[go: nahoru, domu]

CN112231724B - Public number data processing method, device, server and storage medium - Google Patents

Public number data processing method, device, server and storage medium Download PDF

Info

Publication number
CN112231724B
CN112231724B CN202011088693.6A CN202011088693A CN112231724B CN 112231724 B CN112231724 B CN 112231724B CN 202011088693 A CN202011088693 A CN 202011088693A CN 112231724 B CN112231724 B CN 112231724B
Authority
CN
China
Prior art keywords
data packet
processor
identifier
target
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011088693.6A
Other languages
Chinese (zh)
Other versions
CN112231724A (en
Inventor
程文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN202011088693.6A priority Critical patent/CN112231724B/en
Publication of CN112231724A publication Critical patent/CN112231724A/en
Application granted granted Critical
Publication of CN112231724B publication Critical patent/CN112231724B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Primary Health Care (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application discloses a public number data processing method, a device, a server and a storage medium, wherein the method comprises the following steps: receiving a data packet through a preset interface, and acquiring a target identifier corresponding to the data packet from a domain name of the preset interface, wherein the target identifier is used for indicating a public number corresponding to the data packet; acquiring target configuration information corresponding to the target identifier of the data packet according to the corresponding relation between the preset identifier and the configuration information, and decrypting and checking the data packet according to the target configuration information; if the data packet is decrypted and the verification sign passes, determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor; the event type of the data packet is obtained, a sub-processor corresponding to the event type of the data packet is determined from the central processor, and the data packet is sent to the sub-processor, so that the sub-processor processes the data packet. By implementing the method, unified management of a plurality of public numbers can be simply and efficiently realized.

Description

Public number data processing method, device, server and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for processing public number data, a server, and a storage medium.
Background
Public numbers are ubiquitous in life, and individuals or enterprises can conduct information release, online communication, product display and the like through the public numbers. Currently, only one public number is deployed for one server, and a plurality of public numbers require a plurality of servers or a plurality of service processes, so that the cost is very consumed. However, enterprises or individuals often have a plurality of public numbers, so how to save the server overhead of the public numbers, and simply and efficiently realize unified management of the plurality of public numbers becomes an urgent problem to be solved.
Disclosure of Invention
The embodiment of the application provides a public number data processing method, a device, a server and a storage medium, by adopting the mode of receiving data packets corresponding to a plurality of public numbers based on a preset interface and processing the data packets, the cost of the server is saved, one server can process the data packets with different public numbers, and meanwhile, the data packets with different public numbers and the data packets with different event types can be processed on different processors, so that unified management of the public numbers is simply and efficiently realized.
In a first aspect, an embodiment of the present application discloses a method for processing public number data, where the method includes:
receiving a data packet through a preset interface, and acquiring a target identifier corresponding to the data packet from a domain name of the preset interface, wherein the target identifier is used for indicating a public number corresponding to the data packet;
acquiring target configuration information corresponding to a target identifier of the data packet according to a corresponding relation between a preset identifier and the configuration information, and decrypting and checking the data packet according to the target configuration information;
if the data packet is decrypted and the signature passes, determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor, wherein the central processor comprises a plurality of sub-processors;
and acquiring the event type of the data packet, determining a sub-processor corresponding to the event type of the data packet from the central processor, and sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
In a second aspect, embodiments of the present application disclose a public number data processing apparatus, the apparatus comprising:
The device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for receiving a data packet through a preset interface and acquiring an identifier corresponding to the data packet from a domain name of the preset interface, wherein the identifier is used for indicating a public number corresponding to the data packet;
the decryption unit is used for acquiring target configuration information corresponding to the identifier of the data packet according to the corresponding relation between the preset identifier and the configuration information, and decrypting and checking the data packet according to the target configuration information;
the determining unit is used for determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor if the data packet is decrypted and the verification signature passes, wherein the central processor comprises a plurality of sub-processors;
and the sending unit is used for acquiring the event type of the data packet, determining a sub-processor corresponding to the event type of the data packet from the central processor, and sending the data packet to the sub-processor so that the sub-processor can process the data packet.
In a third aspect, an embodiment of the present application discloses a server, including a processor, a memory, a transmitting device, and a receiving device, where the processor, the memory, the transmitting device, and the receiving device are connected to each other, where the memory is configured to store a computer program, the computer program includes program instructions, and the processor is configured to invoke the program instructions to perform the method of the first aspect.
In a fourth aspect, embodiments of the present application disclose a computer readable storage medium, wherein the computer readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method of the first aspect described above.
In this embodiment of the present invention, a server may receive a data packet through a preset interface, and obtain a target identifier corresponding to the data packet from a domain name of the preset interface, where the target identifier is used to indicate a public number corresponding to the data packet, and then obtain target configuration information corresponding to the target identifier of the data packet according to a corresponding relationship between the preset identifier and the configuration information, decrypt and check the data packet according to the target configuration information, and if the data packet is decrypted and checked, determine a central processor corresponding to the target identifier according to a corresponding relationship between the preset identifier and a processor, where the central processor includes multiple sub-processors, further obtain an event type of the data packet, determine a sub-processor corresponding to the event type of the data packet from the central processor, and send the data packet to the sub-processor, so that the sub-processor performs data processing on the data packet. Through the mode of receiving the data packets corresponding to the public numbers based on the preset interface and processing the data packets, the cost of a server is saved, one server can process the data packets with different public numbers, and meanwhile, the data packets with different public numbers and the data packets with different event types can be processed on different processors, so that unified management of the public numbers is simply and efficiently realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a method for processing public number data according to an embodiment of the present application;
FIG. 2 is a flow chart of another method for processing public number data according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of domain name verification according to an embodiment of the present application;
FIG. 4 is a flow chart of another method for processing public number data according to an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of a public number data processing device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Referring to fig. 1, a flow chart of a method for processing public number data according to an embodiment of the present application is shown. The public number data processing method described in the present embodiment is applied to a server, and includes the following steps:
s101: and receiving the data packet through a preset interface, and acquiring a target identifier corresponding to the data packet from a domain name of the preset interface, wherein the target identifier is used for indicating a public number corresponding to the data packet.
The target identifier may be an application identifier (Application Identification, appId), which may be obtained from a domain name of the preset interface. When the server receives the data packet through the preset interface, the AppId in the domain name of the preset interface is different. Then, according to the difference of AppId, the public number corresponding to the data packet can be determined. The data packet may be an extensible markup language (Extentsible Markup Language, XML) data packet.
Specifically, the server may receive the data packets corresponding to different public numbers through the preset interface, and in order to determine the public numbers corresponding to the data packets, the server may obtain the target identifiers from the domain names of the preset interface, the data packets sent by different public numbers, and the target identifiers obtained from the domain names of the preset interface are different, and then may determine the public numbers corresponding to the data packets according to the target identifiers.
S102: according to the corresponding relation between the preset identification and the configuration information, target configuration information corresponding to the target identification of the data packet is obtained, and the data packet is decrypted and checked according to the target configuration information.
In one implementation manner, the server may store the correspondence between the identifier and the configuration information in advance, for example, table 1 is the correspondence between the identifier and the configuration information stored in the server, and after determining the target identifier corresponding to the data packet, the server may determine the target configuration information corresponding to the target identifier according to the target identifier and the correspondence between the identifier and the configuration information, and acquire the target configuration information, so that the server decrypts and verifies the data packet according to the target configuration information. The target configuration information may include a key and a Token (Token), among others.
For example, if the server determines that the target identifier corresponding to the data packet is identifier 2 in table 1, it may determine that the configuration information corresponding to identifier 2 is configuration information 2 in table 1 according to, for example, the correspondence between the identifier and the configuration information shown in table 1, and after determining the configuration information 2 corresponding to identifier 2, the server may obtain the configuration information 2, and decrypt and tag the data packet according to the configuration information 2.
For another example, if the server determines that the target identifier corresponding to the data packet is identifier 3 in table 1, the server may determine that the configuration information corresponding to identifier 3 is configuration information 3 in table 1 according to, for example, the correspondence between the identifier and the configuration information shown in table 1, and after determining the configuration information 3 corresponding to identifier 3, the server may obtain the configuration information 3, and decrypt and tag the data packet according to the configuration information 3.
Table 1:
identification mark Configuration information
Sign 1 Configuration information 1
Sign 2 Configuration information 2
Sign 3 Configuration information 3
In one implementation, a multi-number configuration filter is configured in the server, and the correspondence between the identifiers and the configuration information may be stored in the configuration filter. After determining the target identifier corresponding to the data packet, the server can acquire the target configuration information corresponding to the target identifier from the multi-number configuration filter according to the target identifier, and decrypt and label the data packet according to the target configuration information.
In one implementation, the data packet received by the server through the preset interface is an encrypted data packet, and after the data packet is encrypted, the data packet is changed from plaintext content to ciphertext content, so that the safety of content transmission of the preset interface can be greatly improved. The server, after receiving the encrypted data packet through the preset interface, needs to decrypt the data packet before processing the data packet so that the subsequent server can process the data packet. The server may decrypt the data packet according to the key in the target configuration information, and in a specific embodiment, the server obtains a decryption algorithm corresponding to the key according to the key, and then decrypts the data packet according to the decryption algorithm. For example, the key may be an advanced encryption standard (Advanced Encryption Standard, AES) key, or may be another key, which is not limited in this application. Alternatively, the decryption algorithm corresponding to the key may be a symmetric key algorithm, where the symmetric encryption algorithm encrypts and decrypts data using the same key, or may be a non-key algorithm, where the non-key algorithm uses different keys to respectively complete encrypting and decrypting data. It should be noted that, the decryption algorithm corresponding to the key is not limited in this application. Optionally, after the server decrypts the data packet, illegal data in the data packet may be intercepted to ensure security.
In one implementation, the data packet also needs to be signed when it is decrypted. Optionally, the data packet may be signed according to Token. When the server performs signature verification on the data packet according to Token, the server also needs to acquire verification information corresponding to the data packet, wherein the verification information comprises a signature (signature), a random number (nonce) and a timestamp (timestamp), then determines a target string according to Token, timestamp, nonce and a preset algorithm, judges whether the signature is matched with the target string, and if the judgment result is that the signature is matched with the target string, the data packet passes verification. The specific verification process may be that the dictionary ordering is performed on three parameters Token, timestamp, nonce, the three parameter digital character strings are spliced into a character string for sha1 encryption, an encrypted target string is obtained, the encrypted target string is matched with the signature, and if the target string is identical to the signature, the verification of the data packet is indicated. Alternatively, if the packet is not verified, the packet may be intercepted and no subsequent processing is performed.
S103: if the data packet is decrypted and the signature passes, determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor, wherein the central processor comprises a plurality of sub-processors.
Specifically, after the server determines that the data packet is decrypted and the verification signature passes, the central processor corresponding to the target identifier can be determined according to the preset corresponding relation between the identifier and the processor and the target identifier. The server is provided with a plurality of central processors, and different identifiers correspond to different central processors.
In one implementation, the server stores the correspondence between the identifier and the processor in advance, for example, table 2 stores the correspondence between the identifier and the processor for the server, and after the server determines that the data packet is decrypted and the verification passes, the central processor corresponding to the target identifier may be determined according to the target identifier and the correspondence between the identifier and the processor, so as to perform subsequent operations.
For example, if the destination identifier corresponding to the data packet is identifier 2 in table 2, the processor corresponding to identifier 2 may be determined to be the central processor 2 in table 2 according to, for example, the correspondence between the identifier and the processor shown in table 2.
For another example, if the destination identifier corresponding to the data packet is identifier 3 in table 2, the processor corresponding to identifier 3 may be determined to be the central processor 3 in table 2 according to, for example, the correspondence between identifiers and processors shown in table 2.
Table 2:
identification mark Processor and method for controlling the same
Sign 1 Central processor 1
Sign 2 Central processor 2
Sign 3 Central processor 3
Optionally, the server may further set a blacklist in the central processor, where the blacklist includes a user account, where the user account may be a user account corresponding to a data packet obtained by the server when the data packet is detected to be an abnormal data packet, and the blacklist may be used to indicate that the user account in the blacklist cannot send information in a public number or that the user cannot use a function provided in the public number. For example, after detecting that the data packet is an abnormal data packet, the server may further obtain a user account corresponding to the data packet, and add the user account to the blacklist, where the user account cannot send information in the public number or cannot use the function provided in the public number.
S104: the event type of the data packet is obtained, a sub-processor corresponding to the event type of the data packet is determined from the central processor, and the data packet is sent to the sub-processor, so that the sub-processor processes the data packet.
The event type may be a customer session management event, a store audit event, a custom menu event, an attention event, a cancel attention event, a report geographic location event, a receive geographic location event, a scan event, a log asynchronous event, and so on.
In particular, each central processor may include a plurality of sub-processors, with different sub-processors being used to process data packets of different event types. The server may acquire the event type of the data packet, determine a corresponding sub-processor from the central processor according to the event type of the data packet, and further send the data packet to the sub-processor, so that the sub-processor performs data processing on the data packet.
For example, if the event type of the data packet is a client session management event, the server may send the data packet to the sub-processor that handles the client session management event, so that the sub-processor performs data processing on the data packet. For another example, if the event type of the data packet is a cancel attention event, the server may send the data packet to the sub-processor that processes the cancel attention event, so that the sub-processor performs data processing on the data packet.
In one implementation manner, the type identifier is carried in the data packet received by the server through the preset interface, and the type identifier can be used for indicating the event type of the data packet, so that the server can acquire the event type of the data packet according to the type identifier carried in the data packet. The type identifier may be a numerical number, a bit value, or other information, which is not limited in this application. For example, table 3 shows the correspondence between type identifiers and event types of data packets. As can be seen from table 3, if the type identifier is 1 in the data packet received by the server through the preset interface, the server may obtain, according to the type identifier, that the event type of the data packet is a client session management event. If the type identifier is 3 carried in the data packet received by the server through the preset interface, the server can acquire the event type of the data packet as a custom menu event according to the type identifier.
Table 3:
type identification Event type of data packet
1 Customer session management event
2 Store audit event
3 Custom menu events
4 Events of interest
In one implementation, each central processor in the server may store the corresponding relationship between the event type and the processor in advance, for example, table 4 stores the corresponding relationship between the event type and the processor stored in the server, and after the server acquires the event type of the data packet, the processor corresponding to the event type may be determined according to the event type and the corresponding relationship between the event type and the processor, that is, the sub-processor to which the data packet should be sent is determined, so that the data packet is processed in the sub-processor.
For example, if the event type of the data packet is the client session management event in table 4, the processor corresponding to the client session management event may be determined to be the sub-processor 1 in table 4 according to, for example, the correspondence between the event type and the processor shown in table 4, and after determining the sub-processor 1 corresponding to the client session management event, the server may send the data packet to the sub-processor 1, and then process the data packet for the client session management event.
For another example, if the event type of the data packet is the attention event in table 4, the processor corresponding to the attention event may be determined to be the sub-processor 4 in table 4 according to, for example, the correspondence between the event type and the processor shown in table 4, and after determining the sub-processor 4 corresponding to the attention event, the server may send the data packet to the sub-processor 4, and then process the attention event on the data packet.
Table 4:
in one implementation, before the data packet is sent to the sub-processor for processing, the data packet may be further intercepted, for example, the server may detect whether the data packet is an abnormal data packet, for example, the server may detect that there is spam or malicious information in the data packet, and the server may determine that the data packet is an abnormal data packet and intercept the data packet, so that the data packet does not need to be subjected to subsequent processing operations. If the server detects that the data packet is not an abnormal data packet, step S104 is performed.
In one implementation manner, before the data packet is sent to the sub-processor for processing, the method for intercepting the data packet may further be to detect whether the target identifier corresponding to the data packet acquired by the server matches with the preset identifier, if the target identifier corresponding to the data packet acquired by the server matches with the preset identifier, the data packet may be intercepted, and if the target identifier corresponding to the data packet does not match with the preset identifier, step S104 is executed. Optionally, the server stores a preset identifier list, and one or more preset identifiers in the preset identifier list may be used. Optionally, the determining of the preset identifier may be: and determining the number of times that the server intercepts the data packet corresponding to the public number, and if the number of times that the server intercepts the data packet corresponding to a certain public number exceeds a preset value, for example, 5 times, determining the identification corresponding to the data packet as a preset identification. The preset identifier can be added in real time, and the identifier corresponding to the data packet can be added to the preset identifier list as long as the number of times of intercepting the data packet corresponding to a certain public number exceeds a preset value. The preset identifier may also be determined by other means, which is not limited in this application.
In one implementation, after the data packet is sent to the corresponding sub-processor, the sub-processor may perform data processing on the data packet and return the processed data to the public number. Optionally, the server may encrypt the processed data and return the encrypted data to the public number to ensure the security of the data. For example, the information of the data packet is that a certain function of the public number menu bar is set to be a timing switch, the function cannot be used after exceeding a preset time, according to the information, the server can determine that the event type of the data packet is a custom menu event, the data packet is processed in the sub-processor 3, the sub-processor 3 sets the function of the public number menu bar according to the information of the data packet, and the corresponding data is returned to the public number in the form of the data packet after the processing.
In this embodiment of the present invention, a server may receive a data packet through a preset interface, and obtain a target identifier corresponding to the data packet from a domain name of the preset interface, where the target identifier is used to indicate a public number corresponding to the data packet, and then obtain target configuration information corresponding to the target identifier of the data packet according to a corresponding relationship between the preset identifier and the configuration information, decrypt and check the data packet according to the target configuration information, and if the data packet is decrypted and checked, the server may determine a central processor corresponding to the target identifier according to a corresponding relationship between the preset identifier and a processor, where the central processor includes a plurality of sub-processors, and further, the server may obtain an event type of the data packet, determine a sub-processor corresponding to the event type of the data packet from the central processor, and send the data packet to the sub-processor, so that the sub-processor performs data processing on the data packet. Through the mode of receiving the data packets corresponding to the public numbers based on the preset interface and processing the data packets, the cost of a server is saved, one server can process the data packets with different public numbers, and meanwhile, the data packets with different public numbers and the data packets with different event types can be processed on different processors, so that unified management of the public numbers is simply and efficiently realized.
Referring to fig. 2, a flow chart of another method for processing public number data according to an embodiment of the present application is shown. The public number data processing method described in the present embodiment is applied to a server, and includes the following steps:
s201: and receiving at least one public number data packet through a dynamic preset interface.
Specifically, the preset interface is dynamic, and the server may receive one or more public number data packets through the dynamic preset interface.
S202: and determining the domain name of the dynamic preset interface corresponding to the data packet of each public number according to the data packet of at least one public number, and acquiring the target identifier corresponding to the data packet of each public number from the domain name of the dynamic preset interface corresponding to the data packet of each public number.
Specifically, the preset interfaces are dynamic, and if the data packets come from different public numbers, the domain names of the corresponding preset interfaces are different. According to the difference of the domain names of the preset interfaces, the public numbers corresponding to the data can be determined. The domain name comprises a target identifier, and the target identifier is AppId. The difference in domain names of the preset interfaces may be the difference in target identifications in the domain names. When the server receives the data packets through the dynamic preset interface, the domain name of the current dynamic preset interface can be determined to obtain the target identification in the domain name, and the target identification can be used for determining the public numbers corresponding to different data packets.
For example, if the data packet received by the server through the dynamic preset interface is the data packet 1, and the server may determine that the domain name 1 of the dynamic preset interface corresponding to the current data packet 1 is "http:// development. Com/cn/wechat/111 aaabbb", the server may obtain "111aaabbb" in the domain name 1, that is, the AppId of the data packet 1. For another example, if the server receives the data packet 2 through the dynamic preset interface, the server may determine that the domain name 2 of the dynamic preset interface corresponding to the current data packet 2 is "http:// deven. It can be seen that the public number corresponding to the data packet can be determined according to the difference of AppId in the domain name.
In one implementation, multiple public domain names may be preconfigured, different public numbers and domain names are different, so when the server receives the data packets from the different public numbers through the dynamic preset interfaces, the domain names of the corresponding dynamic preset interfaces are different, and it should be noted that the domain names of the dynamic preset interfaces are the domain names of the preconfigured public numbers. For example, the domain name of public number 1 is configured as "http:// deven. Com/cn/wechat/111 aabbb", and the domain name of public number 2 is configured as "http:// deven. Com/cn/wechat/222 bbbcc", with the difference that "111 aabbb" and "222 bbbcc" in the most domain name ","111 aabbb ", i.e., the Applid of public number 1," 222bbbcc ", i.e., the Applid of public number 2. When different public numbers send data packets to the server, the server can determine whether the data packets correspond to the public number 1 or the public number 2 according to the domain name of the dynamic preset interface.
In one implementation, before the server receives the data packet through the preset interface, the domain name configured as described above may be further verified, and if the domain name verification is successful, the server may execute the step of receiving the data packet through the preset interface. For example, fig. 3 shows a schematic flow chart of domain name verification, and it can be seen from fig. 3 that an app id in a domain name can be obtained first, and a Token can be obtained according to the app id, during the verification process, the server can also obtain three parameters, namely, a signature (signature), a nonce (nonce), and a timestamp (timestamp), after obtaining the three parameters, it can be determined first whether the timestamp, and if any one of the two is empty, it indicates that the verification fails. And then obtaining a target string according to the Token obtained by the AppId, matching the target string with the signature, judging whether the target string is equal to the signature, if the target string is not equal to the signature, the verification fails, namely, the step of receiving the data packet through the preset interface cannot be executed, and if the target string is equal to the signature, the step of receiving the data packet through the preset interface can be executed after the verification is successful. The specific implementation manner of obtaining the target string according to the Token acquired by the Applid may be to sort the dictionary of the three Token, timestamp, nonce parameters, splice the three parameter digital character strings into a character string, and encrypt the character string with sha1, where the encrypted character string is the target string.
S203: according to the corresponding relation between the preset identification and the configuration information, target configuration information corresponding to the target identification of the data packet is obtained, and the data packet is decrypted and checked according to the target configuration information.
S204: if the data packet is decrypted and the signature passes, determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor, wherein the central processor comprises a plurality of sub-processors.
S205: the event type of the data packet is obtained, a sub-processor corresponding to the event type of the data packet is determined from the central processor, and the data packet is sent to the sub-processor, so that the sub-processor processes the data packet.
The specific implementation of steps S203 to S205 may be referred to the specific description of steps S102 to S104 in the above embodiment, and will not be repeated here.
In this embodiment of the present invention, a server may receive a data packet with at least one public number through a dynamic preset interface, determine a domain name of the dynamic preset interface corresponding to the data packet with each public number according to the data packet with at least one public number, obtain a target identifier corresponding to the data packet with each public number from the domain name of the dynamic preset interface corresponding to the data packet with each public number, obtain target configuration information corresponding to the target identifier of the data packet according to a corresponding relationship between the preset identifier and configuration information, decrypt and tag the data packet according to the target configuration information, and if the data packet decrypts and tag passes, determine a central processor corresponding to the target identifier according to a corresponding relationship between the preset identifier and the processor, where the central processor includes a plurality of sub-processors, and further, the server may determine a sub-processor corresponding to the event type of the data packet from the central processor, and send the data packet to the sub-processor, so that the sub-processor processes the data packet. Through the mode of receiving the data packets corresponding to the public numbers based on the preset interface and processing the data packets, the cost of a server is saved, one server can process the data packets with different public numbers, and meanwhile, the data packets with different public numbers and the data packets with different event types can be processed on different processors, so that unified management of the public numbers is simply and efficiently realized.
Fig. 4 is a schematic flow chart of another public number data method provided in the embodiment of the present application, where in the flow chart shown in fig. 4, the server may receive a data packet through presetting, and may further obtain a target identifier of the data packet according to a domain name of a preset interface, so as to determine a public number corresponding to the data packet according to the target identifier. After the server determines the target identifier corresponding to the data packet, the server can acquire the target configuration information according to the target identifier to decrypt and check the data packet. After the data packet decryption verification passes, the central processor corresponding to the target identifier can be determined through the corresponding relation between the preset identifier and the central processor. The server can also intercept the data packet, if the server detects that the data packet is an abnormal data packet, the server can intercept the data packet to avoid subsequent processing, and in this case, the central processor can return the processed data packet to the public number. If the server detects that the data packet is not an abnormal data packet, the data packet can be sent to a sub-processor corresponding to the event type for data processing according to the event type, for example, the event type can be a client session management event, a store audit event, a custom menu event, a concerned event cancellation, a geographical location event reporting, a geographical location event receiving, a scanning event and a log asynchronous event. Optionally, the data packet carries a type identifier, where the type identifier is used to indicate an event type of the data packet, and the server may obtain the event type of the data packet according to the type identifier. And sending the data packet to a corresponding sub-processor for data processing according to the event type, and returning the processed data packet to the public number after the sub-processor processes the data of the data packet.
Referring to fig. 5, a schematic structure diagram of a public number data processing device according to an embodiment of the present application is shown. The public number data processing apparatus includes:
an obtaining unit 501, configured to receive a data packet through a preset interface, and obtain an identifier corresponding to the data packet from a domain name of the preset interface, where the identifier is used to indicate a public number corresponding to the data packet;
the decryption unit 502 is configured to obtain target configuration information corresponding to the identifier of the data packet according to a preset correspondence between the identifier and the configuration information, and decrypt and check the data packet according to the target configuration information;
a determining unit 503, configured to determine, if the data packet is decrypted and the signature passes, a central processor corresponding to the target identifier according to a preset correspondence between the identifier and the processor, where the central processor includes a plurality of sub-processors;
a sending unit 504, configured to obtain an event type of the data packet, determine a sub-processor corresponding to the event type of the data packet from the central processor, and send the data packet to the sub-processor, so that the sub-processor performs data processing on the data packet.
In one implementation, the preset interface includes a dynamic preset interface, and the obtaining module 504 is specifically configured to:
receiving at least one public number data packet through a dynamic preset interface;
determining the domain name of the dynamic preset interface corresponding to the data packet of each public number according to the data packet of at least one public number, and acquiring the target identifier corresponding to the data packet of each public number from the domain name of the dynamic preset interface corresponding to the data packet of each public number.
In one implementation, the target configuration information includes a key and a token, and the decryption module 502 is specifically configured to:
and obtaining a decryption algorithm corresponding to the key according to the key, and decrypting the data packet according to the decryption algorithm.
And verifying the data packet according to the token.
In one implementation, the decryption module 502 is specifically configured to:
acquiring verification information corresponding to the data packet, wherein the verification information comprises a time stamp, a random number and a signature;
determining a target string according to the token, the timestamp, the random number and a preset algorithm;
judging whether the signature is matched with the target string or not;
And if the signature is matched with the target string as a judgment result, the verification is passed.
In one implementation, the data packet carries a type identifier, and the processing module 504 is specifically configured to:
acquiring the event type of the data packet according to the type identifier carried in the data packet;
and determining a sub-processor corresponding to the data packet according to the corresponding relation between the event type preset in the central processor and the processor.
In one implementation, the apparatus further includes an interception module 505, specifically configured to:
detecting whether the data packet is an abnormal data packet or not;
if the detection result is that the data packet is an abnormal data packet, intercepting the data packet;
and if the detection result is that the data packet is not an abnormal data packet, executing the step of sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
In one implementation, the interception module 505 is further configured to:
detecting whether the target identifier is matched with a preset identifier;
if the detection result is that the target identifier is matched with the preset identifier, intercepting the data packet corresponding to the target identifier;
And if the detection result is that the target identifier is not matched with the preset identifier, executing the step of sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
It may be appreciated that the functions of each functional module of the public number data processing apparatus described in the embodiments of the present application may be specifically implemented according to the method in the method embodiment described in fig. 1 or fig. 2, and the specific implementation process may refer to the relevant description of the method embodiment in fig. 1 or fig. 2, which is not repeated herein.
In this embodiment of the present application, the obtaining unit 501 receives a data packet through a preset interface, and obtains an identifier corresponding to the data packet from a domain name of the preset interface, where the identifier is used to indicate a public number corresponding to the data packet, the decrypting unit 502 obtains target configuration information corresponding to the identifier of the data packet according to a corresponding relationship between the preset identifier and the configuration information, and decrypts and tag-verifies the data packet according to the target configuration information, if the data packet decrypts and tag-verifies passes, the determining unit 503 determines a central processor corresponding to the target identifier according to a corresponding relationship between the preset identifier and a processor, where the central processor includes a plurality of sub-processors, and the sending unit 504 obtains an event type of the data packet, determines a sub-processor corresponding to the event type of the data packet from the central processor, and sends the data packet to the sub-processor, so that the sub-processor performs data processing on the data packet. Through the mode of receiving the data packets corresponding to the public numbers based on the preset interface and processing the data packets, the cost of a server is saved, one server can process the data packets with different public numbers, and meanwhile, the data packets with different public numbers and the data packets with different event types can be processed on different processors, so that unified management of the public numbers is simply and efficiently realized.
Fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application. The server described in the present embodiment includes: processor 601, memory 602, transmitting device 603 and receiving device 604. Data may be interacted among the processor 601, the memory 602, the transmitting device 603, and the receiving device 604.
The processor 601 may be a central processing unit (Central Processing Unit, CPU) which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 602 may include read only memory and random access memory, and provides program instructions and data to the processor 601. A portion of the memory 602 may also include non-volatile random access memory. Wherein the processor 601, when calling the program instructions, is configured to execute:
Receiving a data packet through a preset interface, and acquiring a target identifier corresponding to the data packet from a domain name of the preset interface, wherein the target identifier is used for indicating a public number corresponding to the data packet;
acquiring target configuration information corresponding to a target identifier of the data packet according to a corresponding relation between a preset identifier and the configuration information, and decrypting and checking the data packet according to the target configuration information;
if the data packet is decrypted and the signature passes, determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor, wherein the central processor comprises a plurality of sub-processors;
and sending the data packet to a corresponding sub-processor in the central processor according to the event type of the data packet so that the sub-processor processes the data packet.
In one implementation, the preset interface includes a dynamic preset interface, and the processor 601 is specifically configured to:
receiving at least one public number data packet through a dynamic preset interface;
determining the domain name of the dynamic preset interface corresponding to the data packet of each public number according to the data packet of at least one public number, and acquiring the target identifier corresponding to the data packet of each public number from the domain name of the dynamic preset interface corresponding to the data packet of each public number.
In one implementation, the target configuration information includes a key and a token, and the processor 601 is specifically configured to:
and obtaining a decryption algorithm corresponding to the key according to the key, and decrypting the data packet according to the decryption algorithm.
And verifying the data packet according to the token.
In one implementation, the processor 601 is specifically configured to:
acquiring verification information corresponding to the data packet, wherein the verification information comprises a time stamp, a random number and a signature;
determining a target string according to the token, the timestamp, the random number and a preset algorithm;
judging whether the signature is matched with the target string or not;
and if the signature is matched with the target string as a judgment result, the verification is passed.
In one implementation, the data packet carries a type identifier, and the processor 601 is specifically configured to:
acquiring the event type of the data packet according to the type identifier carried in the data packet;
and determining a sub-processor corresponding to the data packet according to the corresponding relation between the event type preset in the central processor and the processor.
In one implementation, the processor 601 is further configured to:
Detecting whether the data packet is an abnormal data packet or not;
if the detection result is that the data packet is an abnormal data packet, intercepting the data packet;
and if the detection result is that the data packet is not an abnormal data packet, executing the step of sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
In one implementation, the processor 601 is further configured to:
detecting whether the target identifier is matched with a preset identifier;
if the detection result is that the target identifier is matched with the preset identifier, intercepting the data packet corresponding to the target identifier;
and if the detection result is that the target identifier is not matched with the preset identifier, executing the step of sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
In particular, the processor 601 and the memory 602 described in the embodiments of the present application may perform the implementation described in the public number data processing method provided in fig. 1 or fig. 2 of the embodiments of the present application, or may perform the implementation of the public number data processing apparatus described in fig. 5 of the embodiments of the present application, which is not described herein again.
In this embodiment of the present invention, the processor 601 may receive a data packet through a preset interface, and obtain an identifier corresponding to the data packet from a domain name of the preset interface, where the identifier is used to indicate a public number corresponding to the data packet, obtain target configuration information corresponding to the identifier of the data packet according to a corresponding relationship between the preset identifier and the configuration information, decrypt and check the data packet according to the target configuration information, and if the data packet is decrypted and checked, determine a central processor corresponding to the target identifier according to a corresponding relationship between the preset identifier and the processor, where the central processor includes a plurality of sub-processors, further obtain an event type of the data packet, determine a sub-processor corresponding to the event type of the data packet from the central processor, and send the data packet to the sub-processor, so that the sub-processor performs data processing on the data packet. Through the mode of receiving the data packets corresponding to the public numbers based on the preset interface and processing the data packets, the cost of a server is saved, one server can process the data packets with different public numbers, and meanwhile, the data packets with different public numbers and the data packets with different event types can be processed on different processors, so that unified management of the public numbers is simply and efficiently realized.
The embodiment of the application further provides a computer readable storage medium, where program instructions are stored, where the program may include some or all of the steps of the public number data processing method in the corresponding embodiment of fig. 1 or fig. 2 when executed.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the described order of action, as some steps may take other order or be performed simultaneously according to the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of the above embodiments may be implemented by a program to instruct related hardware, the program may be stored in a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic or optical disk, and the like.
The foregoing has described in detail the methods, apparatuses, servers and storage media for processing public number data provided by the embodiments of the present application, and specific examples have been applied herein to illustrate the principles and embodiments of the present application, where the foregoing examples are only for aiding in understanding the methods and core ideas of the present application; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (9)

1. A method of processing public number data, comprising:
receiving a data packet through a preset interface, and acquiring a target identifier corresponding to the data packet from a domain name of the preset interface; the target identifier is used for indicating a public number corresponding to the data packet; the preset interface comprises a dynamic preset interface, the dynamic preset interface is used for receiving one or more data packets with public numbers, different public numbers correspond to different domain names, the domain names comprise target identifiers, the target identifiers are AppId, and the domain names of the public numbers are preconfigured under the condition of passing domain name verification; the receiving the data packet through the preset interface, and the obtaining the target identifier corresponding to the data packet from the domain name of the preset interface includes: receiving at least one public number data packet through a dynamic preset interface; determining the domain name of the dynamic preset interface corresponding to the data packet of each public number according to the data packet of at least one public number, and acquiring the target identifier corresponding to the data packet of each public number from the domain name of the dynamic preset interface corresponding to the data packet of each public number;
Acquiring target configuration information corresponding to a target identifier of the data packet according to a corresponding relation between a preset identifier and the configuration information, and decrypting and checking the data packet according to the target configuration information;
if the data packet is decrypted and the signature passes, determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor, wherein the central processor comprises a plurality of sub-processors;
and acquiring the event type of the data packet, determining a sub-processor corresponding to the event type of the data packet from the central processor, and sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
2. The method of claim 1, wherein the target configuration information comprises a key and a token; the decrypting and signature verifying of the data packet according to the target configuration information comprises the following steps:
obtaining a decryption algorithm corresponding to the key according to the key, and decrypting the data packet according to the decryption algorithm;
and verifying the data packet according to the token.
3. The method of claim 2, wherein signing the data packet based on the token comprises:
acquiring verification information corresponding to the data packet, wherein the verification information comprises a time stamp, a random number and a signature;
determining a target string according to the token, the timestamp, the random number and a preset algorithm;
judging whether the signature is matched with the target string or not;
and if the signature is matched with the target string as a judgment result, the verification is passed.
4. The method of claim 1, wherein the data packet carries a type identifier; the acquiring the event type of the data packet and determining a sub-processor corresponding to the event type of the data packet from the central processor comprises the following steps:
acquiring the event type of the data packet according to the type identifier carried in the data packet;
and determining a sub-processor corresponding to the data packet according to the corresponding relation between the event type preset in the central processor and the processor.
5. The method of claim 1, wherein the sending the data packet into the sub-processor to cause the sub-processor to perform data processing on the data packet, further comprises:
Detecting whether the data packet is an abnormal data packet or not;
if the detection result is that the data packet is an abnormal data packet, intercepting the data packet;
and if the detection result is that the data packet is not an abnormal data packet, executing the step of sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
6. The method of claim 1, wherein the sending the data packet into the sub-processor to cause the sub-processor to process the data packet further comprises:
detecting whether the target identifier is matched with a preset identifier;
if the detection result is that the target identifier is matched with the preset identifier, intercepting the data packet corresponding to the target identifier;
and if the detection result is that the target identifier is not matched with the preset identifier, executing the step of sending the data packet to the sub-processor so that the sub-processor carries out data processing on the data packet.
7. A public number data processing apparatus, comprising:
the acquisition unit is used for receiving the data packet through a preset interface and acquiring an identifier corresponding to the data packet from the domain name of the preset interface; the identifier is used for indicating a public number corresponding to the data packet; the preset interface comprises a dynamic preset interface, the dynamic preset interface is used for receiving one or more data packets with public numbers, different public numbers correspond to different domain names, the domain names comprise target identifiers, the target identifiers are AppId, and the domain names of the public numbers are preconfigured under the condition of passing domain name verification; the receiving the data packet through the preset interface, and the obtaining the target identifier corresponding to the data packet from the domain name of the preset interface includes: receiving at least one public number data packet through a dynamic preset interface; determining the domain name of the dynamic preset interface corresponding to the data packet of each public number according to the data packet of at least one public number, and acquiring the target identifier corresponding to the data packet of each public number from the domain name of the dynamic preset interface corresponding to the data packet of each public number;
The decryption unit is used for acquiring target configuration information corresponding to the identifier of the data packet according to the corresponding relation between the preset identifier and the configuration information, and decrypting and checking the data packet according to the target configuration information;
the determining unit is used for determining a central processor corresponding to the target identifier according to the corresponding relation between the preset identifier and the processor if the data packet is decrypted and the verification signature passes, wherein the central processor comprises a plurality of sub-processors;
and the sending unit is used for acquiring the event type of the data packet, determining a sub-processor corresponding to the event type of the data packet from the central processor, and sending the data packet to the sub-processor so that the sub-processor can process the data packet.
8. A server comprising a processor, a memory, a transmitting device and a receiving device, the processor, memory, transmitting device and receiving device being interconnected, wherein the memory is adapted to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1-6.
9. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-6.
CN202011088693.6A 2020-10-13 2020-10-13 Public number data processing method, device, server and storage medium Active CN112231724B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011088693.6A CN112231724B (en) 2020-10-13 2020-10-13 Public number data processing method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011088693.6A CN112231724B (en) 2020-10-13 2020-10-13 Public number data processing method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN112231724A CN112231724A (en) 2021-01-15
CN112231724B true CN112231724B (en) 2024-04-12

Family

ID=74112384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011088693.6A Active CN112231724B (en) 2020-10-13 2020-10-13 Public number data processing method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN112231724B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109327380A (en) * 2018-10-22 2019-02-12 中国平安财产保险股份有限公司 Public platform management method, device, computer equipment and storage medium
WO2019080460A1 (en) * 2017-10-26 2019-05-02 平安科技(深圳)有限公司 Management method for official wechat account, electronic device and computer-readable storage medium
CN110969461A (en) * 2018-09-29 2020-04-07 北京国双科技有限公司 Method and device for processing public number information, storage medium and processor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019080460A1 (en) * 2017-10-26 2019-05-02 平安科技(深圳)有限公司 Management method for official wechat account, electronic device and computer-readable storage medium
CN110969461A (en) * 2018-09-29 2020-04-07 北京国双科技有限公司 Method and device for processing public number information, storage medium and processor
CN109327380A (en) * 2018-10-22 2019-02-12 中国平安财产保险股份有限公司 Public platform management method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112231724A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
CN110493197B (en) Login processing method and related equipment
CN107391298B (en) Data storage state detection method and device and computer readable storage medium
CN109639661B (en) Server certificate updating method, device, equipment and computer readable storage medium
US7620824B2 (en) Data communicating apparatus, data communicating method, and program
CN107800678B (en) Method and device for detecting abnormal registration of terminal
CN112637836B (en) Data processing method and device, electronic equipment and storage medium
CN112291240B (en) Information processing method and device
US8484472B2 (en) System and method of filtering unsolicited messages
US8856525B2 (en) Authentication of email servers and personal computers
CN105681470B (en) Communication means, server based on hypertext transfer protocol, terminal
JP2005012732A (en) Device authentication system, terminal device, authentication server, service server, terminal device method, authentication method, terminal device program, authentication program, service server program, and storage medium
JP2016515235A5 (en)
CA2986401C (en) Authenticating a system based on a certificate
CN110519268B (en) Voting method, device, equipment, system and storage medium based on block chain
CN105933315A (en) Network service security communication method, device and system
CN110855624A (en) Safety verification method based on web interface and related equipment
CN106790083A (en) Detection method, device and mobile terminal that DNS is kidnapped
WO2018220693A1 (en) Information processing device, verification device, information processing system, information processing method, and recording medium
CN104836784A (en) Information processing method, client, and server
CN115694932A (en) Method and equipment for realizing community sensitive data protection based on block chain technology
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN112995096B (en) Data encryption and decryption methods, devices and equipment
CN109587134B (en) Method, apparatus, device and medium for secure authentication of interface bus
CN112231724B (en) Public number data processing method, device, server and storage medium
CN107086918A (en) A kind of client validation method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant