CN111191259A - Scientific and technological achievement encryption transmission method and device - Google Patents

Scientific and technological achievement encryption transmission method and device Download PDF

Info

Publication number
CN111191259A
CN111191259A CN201911349219.1A CN201911349219A CN111191259A CN 111191259 A CN111191259 A CN 111191259A CN 201911349219 A CN201911349219 A CN 201911349219A CN 111191259 A CN111191259 A CN 111191259A
Authority
CN
China
Prior art keywords
scientific
user
technological
technological achievement
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911349219.1A
Other languages
Chinese (zh)
Inventor
邹腊年
马银波
郭玲琼
徐飞飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaoxing Shangyu District Institute Of Technology
Original Assignee
Shaoxing Shangyu District Institute Of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaoxing Shangyu District Institute Of Technology filed Critical Shaoxing Shangyu District Institute Of Technology
Priority to CN201911349219.1A priority Critical patent/CN111191259A/en
Publication of CN111191259A publication Critical patent/CN111191259A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention provides a method and a device for encrypted transmission of scientific and technological achievements. The method comprises the following steps: acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID and the access request from the scientific and technological achievement access request; extracting a corresponding verification password from a local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from a scientific and technological achievement library through an access request according to a verification result; and encrypting the scientific and technological achievements through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievements to the corresponding users. According to the method, the user is verified in advance according to the user ID, and then the scientific and technological achievement accessed by the user is encrypted through the symmetric encryption algorithm, so that the safety of the visitor can be verified in advance, the steps of subsequent safety verification are reduced, the resource consumption is reduced, and then the scientific and technological achievement is encrypted in the transmission process of the scientific and technological achievement, so that the safety in the transmission process is improved.

Description

Scientific and technological achievement encryption transmission method and device
Technical Field
The invention relates to the technical field of information security, in particular to a method and a device for encrypted transmission of scientific and technological achievements.
Background
With the continuous development of the internet, the network information is increasingly abundant, the contact between the network information and people is increasingly tight, the daily life of people is more and more convenient, more and more files are transmitted by people through the network, and the safety of the transmission of the network files is more and more emphasized by people.
For the transmission of scientific and technological achievements, it is an important thing to ensure the security of the scientific and technological achievements in the transmission process, and at present, encryption transmission is performed through hash algorithm modes such as message digest algorithm, hash algorithm and the like, but these modes are easy to be cracked, or encryption transmission is performed on the scientific and technological achievements through symmetric encryption algorithm and asymmetric encryption algorithm, but the processing speed of the mode is slow, the efficiency is low, so a method for improving the transmission efficiency of the scientific and technological achievements is urgently needed, and the scientific and technological achievements can be transmitted efficiently and safely.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for encrypted transmission of scientific and technological achievements, and aims to solve the technical problem that the prior art cannot improve the transmission efficiency of the scientific and technological achievements, so that the scientific and technological achievements are transmitted efficiently and safely.
The technical scheme of the invention is realized as follows:
in one aspect, the present invention provides a scientific and technological achievement encryption transmission method, including the following steps:
s1, acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID and the access request from the scientific and technological achievement access request;
s2, extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result;
and S3, encrypting the scientific and technological achievement through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievement to the corresponding user.
Based on the above technical solution, preferably, before the step S1 of obtaining the scientific and technological achievement access request, and extracting the user ID, the access password corresponding to the user ID, and the access request from the scientific and technological achievement access request, the method further includes the following steps of obtaining the total number of times of the scientific and technological achievement access request and the user IP in a stage, obtaining the number of times of the historical scientific and technological achievement access request of the user IP according to the user IP, obtaining the threshold of the number of times of the access request according to the number of times of the historical scientific and technological achievement access request, comparing the threshold of the number of times of the request with the number of times of the request, and extracting the user ID, the access password corresponding to the user ID, and the access request from.
On the basis of the above technical solution, preferably, the request number threshold is compared with the request number, and according to the comparison result, the user ID, the access password corresponding to the user ID, and the access request are extracted from the scientific and technological achievement access request, and the method further includes the steps of comparing the request number threshold with the request number, when the request number is greater than the request number threshold, judging that the scientific and technological achievement access request is a malicious request, and temporarily freezing the user IP corresponding to the scientific and technological achievement access; and when the request times are smaller than the request time threshold, extracting the user ID, the access password corresponding to the user ID and the access request from the scientific and technological achievement access request.
On the basis of the above technical solution, preferably, in step S2, extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result, further comprising the steps of extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and when the verification password is the same as the access password, the verification is passed, and extracting the corresponding scientific and technological achievement from the scientific and technological achievement library through the access request; and when the verification password is different from the access password, the verification fails, and the scientific and technological achievement access request is rejected.
On the basis of the above technical solution, preferably, the corresponding scientific and technological achievement is extracted from the scientific and technological achievement library through the access request, and the method further includes the steps of obtaining the historical access request and the corresponding scientific and technological achievement, establishing a relation table according to the historical access request and the corresponding scientific and technological achievement, searching the corresponding scientific and technological achievement from the relation table through the access request, and extracting from the scientific and technological achievement library.
On the basis of the above technical solution, preferably, in step S3, according to the user ID, the scientific and technological achievement is encrypted by the symmetric encryption algorithm, and the encrypted scientific and technological achievement is fed back to the corresponding user, and the method further includes the following steps of encrypting the scientific and technological achievement by the key of the symmetric encryption algorithm according to the user ID, obtaining the encrypted scientific and technological achievement, marking the encrypted scientific and technological achievement according to the user ID, obtaining the scientific and technological achievement to be fed back, and feeding back the scientific and technological achievement to the corresponding user.
On the basis of the technical scheme, preferably, the encrypted scientific and technological achievement is obtained, the encrypted scientific and technological achievement is marked according to the user ID, and after the scientific and technological achievement to be fed back is obtained, the method further comprises the following steps of randomly generating the unique verification code and the corresponding check code, marking the unique verification code and the scientific and technological achievement to be fed back, and distributing the corresponding check code to the corresponding user according to the user ID.
Still further preferably, the scientific and technological achievement encryption transmission device includes:
the information extraction module is used for acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID and the access request from the scientific and technological achievement access request;
the scientific and technological achievement extraction module is used for extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result;
and the encryption feedback module is used for encrypting the scientific and technological achievements through a symmetric encryption algorithm according to the user ID and feeding back the encrypted scientific and technological achievements to the corresponding users.
In a second aspect, the method for encrypted transmission of scientific and technological achievements further includes an apparatus, where the apparatus includes: the device comprises a memory, a processor and a scientific achievement encrypted transmission method program which is stored on the memory and can run on the processor, wherein the scientific achievement encrypted transmission method program is configured to realize the steps of the scientific achievement encrypted transmission method.
In a third aspect, the scientific and technological achievement encrypted transmission method further includes a medium, which is a computer medium, and the computer medium stores thereon a scientific and technological achievement encrypted transmission method program, and when the scientific and technological achievement encrypted transmission method program is executed by a processor, the steps of the scientific and technological achievement encrypted transmission method are implemented.
Compared with the prior art, the encrypted transmission method for scientific and technological achievements has the following beneficial effects:
(1) the safety of the visitor is determined in advance by verifying the visitor information in advance, so that the problem of repeated verification of the safety of the visitor in the subsequent scientific and technological achievement transmission process is solved, the waste of resources is reduced, and the efficiency of the scientific and technological achievement transmission is improved;
(2) encrypt the scientific and technological achievement that needs the transmission through symmetry encryption algorithm, can the whole encryption process of high efficiency completion fast, guarantee the security of scientific and technological achievement in transmission process, the user side also can encrypt the file of encryption fast simultaneously, has improved the efficiency of scientific and technological achievement transmission process.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an apparatus in a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a first embodiment of a method for encrypted transmission of a scientific and technological achievement according to the present invention;
fig. 3 is a functional block diagram of a first embodiment of a method for encrypted transmission of scientific and technological achievements according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the device, and that in actual implementations the device may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a storage 1005 as a medium may include an operating system, a network communication module, a user interface module, and a scientific result encrypted transmission method program.
In the device shown in fig. 1, the network interface 1004 is mainly used for establishing a communication connection between the device and a server storing all data required in the scientific and technological achievement encrypted transmission method system; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 of the scientific and technological achievement encryption transmission method device of the present invention may be arranged in the scientific and technological achievement encryption transmission method device, and the scientific and technological achievement encryption transmission method device calls the scientific and technological achievement encryption transmission method program stored in the memory 1005 through the processor 1001, and executes the scientific and technological achievement encryption transmission method provided by the present invention.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of a method for encrypted transmission of scientific and technological achievements according to the present invention.
In this embodiment, the scientific and technological achievement encryption transmission method includes the following steps:
s10: and acquiring a scientific and technological achievement access request, and extracting the user ID, the access password corresponding to the user ID and the access request from the scientific and technological achievement access request.
It should be understood that, after the system obtains the scientific and technological achievement access request sent by the user side, the system firstly determines the security of the user side, specifically, the system sets a time, obtains the total number of times of the scientific and technological achievement access request and the user IP in a time-phased manner according to the set time, obtains the number of times of the historical access request of the user IP from the historical access record, and extracts an access request number threshold according to the number of times of the historical access request of the user IP, so as to determine whether the user is a safe user or not, and whether the access request is a malicious request or not.
It should be understood that, after the system refines the access request number threshold, the total number of times of scientific and technological achievement access requests sent by the users, which is acquired at the system stage time, is compared with the access request number threshold, when the request number is greater than the request number threshold, the scientific and technological achievement access request is judged to be a malicious request, and the user IP corresponding to the access of the scientific and technological achievement is temporarily frozen; and when the request times are smaller than the request time threshold, extracting the user ID, the access password corresponding to the user ID and the access request from the scientific and technological achievement access request.
S20: and extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting the corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result.
It should be understood that, after the system determines that the access request of the user is not a malicious request, the system will extract the corresponding verification password from the local password library according to the user ID, the local password library is established in advance by the system and stores the verification password for verifying the user information, the verification password system has one part for each user and corresponds to each other, the user is created by the administrator, when the system detects that a new user is generated, the system will automatically generate two passwords through the password generator, one is distributed to the client, and the other is stored in the local password library.
It should be understood that the system will then authenticate the visitor according to the authentication password, and when the authentication password is the same as the access password, the authentication is passed, and the corresponding scientific and technological achievement is extracted from the scientific and technological achievement library through the access request; and when the verification password is different from the access password, the verification fails, and the scientific and technological achievement access request is rejected.
It should be understood that the system may establish the relationship table according to the historical access request and the corresponding scientific and technological achievement, and after receiving the user access request, may look up the corresponding scientific and technological achievement through the relationship table according to the access request.
S30: and encrypting the scientific and technological achievements through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievements to the corresponding users.
It should be understood that after the system extracts the corresponding scientific and technological achievements, the system encrypts the scientific and technological achievements through the key of the symmetric encryption algorithm, obtains the encrypted scientific and technological achievements, marks the encrypted scientific and technological achievements according to the user ID, obtains the scientific and technological achievements to be fed back, randomly generates the unique verification code and the corresponding check code through the password generator, marks the unique verification code and the scientific and technological achievements to be fed back, distributes the corresponding check code to the corresponding user according to the user ID, and feeds back the encrypted scientific and technological achievements together.
It should be understood that symmetric encryption is where encryption and decryption use the same key. Both parties of information receiving need to know the key and the encryption and decryption algorithm in advance, and the key is the same, then the data is encrypted and decrypted. The symmetric encryption algorithm is used for encrypting information such as sensitive data.
The above description is only for illustrative purposes and does not limit the technical solutions of the present application in any way.
As can be easily found from the above description, in the embodiment, the user ID, the access password corresponding to the user ID, and the access request are extracted from the scientific and technological achievement access request by obtaining the scientific and technological achievement access request; extracting a corresponding verification password from a local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from a scientific and technological achievement library through an access request according to a verification result; and encrypting the scientific and technological achievements through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievements to the corresponding users. According to the method, the user is verified in advance according to the user ID, and then the scientific and technological achievement accessed by the user is encrypted through the symmetric encryption algorithm, so that the safety of the visitor can be verified in advance, the steps of subsequent safety verification are reduced, the resource consumption is reduced, and then the scientific and technological achievement is encrypted in the transmission process of the scientific and technological achievement, so that the safety in the transmission process is improved.
In addition, the embodiment of the invention also provides a device for encrypting and transmitting the scientific and technological achievements. As shown in fig. 3, the apparatus for encrypted transmission of scientific and technological achievements includes: the system comprises an information extraction module 10, a scientific and technological achievement extraction module 20 and an encryption feedback module 30.
The information extraction module 10 is configured to acquire a scientific and technological achievement access request, and extract a user ID, an access password corresponding to the user ID, and an access request from the scientific and technological achievement access request;
the scientific and technological achievement extracting module 20 is used for extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result;
and the encryption feedback module 30 is used for encrypting the scientific and technological achievements through a symmetric encryption algorithm according to the user ID and feeding back the encrypted scientific and technological achievements to the corresponding users.
In addition, it should be noted that the above-described embodiments of the apparatus are merely illustrative, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of the modules to implement the purpose of the embodiments according to actual needs, and the present invention is not limited herein.
In addition, the technical details that are not described in detail in this embodiment may refer to the scientific and technological achievement encryption transmission method provided in any embodiment of the present invention, and are not described herein again.
Furthermore, an embodiment of the present invention further provides a medium, where the medium is a computer medium, and the computer medium stores a scientific and technological achievement encrypted transmission method program, where the scientific and technological achievement encrypted transmission method program, when executed by a processor, implements the following operations:
s1, acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID and the access request from the scientific and technological achievement access request;
s2, extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result;
and S3, encrypting the scientific and technological achievement through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievement to the corresponding user.
Further, when executed by a processor, the technical achievement encryption transmission method further realizes the following operations:
the method comprises the steps of obtaining the total times of scientific and technological achievement access requests and user IPs in a staged mode, obtaining the times of historical scientific and technological achievement access requests of the user IPs according to the user IPs, obtaining access request time thresholds according to the times of the historical scientific and technological achievement access requests, comparing the request time thresholds with the request times, and extracting user IDs, access passwords corresponding to the user IDs and access requests from the scientific and technological achievement access requests according to comparison results.
Further, when executed by a processor, the technical achievement encryption transmission method further realizes the following operations:
comparing the request frequency threshold with the request frequency, judging the scientific and technological achievement access request as a malicious request when the request frequency is greater than the request frequency threshold, and temporarily freezing the user IP corresponding to the scientific and technological achievement access; and when the request times are smaller than the request time threshold, extracting the user ID, the access password corresponding to the user ID and the access request from the scientific and technological achievement access request.
Further, when executed by a processor, the technical achievement encryption transmission method further realizes the following operations:
extracting a corresponding verification password from a local password library according to the user ID, verifying the access password according to the verification password, and when the verification password is the same as the access password, passing the verification and extracting the corresponding scientific and technological achievement from a scientific and technological achievement library through an access request; and when the verification password is different from the access password, the verification fails, and the scientific and technological achievement access request is rejected.
Further, when executed by a processor, the technical achievement encryption transmission method further realizes the following operations:
the method comprises the steps of obtaining historical access requests and corresponding scientific and technological achievements, establishing a relation table according to the historical access requests and the corresponding scientific and technological achievements, searching the corresponding scientific and technological achievements from the relation table through the access requests, and extracting the corresponding scientific and technological achievements from a scientific and technological achievement library.
Further, when executed by a processor, the technical achievement encryption transmission method further realizes the following operations:
according to the user ID, the scientific and technological achievement is encrypted through the key of the symmetric encryption algorithm, the encrypted scientific and technological achievement is obtained, the encrypted scientific and technological achievement is marked according to the user ID, the scientific and technological achievement to be fed back is obtained, and the scientific and technological achievement to be fed back is fed back to the corresponding user.
Further, when executed by a processor, the technical achievement encryption transmission method further realizes the following operations:
and randomly generating a unique verification code and a corresponding check code, marking the unique verification code and the scientific and technological achievements to be fed back, and distributing the corresponding check code to the corresponding user according to the user ID.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. A method for encrypted transmission of scientific and technological achievements is characterized by comprising the following steps: comprises the following steps;
s1, acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID and the access request from the scientific and technological achievement access request;
s2, extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result;
and S3, encrypting the scientific and technological achievement through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievement to the corresponding user.
2. A method as claimed in claim 1, wherein the method comprises: in step S1, before acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID, and an access request from the scientific and technological achievement access request, the method further includes the following steps of acquiring a total number of times of the scientific and technological achievement access request and a user IP in a stepwise manner, acquiring a number of times of the historical scientific and technological achievement access request of the user IP according to the user IP, acquiring a number threshold of times of the access request according to the number of times of the historical scientific and technological achievement access request, comparing the number threshold of the request with the number of times of the request, and extracting the user ID, the access password corresponding to the user ID, and the access request from the scientific and.
3. A method as claimed in claim 2, wherein said method comprises: comparing the request frequency threshold with the request frequency, and extracting a user ID, an access password corresponding to the user ID and an access request from a scientific and technological achievement access request according to a comparison result; and when the request times are smaller than the request time threshold, extracting the user ID, the access password corresponding to the user ID and the access request from the scientific and technological achievement access request.
4. A method as claimed in claim 3, wherein the method comprises: in step S2, extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting the corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result; and when the verification password is different from the access password, the verification fails, and the scientific and technological achievement access request is rejected.
5. The method of claim 4, wherein the method comprises: the method comprises the steps of extracting corresponding scientific and technological achievements from a scientific and technological achievement library through an access request, obtaining historical access requests and the corresponding scientific and technological achievements, establishing a relation table according to the historical access requests and the corresponding scientific and technological achievements, searching the corresponding scientific and technological achievements from the relation table through the access request, and extracting the corresponding scientific and technological achievements from the scientific and technological achievement library.
6. A method as claimed in claim 5, wherein the method comprises: and step S3, encrypting the scientific and technological achievement through a symmetric encryption algorithm according to the user ID, and feeding back the encrypted scientific and technological achievement to the corresponding user, and the method further comprises the following steps of encrypting the scientific and technological achievement through a key of the symmetric encryption algorithm according to the user ID, acquiring the encrypted scientific and technological achievement, marking the encrypted scientific and technological achievement according to the user ID, acquiring the scientific and technological achievement to be fed back, and feeding back the scientific and technological achievement to be fed back to the corresponding user.
7. The method of claim 6, wherein the method comprises: the method comprises the following steps of obtaining encrypted scientific and technological achievements, marking the encrypted scientific and technological achievements according to user IDs, obtaining scientific and technological achievements to be fed back, randomly generating unique verification codes and corresponding check codes, marking the unique verification codes and the scientific and technological achievements to be fed back, and distributing the corresponding check codes to corresponding users according to the user IDs.
8. The technical result encryption transmission device is characterized by comprising:
the information extraction module is used for acquiring a scientific and technological achievement access request, and extracting a user ID, an access password corresponding to the user ID and the access request from the scientific and technological achievement access request;
the scientific and technological achievement extraction module is used for extracting a corresponding verification password from the local password library according to the user ID, verifying the access password according to the verification password, and extracting a corresponding scientific and technological achievement from the scientific and technological achievement library through the access request according to the verification result;
and the encryption feedback module is used for encrypting the scientific and technological achievements through a symmetric encryption algorithm according to the user ID and feeding back the encrypted scientific and technological achievements to the corresponding users.
9. An apparatus, characterized in that the apparatus comprises: a memory, a processor, and a scientific result encrypted transmission method program stored on the memory and executable on the processor, the scientific result encrypted transmission method program being configured to implement the steps of the scientific result encrypted transmission method according to any one of claims 1 to 7.
10. A medium, characterized in that the medium is a computer medium, on which a scientific result encrypted transmission method program is stored, which when executed by a processor implements the steps of the scientific result encrypted transmission method according to any one of claims 1 to 7.
CN201911349219.1A 2019-12-24 2019-12-24 Scientific and technological achievement encryption transmission method and device Pending CN111191259A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911349219.1A CN111191259A (en) 2019-12-24 2019-12-24 Scientific and technological achievement encryption transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911349219.1A CN111191259A (en) 2019-12-24 2019-12-24 Scientific and technological achievement encryption transmission method and device

Publications (1)

Publication Number Publication Date
CN111191259A true CN111191259A (en) 2020-05-22

Family

ID=70707577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911349219.1A Pending CN111191259A (en) 2019-12-24 2019-12-24 Scientific and technological achievement encryption transmission method and device

Country Status (1)

Country Link
CN (1) CN111191259A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930723A (en) * 2020-09-25 2020-11-13 国网冀北电力有限公司经济技术研究院 Scientific and technological achievement data fusion method based on big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645797A (en) * 2005-01-28 2005-07-27 南望信息产业集团有限公司 Method for optimizing safety data transmission in digital copyright managing system
US20080022356A1 (en) * 2006-06-07 2008-01-24 Fujitsu Limited Communication processing method and system relating to authentication information
CN103338185A (en) * 2013-05-31 2013-10-02 飞天诚信科技股份有限公司 File sharing method and file sharing system
CN107613005A (en) * 2017-09-20 2018-01-19 携程旅游信息技术(上海)有限公司 Reverse proxy method and device, electronic equipment, storage medium
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109495522A (en) * 2019-01-22 2019-03-19 深圳互联先锋科技有限公司 Data encryption and transmission method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645797A (en) * 2005-01-28 2005-07-27 南望信息产业集团有限公司 Method for optimizing safety data transmission in digital copyright managing system
US20080022356A1 (en) * 2006-06-07 2008-01-24 Fujitsu Limited Communication processing method and system relating to authentication information
CN103338185A (en) * 2013-05-31 2013-10-02 飞天诚信科技股份有限公司 File sharing method and file sharing system
CN107613005A (en) * 2017-09-20 2018-01-19 携程旅游信息技术(上海)有限公司 Reverse proxy method and device, electronic equipment, storage medium
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109495522A (en) * 2019-01-22 2019-03-19 深圳互联先锋科技有限公司 Data encryption and transmission method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930723A (en) * 2020-09-25 2020-11-13 国网冀北电力有限公司经济技术研究院 Scientific and technological achievement data fusion method based on big data
CN111930723B (en) * 2020-09-25 2024-02-02 国网冀北电力有限公司经济技术研究院 Scientific and technological achievement data fusion method based on big data

Similar Documents

Publication Publication Date Title
CN106330850B (en) Security verification method based on biological characteristics, client and server
CN101051904B (en) Method for landing by account number cipher for protecting network application sequence
CN109474423A (en) Data encryption/decryption method, server and storage medium
US8745394B1 (en) Methods and systems for secure electronic communication
US20160014110A1 (en) Security systems and methods
US10055591B1 (en) Secure protocol attack mitigation
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN110311787B (en) Authorization management method, system, device and computer readable storage medium
CN102946392A (en) URL (Uniform Resource Locator) data encrypted transmission method and system
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN105391734A (en) Secure login system, secure login method, login server and authentication server
CN101420302A (en) Safe identification method and device
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN111327629B (en) Identity verification method, client and server
US10635826B2 (en) System and method for securing data in a storage medium
CN101552676A (en) Host module legitimacy verification method, system and device using a card module
CN110647733B (en) Identity authentication method and system based on fingerprint identification
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
Cetin Design, testing and implementation of a new authentication method using multiple devices
CN112073185B (en) Cloud game safety transmission method and device
CN114079921B (en) Session key generation method, anchor point function network element and system
CN106788983B (en) Communication data encryption method and device based on client/server mode
CN112487380A (en) Data interaction method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination