparatus, computer device, and storage medium
CN110537183B (en) Data marking method and system
WO2020233373A1 (en) Application configuration file management method and device
CN108664798B (en) Information encryption method and device
CN109600228B (en) Anti-quantum-computation signature method and system based on public key pool
WO2020232800A1 (en) Data processing method and system in block chain network and related device
US20180091301A1 (en) Method and system for switching public keys in ciphertexts
CN104618107A (en) Digital signature method and system
CN112511514A (en) HTTP encrypted transmission method and device, computer equipment and storage medium
US20140095860A1 (en) Architecture for cloud computing using order preserving encryption
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN114124502B (en) Message transmission method, device, equipment and medium
CN110826109A (en) Penetrating signature method suitable for PDF document
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN114500093A (en) Safe interaction method and system for message information
CN114223175A (en) Generating a sequence of network data while preventing acquisition or manipulation of time data
CN116108410A (en) Identity credential generation method and device
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
US20170200020A1 (en) Data management system, program recording medium, communication terminal, and data management server
US7958363B2 (en) Toolbar signature
WO2018102382A1 (en) Method and system for switching public keys in ciphertexts
CN106254341A (en) Data fingerprint extracting method and system for centralized electronic data safety system
US20200045022A1 (en) Exchanging encrypted messages among multiple agents

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22885046

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE