[go: up one dir, main page]

CN114428967A - Data transmission method, device, equipment and storage medium - Google Patents

Data transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN114428967A
CN114428967A CN202210077334.3A CN202210077334A CN114428967A CN 114428967 A CN114428967 A CN 114428967A CN 202210077334 A CN202210077334 A CN 202210077334A CN 114428967 A CN114428967 A CN 114428967A
Authority
CN
China
Prior art keywords
website
data
certificate
domain name
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210077334.3A
Other languages
Chinese (zh)
Other versions
CN114428967B (en
Inventor
赵光宇
王斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202210077334.3A priority Critical patent/CN114428967B/en
Publication of CN114428967A publication Critical patent/CN114428967A/en
Application granted granted Critical
Publication of CN114428967B publication Critical patent/CN114428967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开提供了一种数据传输方法、装置、设备、存储介质以及程序产品,涉及计算机技术领域,尤其涉及数据搜索技术领域。具体实现方案为:响应于接收到推送数据,确定与网站数据对应的目标域名,其中,推送数据包括网站数据和第一网站凭证;确定已存储的网站凭证中与目标域名对应的第二网站凭证;以及在确定第一网站凭证与第二网站凭证一致的情况下,收录网站数据。

Figure 202210077334

The present disclosure provides a data transmission method, apparatus, device, storage medium, and program product, and relates to the field of computer technology, in particular, to the field of data search technology. The specific implementation scheme is: in response to receiving the push data, determine the target domain name corresponding to the website data, wherein the push data includes the website data and the first website credential; determine the second website credential corresponding to the target domain name in the stored website credential ; and in the case of determining that the first website credential is consistent with the second website credential, including website data.

Figure 202210077334

Description

Data transmission method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technology, and more particularly, to the field of data search technology.
Background
A manager of a website may submit website data to a search engine to help the search engine more fully include the website data for the website. When a user submits website data to a search engine, the search engine needs to verify whether the user submitting the website data has the management authority of the corresponding website.
Disclosure of Invention
The present disclosure provides a data transmission method, apparatus, device, storage medium, and program product.
According to an aspect of the present disclosure, there is provided a data transmission method, including: in response to receiving push data, determining a target domain name corresponding to the website data, wherein the push data comprises the website data and a first website credential; determining a second website certificate corresponding to the target domain name in the stored website certificates; and in the case that the first website credential is determined to be consistent with the second website credential, listing the website data.
According to another aspect of the present disclosure, there is provided a data transmission method including: acquiring a public key from a search engine; encrypting the website certificate according to the public key to obtain a ciphertext certificate; sending the ciphertext certificate and at least one website domain name to the search engine; determining pushing data according to the website voucher and the website data; and sending the pushed data to the search engine.
Another aspect of the present disclosure provides an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the embodiments of the present disclosure.
According to another aspect of the disclosed embodiments, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method shown in the disclosed embodiments.
According to another aspect of the embodiments of the present disclosure, there is provided a computer program product comprising computer programs/instructions, characterized in that the computer programs/instructions, when executed by a processor, implement the steps of the method shown in the embodiments of the present disclosure.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 schematically illustrates an application scenario diagram of a data transmission method, an apparatus, an electronic device and a storage medium according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow chart of a data transmission method according to an embodiment of the present disclosure;
fig. 3 schematically shows a flow chart of a data transmission method according to another embodiment of the present disclosure;
fig. 4 schematically shows a schematic diagram of a data transmission method according to an embodiment of the present disclosure;
fig. 5 schematically shows a block diagram of a data transmission device according to an embodiment of the present disclosure;
fig. 6 schematically shows a block diagram of a data transmission device according to another embodiment of the present disclosure; and
FIG. 7 schematically shows a block diagram of an example electronic device that may be used to implement embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
An application scenario of the data transmission method and apparatus provided by the present disclosure will be described below with reference to fig. 1.
Fig. 1 schematically illustrates an application scenario diagram of a data transmission method, an apparatus, an electronic device and a storage medium according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the application scenario 100 includes a terminal device 101, a search engine 102, a web server 103, and a network 104. Network 104 is the medium used to provide communication links between terminal devices 101, search engine 102, and web server 103. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal device 101 to interact with search engine 102 over network 104 to receive or send messages and the like. Various messaging client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal device 101.
The terminal device 101 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The website server 103 may be a background management server that provides support for websites. The website server 103 may store data related to the website, such as link addresses of website resources. The website resources may include, for example, video, audio, pictures, web pages, script files, site maps, and the like.
The search engine 102 and the website Server 103 may be cloud servers, which are also called cloud computing servers or cloud hosts, and are host products in a cloud computing service system, so as to solve the defects of high management difficulty and weak service extensibility in the conventional physical host and VPS service ("Virtual Private Server", or "VPS" for short). Search engine 102 and web server 103 may also be servers of a distributed system, or servers that incorporate a blockchain.
According to an embodiment of the present disclosure, a user may send a link address of a website resource to the search engine 102 through the terminal device 101. The search engine 102 may then obtain corresponding website resources from the website server 103 according to the link address, and then record the website resources for use in subsequent retrieval of the website.
In the related art, each time website data is uploaded, the search engine 102 needs to authenticate the user to determine that the user has ownership of the website. The website data can not be uploaded to the search engine 102 until the user is authenticated, which is inefficient.
According to embodiments of the present disclosure, website credentials for a website may be stored in search engine 102. The user may carry the website credentials when sending the website data to the search engine 102. The search engine can determine whether the sender of the data is the manager of the website by checking the website certificate, so that the ownership of the website by the user does not need to be authenticated, and the efficiency is higher.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the related website data, website certificates and other data are all in accordance with the regulations of related laws and regulations, and do not violate the good customs of the public order.
Based on this, fig. 2 schematically shows a flow chart of a data transmission method according to an embodiment of the present disclosure.
As shown in fig. 2, the data transmission method 200 includes, in operation S210, the terminal device determining push data according to website data and a first website credential corresponding to the website data.
Then, the terminal device transmits the push data to the search engine in operation S220.
In operation S230, the search engine determines a target domain name corresponding to the website data in response to receiving the push data.
In operation S240, the search engine determines a second website credential corresponding to the target domain name among the stored website credentials.
In operation S250, the search engine includes the website data in case that it is determined that the first website credential is identical to the second website credential.
According to an embodiment of the present disclosure, the push data may include website data and a website credential corresponding to the website data, i.e., a first website credential.
According to the embodiment of the disclosure, the user can actively send the push data to the search engine through the terminal device. The sending method may include, for example, crul push, post push, php push, rudy push, and the like.
According to embodiments of the present disclosure, the website data may include, for example, a link address of the website Resource, where the link address may include a Uniform Resource Locator (URL).
According to embodiments of the present disclosure, the website resources may include, for example, at least one of video, audio, pictures, web pages, script files, and sitemaps.
According to embodiments of the present disclosure, the target domain name may be determined, for example, from a domain name portion in a link address of a website resource. For example, the link address of the website resource may be http: html, the domain name portion of the link address can be determined to be xxx.com, and thus the target domain name corresponding to the website data can be determined to be xxx.com.
According to the embodiment of the disclosure, if the first website credential is consistent with the second website credential, it indicates that the pushed data is issued by the website administrator or authorized by the website administrator, and the website data may be included. If the first website certificate is inconsistent with the second website certificate, it indicates that the pushed data is not sent by the website manager or authorized by the website manager, and the website data can be rejected.
According to the embodiment of the disclosure, the search engine may store the website credentials corresponding to each domain name in advance. When the search engine receives the pushed data from the terminal equipment, the target domain name corresponding to the website data can be determined, whether the pushed data are sent by a website manager or authorized by the website manager can be determined by comparing the website certificate corresponding to the target domain name in the stored website certificates with the website certificate in the pushed data, the sender of the website data does not need to be authenticated each time, and the efficiency is high.
In the related art, a user needs to access a search engine to perform website attribution authentication to upload website data, and only a single website can be authenticated each time. In the case where a manager of a website manages a large number of websites at the same time, the manpower cost of the manager and the calculation cost of the search engine are high.
According to the embodiment of the disclosure, when uploading website data, a website manager can manage all websites in batches without authenticating ownership of the websites in a search engine, so that the labor cost of the manager and the calculation cost of the search engine are saved.
According to another embodiment of the present disclosure, the website credential of each domain name may be preset by the website administrator corresponding to each domain name, and then sent to the search engine for storage.
Based on this, fig. 3 schematically shows a flow chart of a data transmission method according to another embodiment of the present disclosure.
As shown in fig. 3, the data transmission method 300 may further include the search engine transmitting the public key to the terminal device in operation S310, on the basis of the above-described method.
Then, in operation S320, the terminal device obtains the public key from the search engine, and encrypts the website credential according to the public key to obtain a ciphertext credential.
In operation S330, the terminal device transmits the ciphertext certificate and the at least one website domain name to a search engine.
In operation S340, the search engine receives the ciphertext certificate from the terminal device and the at least one domain name corresponding to the ciphertext certificate, and decrypts the ciphertext certificate according to the private key corresponding to the public key to obtain the website certificate.
In operation S350, the search engine stores the website credential and at least one domain name.
According to embodiments of the present disclosure, a search engine may determine a public key and a private key according to an asymmetric encryption algorithm. The asymmetric encryption Algorithm may include, for example, an RSA Algorithm, a Digital Signature Algorithm (DSA) method, an Elliptic Curve Signature Algorithm (ECDSA) method, and the like.
According to embodiments of the present disclosure, each domain name may correspond to a website credential. The website credentials may be used to identify the administrator of the corresponding website. The website credentials may include, for example, tokens. For example, in this embodiment, a character string may be randomly determined as a website credential.
According to the embodiment of the disclosure, a user can log in a station leader platform provided by a search engine through terminal equipment, and then the ciphertext certificate and the corresponding domain name are uploaded in the station leader platform. In this embodiment, the same user may be an administrator of one or more websites at the same time, and therefore, multiple websites owned by the same administrator may set the same website credential, that is, the domain name corresponding to each website credential may be one or more.
According to the embodiment of the disclosure, after the search engine stores the website voucher and the corresponding domain name, whether the received pushed data is sent by the website manager or the website manager is allowed to be sent can be determined according to the website voucher, and the sender of the website data does not need to be authenticated each time, so that the operation cost of the search engine is saved, the operation of a user is simplified, and the efficiency is improved.
According to the embodiment of the disclosure, when the terminal device sends the website certificate to the search engine, the public key provided by the search engine is used for encrypting the website certificate to obtain the ciphertext certificate, and then the ciphertext certificate is sent to the search engine, so that the risk of hacking can be reduced, and the security during data transmission is improved.
According to other embodiments of the present disclosure, in the case that the website credential is encrypted as a ciphertext credential, the ciphertext credential may also be issued through the website. Then the search engine can pull the ciphertext data released by the website, and then decrypt the ciphertext data to obtain the corresponding website credential.
The data transmission method shown above is further explained with reference to fig. 4 in conjunction with the specific embodiment. Those skilled in the art will appreciate that the following example embodiments are only for the understanding of the present disclosure, and the present disclosure is not limited thereto.
Fig. 4 schematically shows a schematic diagram of a data transmission method according to an embodiment of the present disclosure.
As shown in fig. 4, the search engine generates an asymmetrically encrypted public key and private key and transmits the public key to the terminal device used by each website manager in operation S410.
In operation S420, the website administrator sets a website credential through the terminal device, encrypts the website credential according to the public key provided by the search engine to obtain a ciphertext credential, and then releases the encrypted ciphertext credential to the website.
In operation S430, the website manager may push a link address of the website resource to the search engine through the terminal device using the set website credential.
In operation S440, the search engine pulls data issued by the website to obtain a ciphertext certificate. And then, decrypting by using the private key to obtain an unencrypted website certificate corresponding to the website.
In operation S450, the search engine determines a corresponding domain name according to the link address in the pushed data. And then judging whether the stored website certificate of the domain name is consistent with the website certificate in the push data.
If the stored website credential for the domain name is consistent with the website credential in the push data, the search engine may determine that the push is a website administrator operation, and perform operation S460 to accept the push data. If the stored website credential for the domain name is not consistent with the website credential in the push data, the search engine may determine that the push is not a website administrator operation, and perform operation S470 to reject the push.
In the related art, a user needs to access a search engine to perform website attribution authentication to upload website data, and only a single website can be authenticated each time. In the case where a manager of a website manages a large number of websites at the same time, the manpower cost of the manager and the calculation cost of the search engine are high.
According to the embodiment of the disclosure, when uploading website data, a website manager can manage all websites in batches without verifying ownership of the websites in a search engine, so that the labor cost of the manager and the calculation cost of the search engine are saved. In addition, an encrypted website certificate is used between the website manager and the search engine, so that the risk of hacking is reduced, and the safety of data transmission is improved.
The following describes the data transmission device provided by the present disclosure with reference to fig. 5.
Fig. 5 schematically shows a block diagram of a data transmission device according to an embodiment of the present disclosure.
As shown in fig. 5, the data transmission apparatus 500 includes a first determination module 510, a second determination module 520, and a listing module 530.
The first determining module 510 is configured to determine, in response to receiving push data, a target domain name corresponding to website data, where the push data includes the website data and a first website credential.
A second determining module 520, configured to determine a second website credential corresponding to the target domain name in the stored website credentials.
A listing module 530 configured to, if it is determined that the first website credential is consistent with the second website credential, listing the website data.
According to the embodiment of the disclosure, the apparatus may further include a sending module, a decryption module, and a storage module. The sending module is used for sending the public key to the terminal equipment. And the decryption module is used for responding to the received ciphertext certificate from the terminal equipment and at least one domain name corresponding to the ciphertext certificate, decrypting the ciphertext certificate according to a private key corresponding to the public key, and obtaining a third website certificate. And the storage module is used for storing the third website certificate and at least one domain name, wherein the ciphertext certificate is obtained by encrypting according to a public key.
According to an embodiment of the present disclosure, the website data may include, for example: the link address of the resource. The first determination module may include a third determination sub-module to determine the target domain name based on a domain name portion of the link address of the resource.
According to an embodiment of the present disclosure, the listing module may include an acquisition submodule and an establishment submodule. And the obtaining submodule is used for obtaining the corresponding resource according to the link address. And the establishing submodule is used for establishing an index for the resource.
According to embodiments of the present disclosure, the resource may include, for example, at least one of video, audio, pictures, web pages, script files, and sitemaps.
Fig. 6 schematically shows a block diagram of a data transmission device according to another embodiment of the present disclosure.
As shown in fig. 6, the data transmission apparatus 600 includes an obtaining module 610, an encrypting module 620, a first sending module 630, a data determining module 640, and a second sending module 650.
An obtaining module 610, configured to obtain a public key from a search engine.
And the encryption module 620 is configured to encrypt the website credential according to the public key to obtain a ciphertext credential.
The first sending module 630 is configured to send the ciphertext certificate and the at least one website domain name to a search engine.
And the data determining module 640 is configured to determine push data according to the website credential and the website data.
A second sending module 650, configured to send the pushed data to the search engine.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
Fig. 7 schematically illustrates a block diagram of an example electronic device 700 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 7, the device 700 comprises a computing unit 701, which may perform various suitable actions and processes according to a computer program stored in a Read Only Memory (ROM)702 or a computer program loaded from a storage unit 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data required for the operation of the device 700 can also be stored. The computing unit 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Various components in the device 700 are connected to the I/O interface 705, including: an input unit 706 such as a keyboard, a mouse, or the like; an output unit 707 such as various types of displays, speakers, and the like; a storage unit 708 such as a magnetic disk, optical disk, or the like; and a communication unit 709 such as a network card, modem, wireless communication transceiver, etc. The communication unit 709 allows the device 700 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
Computing unit 701 may be a variety of general purpose and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 701 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 701 executes the respective methods and processes described above, such as the data transmission method. For example, in some embodiments, the data transfer method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 708. In some embodiments, part or all of a computer program may be loaded onto and/or installed onto device 700 via ROM 702 and/or communications unit 709. When the computer program is loaded into the RAM 703 and executed by the computing unit 701, one or more steps of the data transfer method described above may be performed. Alternatively, in other embodiments, the computing unit 701 may be configured to perform the data transfer method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (15)

1. A method of data transmission, comprising:
in response to receiving push data, determining a target domain name corresponding to the website data, wherein the push data comprises the website data and a first website credential;
determining a second website certificate corresponding to the target domain name in the stored website certificates; and
in an instance in which it is determined that the first website credential is consistent with the second website credential, including the website data.
2. The method of claim 1, further comprising:
sending a public key to the terminal device; and
in response to receiving the ciphertext certificate from the terminal equipment and the at least one domain name corresponding to the ciphertext certificate, decrypting the ciphertext certificate according to the private key corresponding to the public key to obtain a third website certificate, and
and storing the third website certificate and the at least one domain name, wherein the ciphertext certificate is obtained by encrypting according to the public key.
3. The method of claim 1, wherein the website data comprises: a link address of a website resource; the determining the target domain name corresponding to the website data includes:
and determining the target domain name according to the domain name part in the link address of the website resource.
4. The method of claim 3, wherein the listing the website data comprises:
acquiring corresponding website resources according to the link address; and
and establishing an index for the website resources.
5. The method of claim 3 or 4, wherein the website resources comprise at least one of video, audio, pictures, web pages, script files, and sitemaps.
6. A method of data transmission, comprising:
acquiring a public key from a search engine;
encrypting the website certificate according to the public key to obtain a ciphertext certificate;
sending the ciphertext certificate and at least one website domain name to the search engine;
determining pushing data according to the website voucher and the website data; and
and sending the pushed data to the search engine.
7. A data transmission apparatus comprising:
the first determining module is used for determining a target domain name corresponding to the website data in response to receiving push data, wherein the push data comprises the website data and a first website certificate;
the second determining module is used for determining a second website certificate corresponding to the target domain name in the stored website certificates; and
and the receiving and recording module is used for receiving and recording the website data under the condition that the first website voucher is consistent with the second website voucher.
8. The apparatus of claim 7, further comprising:
the sending module is used for sending the public key to the terminal equipment;
the decryption module is used for responding to the received ciphertext certificate from the terminal equipment and at least one domain name corresponding to the ciphertext certificate, decrypting the ciphertext certificate according to a private key corresponding to the public key, and obtaining a third website certificate; and
and the storage module is used for storing the third website certificate and the at least one domain name, wherein the ciphertext certificate is obtained by encrypting according to the public key.
9. The apparatus of claim 7, wherein the website data comprises: a link address of a website resource; the first determining module includes:
and the third determining sub-module is used for determining the target domain name according to the domain name part in the link address of the website resource.
10. The apparatus of claim 9, wherein the listing module comprises:
the acquisition submodule is used for acquiring corresponding website resources according to the link address; and
and the establishing submodule is used for establishing an index for the website resources.
11. The apparatus of claim 9 or 10, wherein the website resource comprises at least one of video, audio, pictures, web pages, script files, and sitemaps.
12. A data transmission apparatus comprising:
the acquisition module is used for acquiring a public key from a search engine;
the encryption module is used for encrypting the website certificate according to the public key to obtain a ciphertext certificate;
the first sending module is used for sending the ciphertext voucher and at least one website domain name to the search engine;
the data determining module is used for determining pushing data according to the website voucher and the website data; and
and the second sending module is used for sending the pushed data to the search engine.
13. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
14. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-6.
15. A computer program product comprising computer program/instructions, characterized in that the computer program/instructions, when executed by a processor, implement the steps of the method according to any of claims 1-6.
CN202210077334.3A 2022-01-21 2022-01-21 Data transmission method, device, equipment and storage medium Active CN114428967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210077334.3A CN114428967B (en) 2022-01-21 2022-01-21 Data transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210077334.3A CN114428967B (en) 2022-01-21 2022-01-21 Data transmission method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114428967A true CN114428967A (en) 2022-05-03
CN114428967B CN114428967B (en) 2025-10-10

Family

ID=81312539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210077334.3A Active CN114428967B (en) 2022-01-21 2022-01-21 Data transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114428967B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116016712A (en) * 2022-12-13 2023-04-25 广东电网有限责任公司 Power equipment data transmission control method, device, power system and storage medium

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204638A1 (en) * 2008-02-08 2009-08-13 Microsoft Corporation Automated client sitemap generation
US20110055249A1 (en) * 2009-08-28 2011-03-03 The Go Daddy Group, Inc. Social website account authentication via search engine based domain name control validation
CN103618742A (en) * 2013-12-09 2014-03-05 北京奇虎科技有限公司 Method and system for acquiring sub domain names and webmaster permission verification method
CN103685606A (en) * 2013-12-23 2014-03-26 北京奇虎科技有限公司 Associated domain name acquisition method, associated domain name acquisition system and web administrator permission validation method
CN104503983A (en) * 2014-11-27 2015-04-08 百度在线网络技术(北京)有限公司 Method and device for providing website certification data for search engine
CN105260469A (en) * 2015-10-16 2016-01-20 广州神马移动信息科技有限公司 Sitemap processing method, apparatus and device
US9419799B1 (en) * 2014-08-22 2016-08-16 Emc Corporation System and method to provide secure credential
US20180026968A1 (en) * 2011-07-29 2018-01-25 Amazon Technologies, Inc. Managing security credentials
CN109299352A (en) * 2018-11-14 2019-02-01 百度在线网络技术(北京)有限公司 The update method of website data, device and search engine in search engine
CN110968753A (en) * 2018-09-28 2020-04-07 北京国双科技有限公司 Webpage data crawling method and device
CN110968760A (en) * 2018-09-30 2020-04-07 北京国双科技有限公司 Webpage data crawling method and device, and webpage login method and device
CN111597522A (en) * 2020-05-21 2020-08-28 杭州安恒信息技术股份有限公司 Website affiliate authentication method, system, equipment and readable storage medium
CN112075061A (en) * 2018-04-26 2020-12-11 谷歌有限责任公司 Web site authentication based on automatic population
CN112417425A (en) * 2020-12-03 2021-02-26 腾讯科技(深圳)有限公司 Equipment authentication method, device, system, terminal equipment and storage medium
CN112788061A (en) * 2021-01-29 2021-05-11 百度在线网络技术(北京)有限公司 Authentication method, device, equipment, storage medium and program product
CN113783855A (en) * 2021-08-30 2021-12-10 北京百度网讯科技有限公司 Site evaluation method, site evaluation device, electronic apparatus, storage medium, and program product

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204638A1 (en) * 2008-02-08 2009-08-13 Microsoft Corporation Automated client sitemap generation
US20110055249A1 (en) * 2009-08-28 2011-03-03 The Go Daddy Group, Inc. Social website account authentication via search engine based domain name control validation
US20180026968A1 (en) * 2011-07-29 2018-01-25 Amazon Technologies, Inc. Managing security credentials
CN103618742A (en) * 2013-12-09 2014-03-05 北京奇虎科技有限公司 Method and system for acquiring sub domain names and webmaster permission verification method
CN103685606A (en) * 2013-12-23 2014-03-26 北京奇虎科技有限公司 Associated domain name acquisition method, associated domain name acquisition system and web administrator permission validation method
US9419799B1 (en) * 2014-08-22 2016-08-16 Emc Corporation System and method to provide secure credential
CN104503983A (en) * 2014-11-27 2015-04-08 百度在线网络技术(北京)有限公司 Method and device for providing website certification data for search engine
CN105260469A (en) * 2015-10-16 2016-01-20 广州神马移动信息科技有限公司 Sitemap processing method, apparatus and device
CN112075061A (en) * 2018-04-26 2020-12-11 谷歌有限责任公司 Web site authentication based on automatic population
CN110968753A (en) * 2018-09-28 2020-04-07 北京国双科技有限公司 Webpage data crawling method and device
CN110968760A (en) * 2018-09-30 2020-04-07 北京国双科技有限公司 Webpage data crawling method and device, and webpage login method and device
CN109299352A (en) * 2018-11-14 2019-02-01 百度在线网络技术(北京)有限公司 The update method of website data, device and search engine in search engine
CN111597522A (en) * 2020-05-21 2020-08-28 杭州安恒信息技术股份有限公司 Website affiliate authentication method, system, equipment and readable storage medium
CN112417425A (en) * 2020-12-03 2021-02-26 腾讯科技(深圳)有限公司 Equipment authentication method, device, system, terminal equipment and storage medium
CN112788061A (en) * 2021-01-29 2021-05-11 百度在线网络技术(北京)有限公司 Authentication method, device, equipment, storage medium and program product
CN113783855A (en) * 2021-08-30 2021-12-10 北京百度网讯科技有限公司 Site evaluation method, site evaluation device, electronic apparatus, storage medium, and program product

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘洵华: "基于SSI框架的网站站长平台的设计与实现", 万方中国学位论文数据库, 31 December 2016 (2016-12-31) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116016712A (en) * 2022-12-13 2023-04-25 广东电网有限责任公司 Power equipment data transmission control method, device, power system and storage medium

Also Published As

Publication number Publication date
CN114428967B (en) 2025-10-10

Similar Documents

Publication Publication Date Title
CN106533665B (en) Mthods, systems and devices for storing website private key plaintext
CN113347206B (en) Network access method and device
WO2021136290A1 (en) Identity authentication method and apparatus, and related device
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN110839004A (en) Method and apparatus for access authentication
CN110149354A (en) An encryption authentication method and device based on https protocol
CN111784887A (en) A method, device and system for authorization and release of user access
CN108880812A (en) The method and system of data encryption
CN114500054A (en) Service access method, service access device, electronic device, and storage medium
CN110022207A (en) Key management and the method and apparatus for handling data
CN112966286B (en) Method, system, device and computer readable medium for user login
CN114428967B (en) Data transmission method, device, equipment and storage medium
CN112565156B (en) Information registration method, device and system
CN112905990A (en) Access method, client, server and access system
CN114461912A (en) Information processing method and device, electronic equipment and storage medium
CN114417369A (en) File transmission method and device, electronic equipment and computer readable medium
US10972455B2 (en) Secure authentication in TLS sessions
US20240154945A1 (en) System and method for third party service integration into a browser client application
CN114157414B (en) Identity certificate generation method, verification method and system for digital currency
CN110602074B (en) A method, device and system for using business identity based on master-slave association
CN110611656B (en) Identity management method, device and system based on master identity multiple mapping
CN110166226B (en) A method and device for generating a secret key
CN108632209A (en) System, method and apparatus for handling information
CN113381982A (en) Registration method, registration device, electronic equipment and storage medium
CN113626848A (en) Sample data generation method, apparatus, electronic device, and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant