CN114091014B - Data processing method and device - Google Patents
Data processing method and device Download PDFInfo
- Publication number
- CN114091014B CN114091014B CN202111277728.5A CN202111277728A CN114091014B CN 114091014 B CN114091014 B CN 114091014B CN 202111277728 A CN202111277728 A CN 202111277728A CN 114091014 B CN114091014 B CN 114091014B
- Authority
- CN
- China
- Prior art keywords
- target
- party system
- party
- data
- service agent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention provides a data processing method and device, wherein the method comprises the following steps: acquiring a target system identifier of a target third-party system; under the condition that the target system identification is in a preset white list, determining the target system type of the target third-party system, and under the condition that the target system type is a specified system type, establishing a first service agent aiming at the target third-party system so as to communicate with the target third-party system by adopting the first service agent; and under the condition that the target system identification is not in the preset white list, determining the target system security level of the target third party system, and under the condition that the target system security level is smaller than the preset security level, establishing a second service agent aiming at the target third party system so as to communicate with the target third party system by adopting the second service agent. By the embodiment of the invention, the communication with the third-party system by establishing different service agents is realized.
Description
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method and an apparatus for data processing.
Background
With the development of internet technology, communications between different systems are more and more frequent, and the security of the communications is also an important problem.
In order to ensure the security of communication, the prior art generally adopts a unified security check mode for a communication system, and the method is not specific and has the efficiency of image communication.
Disclosure of Invention
In view of the above, a method and apparatus for data processing is proposed to overcome or at least partially solve the above problems, comprising:
a method of data processing, the method comprising:
acquiring a target system identifier of a target third-party system;
Determining a target system type of the target third-party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third-party system under the condition that the target system type is a specified system type so as to communicate with the target third-party system by adopting the first service agent;
And under the condition that the target system identifier is not in a preset white list, determining the target system security level of the target third-party system, and under the condition that the target system security level is smaller than a preset security level, establishing a second service agent aiming at the target third-party system so as to communicate with the target third-party system by adopting the second service agent.
Optionally, the method further comprises:
Preprocessing first data when detecting that the first data is to be sent to the target third party system through a first service agent;
And sending the preprocessed first data to the target third party system.
Optionally, the method further comprises:
and when the second data sent by the target third party system is detected to be received through a second service agent, performing security check on the second data.
Optionally, the method further comprises:
When detecting that third data is to be sent to the target third party system through a second service agent, determining key information in the third data, and hiding the key information;
And sending the third data after hiding to the target third party system.
Optionally, the preprocessing the first data includes:
and carrying out format conversion on the first data, and encrypting the first data after format conversion.
Optionally, the specified system type is a government system type.
An apparatus for data processing, the apparatus comprising:
The target system identification acquisition module is used for acquiring a target system identification of a target third-party system;
the first service agent establishing module is used for determining the target system type of the target third party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third party system under the condition that the target system type is a specified system type so as to communicate with the target third party system by adopting the first service agent;
The second service agent establishing module is used for determining the security level of the target system of the target third party system under the condition that the target system identification is not in a preset white list, and establishing a second service agent aiming at the target third party system under the condition that the security level of the target system is smaller than the preset security level so as to communicate with the target third party system by adopting the second service agent.
Optionally, the method further comprises:
The preprocessing module is used for preprocessing first data when detecting that the first data is to be sent to the target third party system through the first service agent;
And the first data sending module is used for sending the preprocessed first data to the target third party system.
A server comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor implements a method of data processing as described above.
A computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method of data processing as described above.
The embodiment of the invention has the following advantages:
In the embodiment of the invention, the target system type of the target third party system is determined by acquiring the target system identification of the target third party system under the condition that the target system identification is in the preset white list, and the first service agent aiming at the target third party system is established under the condition that the target system type is the appointed system type so as to communicate with the target third party system by adopting the first service agent, the target system security level of the target third party system is determined under the condition that the target system identification is not in the preset white list, and the second service agent aiming at the target third party system is established under the condition that the target system security level is smaller than the preset security level so as to communicate with the target third party system by adopting the second service agent, thereby realizing the communication between the second service agent and the third party system by establishing different service agents and adopting different communication modes aiming at different systems, and improving the communication security and efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the present invention, the drawings that are needed in the description of the present invention will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of steps of a method for data processing according to an embodiment of the present invention;
FIG. 2 is a flow chart of steps of another method for data processing according to an embodiment of the present invention;
fig. 3 is a block diagram of an apparatus for data processing according to an embodiment of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flowchart illustrating steps of a method for data processing according to an embodiment of the present invention may specifically include the following steps:
step 101, obtaining a target system identifier of a target third-party system;
For the target third party system needing to communicate with the target third party system, the target system identification of the target third party system can be obtained, for example, the target system identification can be the information used for identifying the target third party system, such as the name, the IP address, the website and the like of the target third party system.
Step 102, determining a target system type of the target third party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third party system under the condition that the target system type is a specified system type so as to communicate with the target third party system by adopting the first service agent;
As an example, the specified system type may be a government system type.
In practical application, a white list may be preset, system identifiers of a plurality of third party systems may be stored in the white list, the third party systems with the system identifiers in the white list are characterized to be safe to communicate with, and after determining the target system identifier, it may be determined whether the target system identifier of the target third party system is in the white list.
Under the condition that the target system identifier is in the white list, communication connection is established with the target system identifier, but due to the specificity of part of the third party systems, only the internal equipment is allowed to be connected, and the external equipment is not directly connected, the target system type of the target third party system can be further determined, and whether the target system type of the target third party system is the designated system type or not can be judged.
In the case that the target system type is a non-specified system type, since the target system identification of the target third party system is in the white list again, a communication connection can be established directly therewith. Under the condition that the type of the target system is the specified system type, a first service agent aiming at the target third-party system can be established, and then communication connection between the first service agent and the target third-party system can be established, and the first service agent can be adopted to communicate with the target third-party system.
Step 103, determining a target system security level of the target third party system when the target system identifier is not in a preset white list, and establishing a second service agent for the target third party system to communicate with the target third party system by adopting the second service agent when the target system security level is smaller than a preset security level.
Under the condition that the target system identification is not in a preset white list, the communication between the characterization and the target system identification is not necessarily safe, the target system security level of the target third party system can be further determined, under the condition that the target system security level is greater than or equal to the preset security level, the characterization is high in security level, and communication connection can be directly established with the target third party system.
And under the condition that the security level of the target system is smaller than the preset security level, the security level is not high, a second service agent aiming at the target third-party system can be established, and then communication connection between the second service agent and the target third-party system can be established, and the second service agent can be adopted to communicate with the target third-party system.
In the embodiment of the invention, the target system type of the target third party system is determined by acquiring the target system identification of the target third party system under the condition that the target system identification is in the preset white list, and the first service agent aiming at the target third party system is established under the condition that the target system type is the appointed system type so as to communicate with the target third party system by adopting the first service agent, the target system security level of the target third party system is determined under the condition that the target system identification is not in the preset white list, and the second service agent aiming at the target third party system is established under the condition that the target system security level is smaller than the preset security level so as to communicate with the target third party system by adopting the second service agent, thereby realizing the communication between the second service agent and the third party system by establishing different service agents and adopting different communication modes aiming at different systems, and improving the communication security and efficiency.
Referring to fig. 2, a flowchart illustrating steps of another method for data processing according to an embodiment of the present invention may specifically include the following steps:
step 201, obtaining a target system identifier of a target third party system;
For the target third party system needing to communicate with the target third party system, the target system identification of the target third party system can be obtained, for example, the target system identification can be the information used for identifying the target third party system, such as the name, the IP address, the website and the like of the target third party system.
Step 202, determining a target system type of the target third party system when the target system identifier is in a preset white list, and establishing a first service agent for the target third party system to communicate with the target third party system by adopting the first service agent when the target system type is a specified system type;
As an example, the specified system type may be a government system type.
In practical application, a white list may be preset, system identifiers of a plurality of third party systems may be stored in the white list, the third party systems with the system identifiers in the white list are characterized to be safe to communicate with, and after determining the target system identifier, it may be determined whether the target system identifier of the target third party system is in the white list.
Under the condition that the target system identifier is in the white list, communication connection can be established with the target system identifier, but due to the specificity of part of the third party systems, only the internal equipment is allowed to be connected, and the target system type of the target third party systems can be further determined if the target system type of the target third party systems is the appointed system type.
In the case that the target system type is a non-specified system type, since the target system identification of the target third party system is in the white list again, a communication connection can be established directly therewith. Under the condition that the type of the target system is the specified system type, a first service agent aiming at the target third-party system can be established, and then communication connection between the first service agent and the target third-party system can be established, and the first service agent can be adopted to communicate with the target third-party system.
Step 203, determining a target system security level of the target third party system when the target system identifier is not in a preset white list, and establishing a second service agent for the target third party system to communicate with the target third party system by adopting the second service agent when the target system security level is smaller than a preset security level;
under the condition that the target system identification is not in a preset white list, the communication between the characterization and the target system identification is not necessarily safe, the target system security level of the target third party system can be further determined, under the condition that the target system security level is greater than or equal to the preset security level, the characterization is high in security level, and communication connection can be directly established with the target third party system.
And under the condition that the security level of the target system is smaller than the preset security level, the security level is not high, a second service agent aiming at the target third-party system can be established, and then communication connection between the second service agent and the target third-party system can be established, and the second service agent can be adopted to communicate with the target third-party system.
Step 204, when detecting that first data is to be sent to the target third party system through a first service agent, preprocessing the first data, and sending the preprocessed first data to the target third party system;
After the first service agent is established, the first data can be sent to the target third party system through the first service agent, and the communication requirement of the target third party system with the specified system type is higher because the first service agent is established only when the target system type of the target third party system is the specified system type, if the specified system type can be the government service system type, the first data can be preprocessed to meet the requirement of the target third party system, and then the preprocessed first data can be sent to the target third party system.
In an embodiment of the present invention, preprocessing the first data may include:
and carrying out format conversion on the first data, and encrypting the first data after format conversion.
In a specific implementation, the target third party system may have a requirement of format and confidentiality on the data, and may perform format conversion on the first data according to the requirement of the target third party system, and may encrypt the first data after format conversion, for example, may use a certificate to encrypt.
Step 205, when detecting that second data sent by the target third party system is received through a second service agent, performing security check on the second data;
after the second service agent is established, the second data can be received from the target third party system through the second service agent, and because the second service agent is the target third party system which is established only when the security level of the target system of the target third party system is smaller than the preset security level, in order to ensure the security of the received data, the security check can be further carried out on the received second data, such as checking whether the second data carries viruses such as Trojan horse or not.
And 206, determining key information in the third data when detecting that the third data is to be sent to the target third party system through the second service agent, carrying out hiding processing on the key information, and sending the third data after the hiding processing to the target third party system.
After the second service agent is established, third data can be sent to the target third party system through the second service agent, and because the third data is the target third party system which is established only when the security level of the target system of the target third party system is smaller than the preset security level, in order to send the data outwards without revealing, key information in the third data, such as privacy information of personal identification and the like, can be determined, and the key information can be subjected to hiding processing, such as mosaic processing, and then the third data after the hiding processing can be sent to the target third party system.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Referring to fig. 3, a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention may specifically include the following modules:
A target system identifier obtaining module 301, configured to obtain a target system identifier of a target third party system;
A first service agent establishing module 302, configured to determine a target system type of the target third party system if the target system identifier is in a preset whitelist, and establish a first service agent for the target third party system to communicate with the target third party system using the first service agent if the target system type is a specified system type;
a second service agent establishing module 303, configured to determine a target system security level of the target third party system if the target system identifier is not in a preset whitelist, and establish a second service agent for the target third party system to communicate with the target third party system using the second service agent if the target system security level is less than a preset security level.
In an embodiment of the present invention, further includes:
The preprocessing module is used for preprocessing first data when detecting that the first data is to be sent to the target third party system through the first service agent;
And the first data sending module is used for sending the preprocessed first data to the target third party system.
In an embodiment of the present invention, further includes:
And the security check module is used for performing security check on the second data when the second data sent by the target third party system is detected to be received through the second service agent.
In an embodiment of the present invention, further includes:
the hiding processing module is used for determining key information in the third data and hiding the key information when detecting that the third data is to be sent to the target third party system through a second service agent;
And the third data sending module is used for sending the third data after the hiding processing to the target third party system.
In an embodiment of the present invention, the preprocessing module includes:
The format conversion encryption module is used for carrying out format conversion on the first data and encrypting the first data after format conversion.
In an embodiment of the present invention, the specified system type is a government system type.
In the embodiment of the invention, the target system type of the target third-party system is determined by acquiring the target system identification of the target third-party system under the condition that the target system identification is in a preset white list, and the first service agent aiming at the target third-party system is established under the condition that the target system type is the appointed system type so as to communicate with the target third-party system by adopting the first service agent, the target system security level of the target third-party system is determined under the condition that the target system identification is not in the preset white list, and the second service agent aiming at the target third-party system is established under the condition that the target system security level is smaller than the preset security level so as to communicate with the target third-party system by adopting the second service agent, thereby realizing the communication with the third-party system by establishing different service agents and ensuring the communication security.
An embodiment of the present invention also provides a server, which may include a processor, a memory, and a computer program stored on the memory and capable of running on the processor, the computer program implementing the method of data processing as above when executed by the processor.
An embodiment of the present invention also provides a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements a method of data processing as above.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the invention may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or terminal device that comprises the element.
The foregoing has outlined rather broadly the more detailed description of a method and apparatus for data processing that uses specific examples to illustrate the principles and embodiments of the present invention, the description of the examples above being provided only to facilitate an understanding of the method and core concepts of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.
Claims (10)
1. A method of data processing, the method comprising:
acquiring a target system identifier of a target third-party system;
Determining a target system type of the target third-party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third-party system under the condition that the target system type is a specified system type so as to communicate with the target third-party system by adopting the first service agent;
Wherein, under the condition that the target system identifier is in a preset white list, determining the target system type of the target third party system further comprises: under the condition that the target system type is a non-specified system type, directly establishing communication connection with a third party system;
the system type is specified to only allow the internal equipment to be connected, and the system type is not directly connected with the external equipment, and the system type is not specified to be connected with the internal equipment and the external equipment;
Determining a target system security level of the target third party system when the target system identifier is not in a preset white list, and establishing a second service agent for the target third party system to communicate with the target third party system by adopting the second service agent when the target system security level is smaller than a preset security level;
And under the condition that the target system identifier is not in a preset white list, determining the target system security level of the target third party system, and under the condition that the target system security level is greater than or equal to a preset security level, directly establishing communication connection with the target third party system.
2. The method as recited in claim 1, further comprising:
Preprocessing first data when detecting that the first data is to be sent to the target third party system through a first service agent;
And sending the preprocessed first data to the target third party system.
3. The method according to claim 1 or 2, further comprising:
and when the second data sent by the target third party system is detected to be received through a second service agent, performing security check on the second data.
4. A method according to claim 3, further comprising:
When detecting that third data is to be sent to the target third party system through a second service agent, determining key information in the third data, and hiding the key information;
And sending the third data after hiding to the target third party system.
5. The method of claim 2, wherein the preprocessing the first data comprises:
and carrying out format conversion on the first data, and encrypting the first data after format conversion.
6. The method of claim 1, wherein the specified system type is a government system type.
7. An apparatus for data processing, the apparatus comprising:
The target system identification acquisition module is used for acquiring a target system identification of a target third-party system;
the first service agent establishing module is used for determining the target system type of the target third party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third party system under the condition that the target system type is a specified system type so as to communicate with the target third party system by adopting the first service agent;
Wherein, under the condition that the target system identifier is in a preset white list, determining the target system type of the target third party system further comprises: under the condition that the target system type is a non-specified system type, directly establishing communication connection with a third party system;
the system type is specified to only allow the internal equipment to be connected, and the system type is not directly connected with the external equipment, and the system type is not specified to be connected with the internal equipment and the external equipment;
a second service agent establishing module, configured to determine a target system security level of the target third party system when the target system identifier is not in a preset whitelist, and establish a second service agent for the target third party system when the target system security level is less than a preset security level, so as to communicate with the target third party system using the second service agent;
And under the condition that the target system identifier is not in a preset white list, determining the target system security level of the target third party system, and under the condition that the target system security level is greater than or equal to a preset security level, directly establishing communication connection with the target third party system.
8. The apparatus as recited in claim 7, further comprising:
The preprocessing module is used for preprocessing first data when detecting that the first data is to be sent to the target third party system through the first service agent;
And the first data sending module is used for sending the preprocessed first data to the target third party system.
9. A server comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, which computer program, when executed by the processor, implements the method of data processing according to any one of claims 1 to 6.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements a method of data processing according to any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111277728.5A CN114091014B (en) | 2021-10-29 | 2021-10-29 | Data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111277728.5A CN114091014B (en) | 2021-10-29 | 2021-10-29 | Data processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114091014A CN114091014A (en) | 2022-02-25 |
CN114091014B true CN114091014B (en) | 2024-10-18 |
Family
ID=80298330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111277728.5A Active CN114091014B (en) | 2021-10-29 | 2021-10-29 | Data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114091014B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105306454A (en) * | 2015-09-30 | 2016-02-03 | 北京奇虎科技有限公司 | Data transmission method and terminal device |
CN109413201A (en) * | 2018-11-27 | 2019-03-01 | 东软集团股份有限公司 | SSL traffic method, apparatus and storage medium |
CN111797378A (en) * | 2020-07-06 | 2020-10-20 | 遵义科晟云达科技有限公司 | A multi-identity management and authentication platform for human and social information |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE602004032313D1 (en) * | 2004-05-07 | 2011-06-01 | Alcatel Lucent | Data authentication method and agent based system |
GB2495797B (en) * | 2011-10-19 | 2013-11-20 | Ibm | Protecting privacy when communicating with a web server |
US9294912B1 (en) * | 2013-05-22 | 2016-03-22 | Quantcast Corporation | Selective regulation of information transmission from mobile applications to third-party privacy complaint target systems |
CN105099705B (en) * | 2015-08-19 | 2018-08-14 | 同方计算机有限公司 | A secure communication method and system based on USB protocol |
CN105100119A (en) * | 2015-08-31 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | URL detection method and device |
CN105245515B (en) * | 2015-09-30 | 2019-03-05 | 北京奇虎科技有限公司 | A kind of data safe transmission method and terminal device |
CN105337986B (en) * | 2015-11-20 | 2018-06-19 | 英赛克科技(北京)有限公司 | Credible protocol conversion method and system |
CN105516165B (en) * | 2015-12-22 | 2019-05-28 | 华为技术有限公司 | A kind of method illegally acted on behalf of, equipment and the system of identification charging fraud |
US10080132B2 (en) * | 2016-03-28 | 2018-09-18 | Bank Of America Corporation | System for adaptation of multiple digital signatures in a distributed network |
CN106022101B (en) * | 2016-05-17 | 2019-12-06 | Oppo广东移动通信有限公司 | application management method and terminal |
US10542006B2 (en) * | 2016-11-22 | 2020-01-21 | Daniel Chien | Network security based on redirection of questionable network access |
US10726120B2 (en) * | 2017-03-31 | 2020-07-28 | Intel Corporation | System, apparatus and method for providing locality assertion between a security processor and an enclave |
CN107612901A (en) * | 2017-09-11 | 2018-01-19 | 深圳市金立通信设备有限公司 | One kind applies encryption method and terminal |
CN109992965B (en) * | 2017-12-29 | 2021-08-17 | Oppo广东移动通信有限公司 | Process processing method and apparatus, electronic device, and computer-readable storage medium |
CN111625809B (en) * | 2020-05-31 | 2024-03-26 | 数字浙江技术运营有限公司 | Data authorization method and device, electronic equipment and storage medium |
CN112256490A (en) * | 2020-11-17 | 2021-01-22 | 珠海大横琴科技发展有限公司 | Data processing method and device |
CN113468552B (en) * | 2021-05-31 | 2024-06-21 | 珠海大横琴科技发展有限公司 | Data processing method and device |
-
2021
- 2021-10-29 CN CN202111277728.5A patent/CN114091014B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105306454A (en) * | 2015-09-30 | 2016-02-03 | 北京奇虎科技有限公司 | Data transmission method and terminal device |
CN109413201A (en) * | 2018-11-27 | 2019-03-01 | 东软集团股份有限公司 | SSL traffic method, apparatus and storage medium |
CN111797378A (en) * | 2020-07-06 | 2020-10-20 | 遵义科晟云达科技有限公司 | A multi-identity management and authentication platform for human and social information |
Also Published As
Publication number | Publication date |
---|---|
CN114091014A (en) | 2022-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107135073B (en) | Interface calling method and device | |
US10291631B2 (en) | System for testing computer application | |
CN107483419B (en) | Method, device and system for authenticating access terminal by server, server and computer readable storage medium | |
EP2963958B1 (en) | Network device, terminal device and information security improving method | |
CN103875211B (en) | An Internet account management method, manager, server and system | |
US20150149777A1 (en) | Mobile terminal, terminal and authentication method using security cookie | |
WO2021174870A1 (en) | Network security risk inspection method and system, computer device, and storage medium | |
CN110650216B (en) | Cloud service request method and device | |
CN111880919B (en) | Data scheduling method, system and computer equipment | |
CN105471815A (en) | Internet-of-things data security method and Internet-of-things data security device based on security authentication | |
CN111241523B (en) | Authentication processing method, apparatus, device and storage medium | |
CN111614548A (en) | Message pushing method and device, computer equipment and storage medium | |
WO2019037521A1 (en) | Security detection method, device, system, and server | |
CN107528820A (en) | For the encipher-decipher method of application program, device and method for auditing safely and platform | |
CN104219626A (en) | Identity authentication method and device | |
CN114567678B (en) | Resource calling method and device for cloud security service and electronic equipment | |
CN114401126B (en) | Interface security monitoring method and device | |
CN114091014B (en) | Data processing method and device | |
CN109699030B (en) | UAV authentication method, apparatus, device and computer readable storage medium | |
CN111586013A (en) | Network intrusion detection method, device, node terminal and storage medium | |
CN106161037A (en) | Digital signature method and device | |
CN118264422A (en) | Multi-factor identity authentication method, device and system for mail system | |
CN111953637B (en) | Application service method and device | |
CN104252598A (en) | Method and device for detecting application bugs | |
CN102546636A (en) | Protected resource monitoring method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |