Nothing Special   »   [go: up one dir, main page]

CN114266057A - Data distribution method and system - Google Patents

Data distribution method and system Download PDF

Info

Publication number
CN114266057A
CN114266057A CN202111599563.3A CN202111599563A CN114266057A CN 114266057 A CN114266057 A CN 114266057A CN 202111599563 A CN202111599563 A CN 202111599563A CN 114266057 A CN114266057 A CN 114266057A
Authority
CN
China
Prior art keywords
data
certificate
data distribution
request
merchant identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111599563.3A
Other languages
Chinese (zh)
Inventor
黄文博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202111599563.3A priority Critical patent/CN114266057A/en
Publication of CN114266057A publication Critical patent/CN114266057A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a data distribution method and a system, wherein the data distribution system comprises a data distribution center system, a data distribution subsystem and a client system, wherein the data distribution center system is used for receiving network request information sent by the data distribution subsystem and feeding back a digital certificate to the data distribution subsystem; the data distribution center system is also used for sending a certificate inquiry request by the client system and feeding back a certificate inquiry result to the client system; a data distribution subsystem for distributing data content to a client system; and the client system is used for receiving the data content distributed by the data distribution subsystem. Thus, by implementing the embodiment, the data can be distributed in an authentication mode, so that the data can be distributed independently; meanwhile, safety certification can be carried out before data distribution, so that the data distribution safety is improved; in addition, the method can specify the data which is desired to be received by the user, thereby being capable of enabling the distribution of the data to be more humanized.

Description

Data distribution method and system
Technical Field
The application relates to the field of data information interaction, in particular to a data distribution method and system.
Background
Currently, when a user connects to wifi of a shopping mall, a supermarket or a restaurant, the user usually considers using the built-in free wifi to perform some online operations. However, in practice, it has been found that users are pushed a verification interface with advertisements when using such wifi, or pushed an advertisement interface until the user clicks "skip" to perform subsequent networking actions. Therefore, in the method, advertisements are generally passively pushed along with the networking of the user, the advertisement content quality is uneven, and the user is forced to read the corresponding advertisements, so that the advertisement reading experience and the networking experience of the user are very poor.
Disclosure of Invention
The embodiment of the application aims to provide a data distribution method and a data distribution system, which can distribute data in an authentication mode, so that the distribution action and the networking action of advertisement data are divided, and the advertisement data can be independently distributed; meanwhile, because security authentication is required before advertisement data distribution, the method has higher security than the conventional method; in addition, the method can specify the advertisement data which the user wants to receive, thereby being capable of enabling the distribution of the advertisement data to be more humanized.
A first aspect of an embodiment of the present application provides a data distribution method, where the data distribution method is applied to a data distribution center system, and the method includes:
receiving network request information;
judging whether the network request information is a digital certificate request or not;
when the network request information is the digital certificate request, verifying according to the digital certificate request, and issuing a digital certificate to a corresponding data distribution subsystem when the verification is passed;
when the network request information is not the digital certificate request, judging whether the network request information is a certificate inquiry request;
and when the network request information is the certificate inquiry request, feeding back a certificate inquiry result to a corresponding client system according to the certificate inquiry request.
Further, the step of performing verification according to the digital certificate request and issuing the digital certificate to the corresponding data distribution subsystem when the verification is passed includes:
identifying whether the digital certificate request is a merchant identity certificate request;
when the digital certificate request is the merchant identity certificate request, verifying the merchant identity, and issuing a merchant identity certificate to a corresponding data distribution subsystem when the verification is passed;
and when the digital certificate request is not the merchant identity certificate request, feeding back a certificate application failure reason to the data distribution subsystem.
Further, the step of performing verification according to the digital certificate request and issuing the digital certificate to the corresponding data distribution subsystem when the verification is passed includes:
identifying whether the digital certificate request is a data content certificate request;
when the digital certificate request is the data content certificate request, authenticating a merchant identity certificate according to the data content certificate request;
judging whether the merchant identity certificate is in a valid period;
when the merchant identity certificate is in the validity period, acquiring a first HASH value or a first MAC value included in the data content certificate request, and acquiring data content corresponding to the data content certificate request;
calculating a second HASH value of the data content or a second MAC value of the data content;
determining whether the first HASH value is the same as the second HASH value, or determining whether the first MAC value is the same as the second MAC value;
when the first HASH value is the same as the second HASH value or the first MAC value is the same as the second MAC value, verifying the data content and the data security, and issuing a data digital certificate to a corresponding data distribution subsystem when the verification is passed; and the CN code of the data digital certificate is the same as that of the merchant identity certificate.
Further, the step of feeding back the certificate inquiry result to the corresponding client system according to the certificate inquiry request includes:
extracting a data digital certificate and a merchant identity certificate included in the certificate inquiry request, and extracting a first CN code in the data digital certificate and a second CN code in the merchant identity certificate;
judging whether the first CN code is the same as the second CN code;
when the first CN code is the same as the second CN code, judging whether the data digital certificate and the merchant identity certificate are both in a valid period;
and when the data digital certificate and the merchant identity certificate are both in the valid period, generating a certificate inquiry result, and feeding back the certificate inquiry result to the corresponding client system.
A second aspect of the embodiments of the present application provides a data distribution method, where the data distribution method is applied to a data distribution subsystem, and the method includes:
detecting whether a merchant identity certificate exists in the data distribution subsystem;
when the data distribution subsystem does not have the merchant identity certificate, sending a merchant identity certificate request to a data distribution center system;
when the data distribution subsystem has the merchant identity certificate, judging whether the merchant identity certificate is in a valid period;
when the merchant identity certificate is not in the validity period, sending a merchant identity certificate request to a data distribution center system;
when the merchant identity certificate is within the validity period, determining data content to be distributed;
according to the data content, sending a data content certificate request to a data distribution center system;
receiving a data digital certificate issued by the data distribution center system;
and building a data wireless network according to the merchant identity certificate, and distributing the data content and the data digital certificate to a client system through the data wireless network.
A third aspect of the embodiments of the present application provides a data distribution method, where the data distribution method is applied to a client system, and the method includes:
when a data wireless network of a merchant is scanned, judging whether the data wireless network is in a preset data network white list or not;
when the data wireless network is in the data network white list, authenticating the data wireless network, and establishing network connection with the data wireless network when the authentication is passed;
receiving data content and a data digital certificate, and sending a digital certificate request to a data distribution center system according to the data digital certificate;
receiving a certificate inquiry result fed back by the data distribution center system;
and loading the data content or discarding the data content according to the query result.
Further, the step of authenticating the data wireless network and establishing a network connection with the data wireless network when the authentication is passed includes:
generating a random number and a time stamp, and forming time information according to the random number and the time stamp;
encrypting the time information by using the encryption public key of the merchant to obtain encryption information;
sending the encrypted information to a data distribution subsystem so that the data distribution subsystem signs the generated feedback information through a merchant identity certificate after verifying according to the encrypted information;
receiving feedback information fed back by a merchant, and extracting the merchant identity certificate;
and verifying the merchant identity certificate, and establishing network connection with the data wireless network when the merchant identity certificate passes the verification.
A fourth aspect of the embodiments of the present application provides a data distribution system, which includes a data distribution center system, a data distribution subsystem, and a client system, wherein,
the data distribution center system is used for receiving the network request information sent by the data distribution subsystem and feeding back a digital certificate to the data distribution subsystem;
the data distribution center system is also used for the certificate inquiry request sent by the client system and feeding back the certificate inquiry result to the client system;
the data distribution subsystem is used for distributing data contents to the client system;
and the client system is used for receiving the data content distributed by the data distribution subsystem.
A fifth aspect of embodiments of the present application provides an electronic device, including a memory and a processor, where the memory is used to store a computer program, and the processor runs the computer program to make the electronic device execute the data distribution method according to any one of the first, second, or third aspects of embodiments of the present application.
A sixth aspect of embodiments of the present application provides a computer-readable storage medium, which stores computer program instructions, and when the computer program instructions are read and executed by a processor, the computer program instructions perform the data distribution method according to any one of the first, second, or third aspects of embodiments of the present application.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic flowchart of a data distribution method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another data distribution method provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of another data distribution method provided in the embodiment of the present application;
fig. 4 is a schematic system structure diagram of a data distribution system according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Example 1
Referring to fig. 1, fig. 1 is a schematic flow chart of a data distribution method according to an embodiment of the present application. The data distribution method is applied to a data distribution center system and comprises the following steps:
s101, receiving network request information.
In this embodiment, the data distribution center system may receive the network request information in a loop when the network service is opened.
S102, judging whether the network request information is a digital certificate request, if so, executing a step S103; if not, go to step S106.
In this embodiment, the digital certificate request is a request initiated by the data distribution subsystem for requesting a corresponding digital certificate.
In this embodiment, when receiving a digital certificate request from a data distribution subsystem, the method performs step S103; the method performs step S106 upon receiving a certificate query request (OCSP) from a client system.
In this embodiment, an ocsp (online Certificate Status protocol) refers to an online Certificate Status protocol, and is a mode for maintaining security of a server and other network resources.
S103, whether the digital certificate request is a merchant identity certificate request or a data content certificate request is identified.
And S104, when the digital certificate request is a merchant identity certificate request, verifying the merchant identity, and issuing a merchant identity certificate to the corresponding data distribution subsystem when the verification is passed.
As an optional implementation, the method further comprises:
and when the digital certificate request is not the merchant identity certificate request, feeding back the reason of certificate application failure to the data distribution subsystem.
In this embodiment, the method may check the identity of the merchant by an online or offline method, issue the merchant identity certificate when the merchant identity certificate passes, and feed back the reason for the failure of applying the certificate when the merchant identity certificate does not pass.
And S105, when the digital certificate request is the data content certificate request, acquiring the data content corresponding to the data content certificate request, checking the data security of the data content and the data content, and issuing the data digital certificate to the corresponding data distribution subsystem when the data content certificate request passes the checking.
As an optional implementation manner, the steps of acquiring data content corresponding to the data content certificate request, verifying data security of the data content and the data content, and issuing a data digital certificate to a corresponding data distribution subsystem when the verification is passed include:
requesting to authenticate a merchant identity certificate according to the data content certificate;
judging whether the merchant identity certificate is in the valid period;
when the merchant identity certificate is in the valid period, acquiring a first HASH value or a first MAC value included in the data content certificate request, and acquiring data content corresponding to the data content certificate request;
calculating a second HASH value of the data content or a second MAC value of the data content;
judging whether the first HASH value is the same as the second HASH value or not, or judging whether the first MAC value is the same as the second MAC value or not;
when the first HASH value is the same as the second HASH value or the first MAC value is the same as the second MAC value, verifying the data content and the data security, and issuing a data digital certificate to a corresponding data distribution subsystem when the verification is passed; the CN code of the data digital certificate is the same as that of the merchant identity certificate.
In this embodiment, the HASH value is a HASH value.
In this embodiment, the certificate is also referred to as a "digital certificate" or a "public key certificate", and is a file that helps to keep network communication secure.
In this embodiment, the mac (message Authentication code), also called a message Authentication code, a document message Authentication code, a message Authentication code, and an information Authentication code, is a small piece of information generated by a specific algorithm, and is used to check the integrity of a certain piece of information and perform identity Authentication. It can be used to check whether its content has been altered during the message passing process, whether the reason for the alteration is from an accidental or deliberate attack. Meanwhile, the method can be used for identity authentication of a message source to confirm the source of the message.
In this embodiment, the method may first use the merchant identity certificate to complete the authentication of the merchant identity, then determine whether the merchant identity certificate is still within the validity period, and perform the subsequent auditing step when the merchant identity certificate is guaranteed to be within the validity period; otherwise, the reason for the failure of the request is fed back.
In this embodiment, the data content certificate request should include the HASH value or MAC value of the advertisement content.
In this embodiment, the method may intercept data content sent with the data content certificate request, the data content matching with respect to the data content certificate.
In this embodiment, the method may calculate a HASH value or a MAC value of the data content, compare the HASH value or the MAC value with a HASH value or a MAC value carried by the data content certificate request, and check the data content and the data security if the HASH value or the MAC value is consistent with the HASH value or the MAC value carried by the data content certificate request; and if the two are not consistent, the reason for failure certificate application is fed back.
In the embodiment, when the data content and the data security audit passes, a data digital certificate of the data content is issued; otherwise, the reason for failure of certificate application is fed back.
In this embodiment, the data content certificate request may carry other content according to the specific scene requirements.
In this embodiment, the CN code of the digital certificate of the advertisement is consistent with the CN code of the merchant identity certificate, which is convenient for later verification.
In the embodiment of the present application, the CN code, i.e. Common Name (Common Name), is also called CN field.
S106, judging whether the network request information is a certificate inquiry request, if so, executing a step S107; if not, the flow is ended.
And S107, feeding back a certificate inquiry result to the corresponding client system according to the certificate inquiry request.
As an alternative implementation, step S107 includes:
extracting a data digital certificate and a merchant identity certificate included in the certificate inquiry request, and extracting a first CN code in the data digital certificate and a second CN code in the merchant identity certificate;
judging whether the first CN code is the same as the second CN code;
when the first CN code is the same as the second CN code, judging whether the data digital certificate and the merchant identity certificate are both in the valid period;
and when the data digital certificate and the merchant identity certificate are both in the valid period, generating a certificate inquiry result, and feeding back the certificate inquiry result to the corresponding client system.
In this embodiment, the method receives a data digital certificate sent by a client system and a first CN code of the merchant identity certificate; inquiring and verifying the identity of the merchant according to the merchant identity certificate, and feeding back specific problems of the customer if the identity of the merchant fails; then, the method confirms that the advertisement is sent by the merchant according to the first CN code of the data digital certificate and the second CN code of the merchant identity certificate, and feeds back specific problems of the customer if the advertisement fails; then, whether the two certificates of the data digital certificate and the merchant identity certificate are both in the validity period is confirmed, and if the two certificates fail, the specific problems of the customer are fed back; and finally, feeding back a final certificate inquiry result to the client system based on all inquiry and verification.
In this embodiment, when the method finishes executing step S104, S105, or S107, step S101 is executed again.
In this embodiment, the data distribution center system may handle multiple requests from the data distribution subsystem or the client system within the concurrency ceiling.
In this embodiment, the data in this embodiment may be understood as advertisement data, i.e., advertisements.
In this embodiment, the execution subject of the method may be a computing device such as a computer and a server, and is not limited in this embodiment.
In this embodiment, an execution subject of the method may also be an intelligent device such as a smart phone and a tablet computer, which is not limited in this embodiment.
It can be seen that, by implementing the data distribution method described in this embodiment, the data distribution center system can manage and control the merchant identity certificate of the data distribution subsystem and the data content certificate of the advertisement data to be distributed, so that the data distribution subsystem can distribute valid advertisement data with timeliness when having a valid right of data distribution. Therefore, by implementing the embodiment, the advertisement data can be distributed based on the digital certificate, so that the conflict between the networking action and the advertisement action is avoided; meanwhile, by implementing the implementation mode, the advertisement data and the merchants can be reasonably controlled, so that the advertisement data sent by the scores have higher safety, and the trouble to the user is avoided.
Example 2
Referring to fig. 2, fig. 2 is a schematic flow chart of another data distribution method according to an embodiment of the present application. The data distribution method is applied to a data distribution subsystem, and comprises the following steps:
s201, detecting whether a data distribution subsystem has a merchant identity certificate, if so, executing a step S203; if not, go to step S202.
S202, sending a request of the merchant identity certificate to a data distribution center system.
S203, judging whether the merchant identity certificate is in the valid period, if so, executing the step S205; if not, go to step S204.
And S204, sending a merchant identity certificate request to the data distribution center system.
And S205, determining the data content to be distributed.
In this embodiment, the data content may be advertisement data to be distributed.
And S206, sending a data content certificate request to the data distribution center system according to the data content.
And S207, receiving a data digital certificate issued by the data distribution center system.
And S208, building a data wireless network according to the merchant identity certificate, and distributing the data content and the data digital certificate to the client system through the data wireless network.
In the embodiment, the method can build a data wireless network containing authentication according to the identity certificate, and if the authentication of the client accesses the wireless network of the data distribution subsystem, the authentication process of the certificate initiated by the client is completed.
In this embodiment, the data distribution subsystem may push advertisement data according to the data receiving rule fed back by the client device, then confirm the data distribution condition, and feed back the data distribution condition to the data distribution center system.
In this embodiment, the data in this embodiment may be understood as advertisement data, i.e., advertisements.
In the embodiment of the present application, the execution subject of the method may be a computing device such as a computer and a server, and is not limited in this embodiment.
In this embodiment, an execution subject of the method may also be an intelligent device such as a smart phone and a tablet computer, which is not limited in this embodiment.
It can be seen that, by implementing the data distribution method described in this embodiment, the data distribution subsystem can automatically perform validity detection on the merchant identity certificate and the certificate validation period stored in the data distribution subsystem, and automatically request a new merchant identity certificate when the merchant identity certificate does not exist or fails, thereby implementing automatic update of the merchant identity certificate. Meanwhile, the method can also automatically request the data content certificate of the advertisement data to ensure that the issued advertisement data is legal.
Example 3
Referring to fig. 3, fig. 3 is a flow chart illustrating another data distribution method according to an embodiment of the present application. The data distribution method is applied to a client system and comprises the following steps:
s301, when the data wireless network of the merchant is scanned, judging whether the data wireless network is in a preset data network white list, if so, executing a step S302; if not, the flow is ended.
In this embodiment, the user may select in advance which merchants provide advertisement data to receive, and rules such as data content of advertisements to receive, and scan for nearby wireless networks based on the rules.
S302, generating a random number and a time stamp, and forming time information according to the random number and the time stamp.
In this embodiment, the client system may scan out a data wireless network of a nearby merchant, and determine whether the data wireless network is a data wireless network of a merchant allowed by itself according to a wireless network name (the information is carried in the extension information of the merchant identity certificate), if the data wireless network is a name of a data wireless network in a data network white list (the data network white list is a wireless network directly selected or screened according to a custom rule from all wireless networks under the current data distribution center system after the client system is connected to the data distribution center system).
In this embodiment, the client system may generate a random number R1 and a timestamp T1, and compose time information Token1{ ═ R1| | T1 }.
S303, encrypting the time information by using the encryption public key of the merchant to obtain the encrypted information.
In this embodiment, the client system may further encrypt the time information Token1{ ═ R1| | T1} by using the encryption public key of the merchant, so as to obtain E2(Token 1).
S304, sending the encrypted information to the data distribution subsystem, so that the data distribution subsystem signs the generated feedback information through the merchant identity certificate after verification is carried out according to the encrypted information.
In this embodiment, the client sends Token1| | E2(Token1) to the data distribution subsystem.
S305, receiving feedback information fed back by the merchant, and extracting the merchant identity certificate.
In this embodiment, the data distribution subsystem decrypts the encrypted information received, obtains Token1, and confirms the time information based on the content thereof, thereby preventing information playback.
In this embodiment, the data distribution subsystem may generate a random number R2 and a time T2 by itself, form Token2{ ═ R1| | R2| | T1| | T2}, sign the Token, and then feed back the feedback information Token2| | S2(Token2) to the client system.
S306, verifying the merchant identity certificate, and establishing network connection with the data wireless network when the verification is passed.
In this embodiment, the client system may perform signature verification through the OCSP, and when the authentication is passed, establish a network connection and receive the advertisement.
In the present embodiment, if an error occurs in the above process, the process returns to execute step S301.
S307, receiving the data content and the data digital certificate, and sending a digital certificate request to the data distribution center system according to the data digital certificate.
In this embodiment, when receiving the advertisement data and the data digital certificate of the advertisement data, the client system may send the digital certificate of the advertisement data to the data distribution center system, so that the data distribution center system performs corresponding verification according to the data digital certificate to verify whether the advertisement is a subordinate advertisement of a merchant.
And S308, receiving a certificate inquiry result fed back by the data distribution center system.
S309, loading data content or discarding the data content according to the query result.
In this embodiment, the data in this embodiment may be understood as advertisement data, i.e., advertisements.
In the embodiment of the present application, the execution subject of the method may be a computing device such as a computer and a server, and is not limited in this embodiment.
In this embodiment, an execution subject of the method may also be an intelligent device such as a smart phone and a tablet computer, which is not limited in this embodiment.
It can be seen that, by implementing the data distribution method described in this embodiment, it can be preferentially determined whether the target wireless network is a wireless network that the user allows to receive data, thereby achieving the effect of customizing the advertisement data receiving network; meanwhile, the method can also carry out certificate authentication on the received advertisement data, thereby ensuring that the received advertisement data is legal, avoiding the reception of illegal advertisement data and further ensuring the safety of a client system in user equipment.
Example 4
Referring to fig. 4, fig. 4 is a schematic structural diagram of a data distribution system according to an embodiment of the present application. As shown in fig. 4, the data distribution system includes a data distribution center system, a data distribution subsystem, and a client system, wherein,
the data distribution center system 400 is configured to receive the network request information sent by the data distribution subsystem 500, and feed back the digital certificate to the data distribution subsystem 500;
the data distribution center system 400 is further configured to send a certificate query request to the client system 600, and feed back a certificate query result to the client system 600;
a data distribution subsystem 500 for distributing data content to client systems 600;
a client system 600 for receiving the data content distributed by the data distribution subsystem 500.
In this embodiment, the data in this embodiment may be understood as advertisement data, i.e., advertisements.
In the embodiment of the present application, for explanation of the data distribution system, reference may be made to the descriptions in embodiment 1, embodiment 2, or embodiment 3, and details are not repeated in this embodiment.
It can be seen that, by implementing the data distribution system described in this embodiment, online single-type advertisement distribution can be achieved by using a wireless network; meanwhile, the safety verification in the advertisement putting and receiving process can be realized by introducing the digital certificate; in addition, the timeliness of the certificate of the advertisement publisher and the timeliness of the advertisement are bound, and automatic management of the advertisement life cycle can be achieved.
An embodiment of the present application provides an electronic device, including a memory and a processor, where the memory is used to store a computer program, and the processor runs the computer program to make the electronic device execute the data distribution method in embodiment 1, embodiment 2, or embodiment 3 of the present application.
An embodiment of the present application provides a computer-readable storage medium, which stores computer program instructions, and when the computer program instructions are read and executed by a processor, the computer program instructions execute the data distribution method in embodiment 1, embodiment 2, or embodiment 3 of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other ways. The above-described system embodiments are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A data distribution method is applied to a data distribution center system, and the method comprises the following steps:
receiving network request information;
judging whether the network request information is a digital certificate request or not;
when the network request information is the digital certificate request, verifying according to the digital certificate request, and issuing a digital certificate to a corresponding data distribution subsystem when the verification is passed;
when the network request information is not the digital certificate request, judging whether the network request information is a certificate inquiry request;
and when the network request information is the certificate inquiry request, feeding back a certificate inquiry result to a corresponding client system according to the certificate inquiry request.
2. The data distribution method of claim 1, wherein the step of verifying according to the digital certificate request and issuing a digital certificate to the corresponding data distribution subsystem when verification is passed comprises:
identifying whether the digital certificate request is a merchant identity certificate request;
when the digital certificate request is the merchant identity certificate request, verifying the merchant identity, and issuing a merchant identity certificate to a corresponding data distribution subsystem when the verification is passed;
and when the digital certificate request is not the merchant identity certificate request, feeding back a certificate application failure reason to the data distribution subsystem.
3. The data distribution method of claim 1, wherein the step of verifying according to the digital certificate request and issuing a digital certificate to the corresponding data distribution subsystem when verification is passed comprises:
identifying whether the digital certificate request is a data content certificate request;
when the digital certificate request is the data content certificate request, authenticating a merchant identity certificate according to the data content certificate request;
judging whether the merchant identity certificate is in a valid period;
when the merchant identity certificate is in the validity period, acquiring a first HASH value or a first MAC value included in the data content certificate request, and acquiring data content corresponding to the data content certificate request;
calculating a second HASH value of the data content or a second MAC value of the data content;
determining whether the first HASH value is the same as the second HASH value, or determining whether the first MAC value is the same as the second MAC value;
when the first HASH value is the same as the second HASH value or the first MAC value is the same as the second MAC value, verifying the data content and the data security, and issuing a data digital certificate to a corresponding data distribution subsystem when the verification is passed; and the CN code of the data digital certificate is the same as that of the merchant identity certificate.
4. The data distribution method according to claim 1, wherein the step of feeding back the certificate inquiry result to the corresponding client system according to the certificate inquiry request comprises:
extracting a data digital certificate and a merchant identity certificate included in the certificate inquiry request, and extracting a first CN code in the data digital certificate and a second CN code in the merchant identity certificate;
judging whether the first CN code is the same as the second CN code;
when the first CN code is the same as the second CN code, judging whether the data digital certificate and the merchant identity certificate are both in a valid period;
and when the data digital certificate and the merchant identity certificate are both in the valid period, generating a certificate inquiry result, and feeding back the certificate inquiry result to the corresponding client system.
5. A data distribution method is applied to a data distribution subsystem, and the method comprises the following steps:
detecting whether a merchant identity certificate exists in the data distribution subsystem;
when the data distribution subsystem does not have the merchant identity certificate, sending a merchant identity certificate request to a data distribution center system;
when the data distribution subsystem has the merchant identity certificate, judging whether the merchant identity certificate is in a valid period;
when the merchant identity certificate is not in the validity period, sending a merchant identity certificate request to a data distribution center system;
when the merchant identity certificate is within the validity period, determining data content to be distributed;
according to the data content, sending a data content certificate request to a data distribution center system;
receiving a data digital certificate issued by the data distribution center system;
and building a data wireless network according to the merchant identity certificate, and distributing the data content and the data digital certificate to a client system through the data wireless network.
6. A data distribution method applied to a client system, the method comprising:
when a data wireless network of a merchant is scanned, judging whether the data wireless network is in a preset data network white list or not;
when the data wireless network is in the data network white list, authenticating the data wireless network, and establishing network connection with the data wireless network when the authentication is passed;
receiving data content and a data digital certificate, and sending a digital certificate request to a data distribution center system according to the data digital certificate;
receiving a certificate inquiry result fed back by the data distribution center system;
and loading the data content or discarding the data content according to the query result.
7. The data distribution method according to claim 6, wherein the step of authenticating the data wireless network and establishing a network connection with the data wireless network when authentication is passed comprises:
generating a random number and a time stamp, and forming time information according to the random number and the time stamp;
encrypting the time information by using the encryption public key of the merchant to obtain encryption information;
sending the encrypted information to a data distribution subsystem so that the data distribution subsystem signs the generated feedback information through a merchant identity certificate after verifying according to the encrypted information;
receiving feedback information fed back by a merchant, and extracting the merchant identity certificate;
and verifying the merchant identity certificate, and establishing network connection with the data wireless network when the merchant identity certificate passes the verification.
8. A data distribution system, comprising a data distribution center system, a data distribution subsystem, and a client system, wherein,
the data distribution center system is used for receiving the network request information sent by the data distribution subsystem and feeding back a digital certificate to the data distribution subsystem;
the data distribution center system is also used for the certificate inquiry request sent by the client system and feeding back the certificate inquiry result to the client system;
the data distribution subsystem is used for distributing data contents to the client system;
and the client system is used for receiving the data content distributed by the data distribution subsystem.
9. An electronic device, characterized in that the electronic device comprises a memory for storing a computer program and a processor for executing the computer program to cause the electronic device to perform the data distribution method of any one of claims 1 to 6.
10. A readable storage medium, in which computer program instructions are stored, which, when read and executed by a processor, perform the data distribution method of any one of claims 1 to 6.
CN202111599563.3A 2021-12-24 2021-12-24 Data distribution method and system Pending CN114266057A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111599563.3A CN114266057A (en) 2021-12-24 2021-12-24 Data distribution method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111599563.3A CN114266057A (en) 2021-12-24 2021-12-24 Data distribution method and system

Publications (1)

Publication Number Publication Date
CN114266057A true CN114266057A (en) 2022-04-01

Family

ID=80829799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111599563.3A Pending CN114266057A (en) 2021-12-24 2021-12-24 Data distribution method and system

Country Status (1)

Country Link
CN (1) CN114266057A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030126431A1 (en) * 2001-10-12 2003-07-03 Beattie Douglas D. Methods and systems for automated authentication, processing and issuance of digital certificates
JP2011151785A (en) * 2009-12-25 2011-08-04 Canon It Solutions Inc Relay processing apparatus, relay processing method and program
US20120030469A1 (en) * 2010-07-28 2012-02-02 Symantec Corporation Streamlined CSR Generation, Certificate Enrollment, and Certificate Delivery
US20130061281A1 (en) * 2011-09-02 2013-03-07 Barracuda Networks, Inc. System and Web Security Agent Method for Certificate Authority Reputation Enforcement
US20160337134A1 (en) * 2011-04-13 2016-11-17 Disney Enterprises, Inc. Authenticated content delivery platform
US20170006023A1 (en) * 2015-07-01 2017-01-05 International Business Machines Corporation Using resource records for digital certificate validation
EP3720082A1 (en) * 2019-04-05 2020-10-07 Siemens Aktiengesellschaft Method for issuing a cryptographically protected authenticity certificate for a user

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030126431A1 (en) * 2001-10-12 2003-07-03 Beattie Douglas D. Methods and systems for automated authentication, processing and issuance of digital certificates
JP2011151785A (en) * 2009-12-25 2011-08-04 Canon It Solutions Inc Relay processing apparatus, relay processing method and program
US20120030469A1 (en) * 2010-07-28 2012-02-02 Symantec Corporation Streamlined CSR Generation, Certificate Enrollment, and Certificate Delivery
US20160337134A1 (en) * 2011-04-13 2016-11-17 Disney Enterprises, Inc. Authenticated content delivery platform
US20130061281A1 (en) * 2011-09-02 2013-03-07 Barracuda Networks, Inc. System and Web Security Agent Method for Certificate Authority Reputation Enforcement
US20170006023A1 (en) * 2015-07-01 2017-01-05 International Business Machines Corporation Using resource records for digital certificate validation
EP3720082A1 (en) * 2019-04-05 2020-10-07 Siemens Aktiengesellschaft Method for issuing a cryptographically protected authenticity certificate for a user

Similar Documents

Publication Publication Date Title
US11514440B2 (en) Method for issuing authentication information and blockchain-based server using the same
CN109687959B (en) Key security management system, key security management method, key security management medium, and computer program
CN105608577B (en) Method for realizing non-repudiation, payment management server and user terminal thereof
US6993652B2 (en) Method and system for providing client privacy when requesting content from a public server
CN104954330B (en) A kind of methods, devices and systems to be conducted interviews to data resource
CN111355726B (en) Identity authorization login method and device, electronic equipment and storage medium
US20120210123A1 (en) One-time password certificate renewal
CN112134708A (en) Authorization method, authorization request method and device
CN113312664A (en) User data authorization method and user data authorization system
CN114666168B (en) Decentralized identity certificate verification method and device, and electronic equipment
CN110233850B (en) Registration method, application server, user side and system based on alliance chain
CN114338242B (en) Cross-domain single sign-on access method and system based on block chain technology
EP2262165B1 (en) User generated content registering method, apparatus and system
CN111709752A (en) Virtual resource processing method and device, computer readable medium and electronic equipment
CN104125230A (en) Short message authentication service system and authentication method
CN115460019B (en) Method, apparatus, device and medium for providing digital identity-based target application
CN106656955A (en) Communication method and system and user terminal
CN106911628A (en) A kind of user registers the method and device of application software on the client
CN113746916A (en) Block chain-based third-party service providing method, system and related node
CN115955364B (en) User identity information confidentiality method and system of network bidding transaction system
CN110034922B (en) Request processing method, processing device, request verification method and verification device
CN116132071B (en) Identity authentication method and device for identification analysis node based on blockchain
CN110995454A (en) Service verification method and system
CN114266057A (en) Data distribution method and system
CN115242471A (en) Information transmission method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination