CN111355717A - Encryption method and system for scientific and technological achievement transfer protocol - Google Patents

Encryption method and system for scientific and technological achievement transfer protocol Download PDF

Info

Publication number
CN111355717A
CN111355717A CN202010113449.4A CN202010113449A CN111355717A CN 111355717 A CN111355717 A CN 111355717A CN 202010113449 A CN202010113449 A CN 202010113449A CN 111355717 A CN111355717 A CN 111355717A
Authority
CN
China
Prior art keywords
encrypted
scientific
data area
transfer protocol
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010113449.4A
Other languages
Chinese (zh)
Inventor
张惠元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Kezhilv Information Technology Co ltd
Original Assignee
Suzhou Kezhilv Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Kezhilv Information Technology Co ltd filed Critical Suzhou Kezhilv Information Technology Co ltd
Priority to CN202010113449.4A priority Critical patent/CN111355717A/en
Publication of CN111355717A publication Critical patent/CN111355717A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a scientific and technological achievement transfer protocol encryption method and system, wherein a scientific and technological achievement transfer protocol of a preset protocol generation path is obtained, then regional range information of a data region to be encrypted in the preset protocol generation path is obtained, feature recognition is carried out on the regional range information, a preset encryption instruction corresponding to the regional range information is determined in a preset encryption instruction set, then encryption marking is carried out on the data region to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain encryption mark information of the data region to be encrypted, then the encryption mark information is stored in a preset encryption instruction corresponding to the regional range information of the preset encryption instruction set, and the data region to be encrypted is encrypted according to the preset encryption instruction. Therefore, the regional data information of the data region to be encrypted can be comprehensively encrypted, and the safety of a scientific and technological achievement transfer protocol is further ensured.

Description

Encryption method and system for scientific and technological achievement transfer protocol
Technical Field
The invention relates to the technical field of data encryption, in particular to an encryption method and system for a scientific and technological achievement transfer protocol.
Background
At present, a scientific and technological achievement transfer protocol relates to important files of an enterprise and needs to be subjected to strict encryption operation, however, in a traditional scheme, region data information of a data region to be encrypted is difficult to ensure comprehensive encryption in an encryption process, and then the security of the scientific and technological achievement transfer protocol is affected.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide an encryption method and system for a scientific and technological achievement transfer protocol, which can comprehensively encrypt regional data information of a to-be-encrypted data region, so as to ensure security of the scientific and technological achievement transfer protocol.
According to an aspect of the embodiment of the present invention, there is provided an encryption method for a scientific and technological achievement transfer protocol, applied to a server, the method including:
acquiring a scientific and technological achievement transfer protocol of a preset protocol generation path, wherein the scientific and technological achievement transfer protocol comprises a data area to be encrypted;
acquiring area range information of the data area to be encrypted in the preset protocol generation path, performing feature identification on the area range information, and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set, wherein a preset encryption instruction of the data area to be encrypted is stored in the preset encryption instruction set;
according to the scientific and technological achievement transfer protocol, carrying out encryption marking on the data area to be encrypted in the scientific and technological achievement transfer protocol to obtain encryption marking information of the data area to be encrypted;
and storing the encryption mark information in a preset encryption instruction corresponding to the area range information of the preset encryption instruction set, and encrypting the data area to be encrypted according to the preset encryption instruction.
In a possible example, the step of obtaining the area range information of the data area to be encrypted in the preset protocol generation path includes:
and according to the scientific and technological achievement transfer protocol, determining an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol, and tracking the encrypted object to obtain the area range information of the data area to be encrypted.
In a possible example, when the scientific and technological achievement transfer protocol includes a plurality of data areas to be encrypted, the step of determining an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol, tracking the encrypted object, and obtaining area range information of the data area to be encrypted includes:
according to the scientific and technological achievement transfer protocol, determining the encrypted objects of the data area to be encrypted in the scientific and technological achievement transfer protocol, and determining the positioning information of the encrypted objects in the scientific and technological achievement transfer protocol;
tracking each encrypted object respectively to obtain area range information of a data area to be encrypted corresponding to the encrypted object, and taking the positioning information of the encrypted object as the positioning information of the area range information;
the performing feature recognition on the area range information, and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set, includes:
respectively carrying out feature recognition on each region range information, and determining a preset encryption instruction corresponding to each region range information in a preset encryption instruction set;
the step of encrypting and marking the to-be-encrypted data area in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain the encryption marking information of the to-be-encrypted data area includes:
according to the scientific and technological achievement transfer protocol, encryption marking is respectively carried out on each to-be-encrypted data area in the scientific and technological achievement transfer protocol to obtain encryption marking information of each to-be-encrypted data area, and positioning information of each to-be-encrypted data area in the scientific and technological achievement transfer protocol is determined;
the step of storing the encryption flag information in a preset encryption command corresponding to the area range information in the preset encryption command set includes:
aiming at each data area to be encrypted, matching the positioning information of the data area to be encrypted with the positioning information of the range information of each area one by one;
and when the positioning information of the data area to be encrypted is matched with the positioning information of the first area range information, storing the encryption mark information of the data area to be encrypted in a preset encryption instruction corresponding to the first area range information in the preset encryption instruction set.
In a possible example, the step of matching, for each area of data to be encrypted, the location information of the area of data to be encrypted with the location information of each area range information one by one includes:
for each to-be-encrypted data area, respectively calculating the association degree of the positioning information of the to-be-encrypted data area and the positioning information of the range information of each area;
and when the association degree of the positioning information of the data area to be encrypted and the positioning information of the first area range information is greater than a preset threshold value, matching the positioning information of the data area to be encrypted with the positioning information of the first area range information.
In a possible example, the step of performing feature recognition on the area range information and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set includes:
according to the area range information, establishing an encryption mark matrix corresponding to the area range information;
comparing the encryption mark matrix with a preset encryption mark matrix of the to-be-encrypted data area stored in a preset encryption instruction set to determine a target preset encryption mark matrix matched with the encryption mark matrix, wherein the preset encryption instruction set stores the preset encryption mark matrix of the to-be-encrypted data area and a preset encryption instruction;
and taking a preset encryption instruction corresponding to the target preset encryption mark matrix as a preset encryption instruction corresponding to the area range information.
According to another aspect of the embodiments of the present invention, there is provided an encryption system for a scientific and technological achievement transfer protocol, applied to a server, the system including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a scientific and technological achievement transfer protocol of a preset protocol generation path, and the scientific and technological achievement transfer protocol comprises a data area to be encrypted;
a second obtaining module, configured to obtain area range information of the data area to be encrypted in the preset protocol generation path, perform feature identification on the area range information, determine, in a preset encryption instruction set, a preset encryption instruction corresponding to the area range information, where a preset encryption instruction of the data area to be encrypted is stored in the preset encryption instruction set;
the encryption marking module is used for carrying out encryption marking on the data area to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain encryption marking information of the data area to be encrypted;
and the encryption module is used for storing the encryption mark information in a preset encryption instruction corresponding to the area range information of the preset encryption instruction set, and encrypting the data area to be encrypted according to the preset encryption instruction.
According to another aspect of the embodiments of the present invention, a readable storage medium is provided, where a computer program is stored on the readable storage medium, and the computer program is executed by a processor, and the computer program may perform the steps of the encryption method of the scientific and technological achievement transfer protocol.
Compared with the prior art, the encryption method and system for the scientific and technological achievement transfer protocol provided by the embodiment of the invention have the advantages that the scientific and technological achievement transfer protocol of the preset protocol generation path is obtained, the region range information of the data region to be encrypted in the preset protocol generation path is obtained, the feature identification is carried out on the region range information, the preset encryption instruction corresponding to the region range information is determined in the preset encryption instruction set, the encryption mark is carried out on the data region to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain the encryption mark information of the data region to be encrypted, the encryption mark information is stored in the preset encryption instruction corresponding to the region range information of the preset encryption instruction set, and the data region to be encrypted is encrypted according to the preset encryption instruction. Therefore, the regional data information of the data region to be encrypted can be comprehensively encrypted, and the safety of a scientific and technological achievement transfer protocol is further ensured.
In order to make the aforementioned objects, features and advantages of the embodiments of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 illustrates a component diagram of a server provided by an embodiment of the invention;
fig. 2 is a schematic flow chart illustrating an encryption method of a scientific and technological achievement transfer protocol according to an embodiment of the present invention;
fig. 3 shows a functional block diagram of an encryption system of a scientific and technological achievement transfer protocol provided by an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by the scholars in the technical field, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the technology project objects so used may be interchanged under appropriate circumstances such that embodiments of the invention described herein may, for example, be implemented in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 shows an exemplary component schematic of a server 100. The server 100 may include one or more processors 104, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The server 100 may also include any storage media 106 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, storage medium 106 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage medium may use any technology to store information. Further, any storage medium may provide volatile or non-volatile retention of information. Further, any storage medium may represent a fixed or removable component of server 100. In one case, when the processor 104 executes the associated instructions stored in any storage medium or combination of storage media, the server 100 may perform any of the operations of the associated instructions. The server 100 further comprises one or more drive units 108 for interacting with any storage medium, such as a hard disk drive unit, an optical disk drive unit, etc.
The server 100 also includes input/output 110(I/O) for receiving various inputs (via input unit 112) and for providing various outputs (via output unit 114)). One particular output mechanism may include a presentation device 116 and an associated Graphical User Interface (GUI) 118. The server 100 may also include one or more network interfaces 120 for exchanging data with other devices via one or more communication units 122. One or more communication buses 124 couple the above-described components together.
The communication unit 122 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. The communication unit 122 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers 100, and so forth, governed by any protocol or combination of protocols.
Fig. 2 is a flowchart illustrating an encryption method for a scientific and technological achievement transfer protocol according to an embodiment of the present invention, where the encryption method for the scientific and technological achievement transfer protocol is executed by the server 100 shown in fig. 1, and the detailed steps of the encryption method for the scientific and technological achievement transfer protocol are described below.
Step S110, acquiring a scientific and technological achievement transfer protocol of a preset protocol generation path, wherein the scientific and technological achievement transfer protocol comprises a data area to be encrypted;
step S120, obtaining area range information of the data area to be encrypted in the preset protocol generation path, performing feature identification on the area range information, and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set, wherein a preset encryption instruction of the data area to be encrypted is stored in the preset encryption instruction set;
step S130, according to the scientific and technological achievement transfer protocol, carrying out encryption marking on the data area to be encrypted in the scientific and technological achievement transfer protocol to obtain encryption marking information of the data area to be encrypted;
step S140, storing the encryption flag information in a preset encryption instruction corresponding to the area range information of the preset encryption instruction set, and encrypting the data area to be encrypted according to the preset encryption instruction.
Based on the above steps, in this embodiment, a scientific and technological achievement assignment protocol of a preset protocol generation path is obtained, then, area range information of a data area to be encrypted in the preset protocol generation path is obtained, and feature recognition is performed on the area range information, in a preset encryption instruction set, a preset encryption instruction corresponding to the area range information is determined, then, according to the scientific and technological achievement assignment protocol, encryption marking is performed on the data area to be encrypted in the scientific and technological achievement assignment protocol, encryption marking information of the data area to be encrypted is obtained, then, the encryption marking information is stored in the preset encryption instruction corresponding to the area range information in the preset encryption instruction set, and the data area to be encrypted is encrypted according to the preset encryption instruction. Therefore, the regional data information of the data region to be encrypted can be comprehensively encrypted, and the safety of a scientific and technological achievement transfer protocol is further ensured.
In a possible example, for step S120, in this embodiment, according to the scientific and technological achievement transfer protocol, an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol is determined, and the encrypted object is tracked to obtain area range information of the data area to be encrypted.
In a possible example, when the scientific and technological achievement transfer protocol includes a plurality of data areas to be encrypted, in the process of determining an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol, tracking the encrypted object to obtain area range information of the data area to be encrypted, determining an encrypted object of each data area to be encrypted in the scientific and technological achievement transfer protocol, determining positioning information of each encrypted object in the scientific and technological achievement transfer protocol, tracking each encrypted object to obtain area range information of the data area to be encrypted corresponding to the encrypted object, and using the positioning information of the encrypted object as the positioning information of the area range information.
In a possible example, for step S120, the present embodiment may perform feature recognition on each of the area range information, and determine, in a preset encryption instruction set, a preset encryption instruction corresponding to each of the area range information.
In a possible example, for step S130, according to the scientific and technological achievement transfer protocol, in this embodiment, encryption marks are respectively performed on each to-be-encrypted data area in the scientific and technological achievement transfer protocol to obtain encryption mark information of each to-be-encrypted data area, and positioning information of each to-be-encrypted data area in the scientific and technological achievement transfer protocol is determined;
in a possible example, for step S140, for each to-be-encrypted data area, the embodiment may match, for each to-be-encrypted data area, the positioning information of the to-be-encrypted data area with the positioning information of each area range information one by one, and when the positioning information of the to-be-encrypted data area matches the positioning information of the first area range information, store the encryption flag information of the to-be-encrypted data area in the preset encryption instruction corresponding to the first area range information in the preset encryption instruction set.
For example, for each to-be-encrypted data area, the association degree between the positioning information of the to-be-encrypted data area and the positioning information of each area range information may be calculated, and when the association degree between the positioning information of the to-be-encrypted data area and the positioning information of the first area range information is greater than a preset threshold, the positioning information of the to-be-encrypted data area matches with the positioning information of the first area range information.
In a possible example, for step S130, according to the area range information, an encryption mark matrix corresponding to the area range information may be established, and the encryption mark matrix is compared with a preset encryption mark matrix of the to-be-encrypted data area stored in a preset encryption instruction set, so as to determine a target preset encryption mark matrix matched with the encryption mark matrix, where the preset encryption instruction set stores a preset encryption mark matrix and a preset encryption instruction of the to-be-encrypted data area. And then, taking a preset encryption instruction corresponding to the target preset encryption mark matrix as a preset encryption instruction corresponding to the area range information.
Fig. 3 is a functional block diagram of an encryption system 200 of a scientific and technological achievement transfer protocol according to an embodiment of the present invention, where functions implemented by the encryption system 200 of the scientific and technological achievement transfer protocol may correspond to steps executed by the foregoing method. The encryption system 200 of the scientific and technological achievement transfer protocol may be understood as the server 100, or a processor of the server 100, or may be understood as a component that is independent of the server 100 or the processor and implements the functions of the present invention under the control of the server 100, as shown in fig. 3, and the functions of the functional modules of the encryption system 200 of the scientific and technological achievement transfer protocol are described in detail below.
The first obtaining module 210 is configured to obtain a scientific and technological achievement transfer protocol of a preset protocol generation path, where the scientific and technological achievement transfer protocol includes a data area to be encrypted;
a second obtaining module 220, configured to obtain area range information of the data area to be encrypted in the preset protocol generation path, perform feature identification on the area range information, determine, in a preset encryption instruction set, a preset encryption instruction corresponding to the area range information, where a preset encryption instruction of the data area to be encrypted is stored in the preset encryption instruction set;
the encryption marking module 230 is configured to perform encryption marking on the data area to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain encryption marking information of the data area to be encrypted;
the encryption module 240 is configured to store the encryption flag information in a preset encryption instruction corresponding to the area range information in the preset encryption instruction set, and encrypt the data area to be encrypted according to the preset encryption instruction.
In a possible example, the manner of obtaining the area range information of the data area to be encrypted in the preset protocol generation path includes:
and according to the scientific and technological achievement transfer protocol, determining an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol, and tracking the encrypted object to obtain the area range information of the data area to be encrypted.
In a possible example, when the scientific and technological achievement transfer protocol includes a plurality of data areas to be encrypted, the determining, according to the scientific and technological achievement transfer protocol, an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol, and tracking the encrypted object to obtain the area range information of the data area to be encrypted includes:
according to the scientific and technological achievement transfer protocol, determining the encrypted objects of the data area to be encrypted in the scientific and technological achievement transfer protocol, and determining the positioning information of the encrypted objects in the scientific and technological achievement transfer protocol;
tracking each encrypted object respectively to obtain area range information of a data area to be encrypted corresponding to the encrypted object, and taking the positioning information of the encrypted object as the positioning information of the area range information;
in a possible example, the performing feature identification on the area range information and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set includes:
respectively carrying out feature recognition on each region range information, and determining a preset encryption instruction corresponding to each region range information in a preset encryption instruction set;
in a possible example, the manner of performing encryption marking on the to-be-encrypted data area in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain encryption marking information of the to-be-encrypted data area includes:
according to the scientific and technological achievement transfer protocol, encryption marking is respectively carried out on each to-be-encrypted data area in the scientific and technological achievement transfer protocol to obtain encryption marking information of each to-be-encrypted data area, and positioning information of each to-be-encrypted data area in the scientific and technological achievement transfer protocol is determined;
in a possible example, the manner of storing the encryption flag information in a preset encryption instruction corresponding to the area range information in the preset encryption instruction set includes:
aiming at each data area to be encrypted, matching the positioning information of the data area to be encrypted with the positioning information of the range information of each area one by one;
and when the positioning information of the data area to be encrypted is matched with the positioning information of the first area range information, storing the encryption mark information of the data area to be encrypted in a preset encryption instruction corresponding to the first area range information in the preset encryption instruction set.
In a possible example, the way of matching, for each area of data to be encrypted, the location information of the area of data to be encrypted with the location information of each area range information one by one includes:
for each to-be-encrypted data area, respectively calculating the association degree of the positioning information of the to-be-encrypted data area and the positioning information of the range information of each area;
and when the association degree of the positioning information of the data area to be encrypted and the positioning information of the first area range information is greater than a preset threshold value, matching the positioning information of the data area to be encrypted with the positioning information of the first area range information.
In a possible example, the performing feature identification on the area range information and determining, in a preset encryption instruction set, a mode of a preset encryption instruction corresponding to the area range information includes:
according to the area range information, establishing an encryption mark matrix corresponding to the area range information;
comparing the encryption mark matrix with a preset encryption mark matrix of the to-be-encrypted data area stored in a preset encryption instruction set to determine a target preset encryption mark matrix matched with the encryption mark matrix, wherein the preset encryption instruction set stores the preset encryption mark matrix of the to-be-encrypted data area and a preset encryption instruction;
and taking a preset encryption instruction corresponding to the target preset encryption mark matrix as a preset encryption instruction corresponding to the area range information.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
Alternatively, all or part of the implementation may be in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data presentation object to another website, computer, server, or data presentation object by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device that includes one or more available media integrated servers, data presentation objects, and the like. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any drawing credit or debit acknowledgement in the claims should not be construed as limiting the claim concerned.

Claims (10)

1. An encryption method of a scientific and technological achievement transfer protocol is applied to a server, and the method comprises the following steps:
acquiring a scientific and technological achievement transfer protocol of a preset protocol generation path, wherein the scientific and technological achievement transfer protocol comprises a data area to be encrypted;
acquiring area range information of the data area to be encrypted in the preset protocol generation path, performing feature identification on the area range information, and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set, wherein a preset encryption instruction of the data area to be encrypted is stored in the preset encryption instruction set;
according to the scientific and technological achievement transfer protocol, carrying out encryption marking on the data area to be encrypted in the scientific and technological achievement transfer protocol to obtain encryption marking information of the data area to be encrypted;
and storing the encryption mark information in a preset encryption instruction corresponding to the area range information of the preset encryption instruction set, and encrypting the data area to be encrypted according to the preset encryption instruction.
2. The encryption method of scientific and technological achievement transfer protocol according to claim 1, wherein the step of obtaining the area range information of the data area to be encrypted in the preset protocol generation path includes:
and according to the scientific and technological achievement transfer protocol, determining an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol, and tracking the encrypted object to obtain the area range information of the data area to be encrypted.
3. The encryption method of the scientific and technological achievement transfer protocol according to claim 2, wherein when the scientific and technological achievement transfer protocol includes a plurality of data areas to be encrypted, the step of determining the encrypted object of the data areas to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol, tracking the encrypted object, and obtaining the area range information of the data areas to be encrypted includes:
according to the scientific and technological achievement transfer protocol, determining the encrypted objects of the data area to be encrypted in the scientific and technological achievement transfer protocol, and determining the positioning information of the encrypted objects in the scientific and technological achievement transfer protocol;
tracking each encrypted object respectively to obtain area range information of a data area to be encrypted corresponding to the encrypted object, and taking the positioning information of the encrypted object as the positioning information of the area range information;
the performing feature recognition on the area range information, and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set, includes:
respectively carrying out feature recognition on each region range information, and determining a preset encryption instruction corresponding to each region range information in a preset encryption instruction set;
the step of encrypting and marking the to-be-encrypted data area in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain the encryption marking information of the to-be-encrypted data area includes:
according to the scientific and technological achievement transfer protocol, encryption marking is respectively carried out on each to-be-encrypted data area in the scientific and technological achievement transfer protocol to obtain encryption marking information of each to-be-encrypted data area, and positioning information of each to-be-encrypted data area in the scientific and technological achievement transfer protocol is determined;
the step of storing the encryption flag information in a preset encryption command corresponding to the area range information in the preset encryption command set includes:
aiming at each data area to be encrypted, matching the positioning information of the data area to be encrypted with the positioning information of the range information of each area one by one;
and when the positioning information of the data area to be encrypted is matched with the positioning information of the first area range information, storing the encryption mark information of the data area to be encrypted in a preset encryption instruction corresponding to the first area range information in the preset encryption instruction set.
4. The encryption method of scientific and technological achievement transfer protocol according to claim 3, wherein the step of matching the positioning information of the data area to be encrypted with the positioning information of each area range information one by one for each data area to be encrypted comprises:
for each to-be-encrypted data area, respectively calculating the association degree of the positioning information of the to-be-encrypted data area and the positioning information of the range information of each area;
and when the association degree of the positioning information of the data area to be encrypted and the positioning information of the first area range information is greater than a preset threshold value, matching the positioning information of the data area to be encrypted with the positioning information of the first area range information.
5. The encryption method of scientific and technological achievement transfer protocol according to claim 1, wherein the step of performing feature recognition on the area scope information and determining a preset encryption instruction corresponding to the area scope information in a preset encryption instruction set includes:
according to the area range information, establishing an encryption mark matrix corresponding to the area range information;
comparing the encryption mark matrix with a preset encryption mark matrix of the to-be-encrypted data area stored in a preset encryption instruction set to determine a target preset encryption mark matrix matched with the encryption mark matrix, wherein the preset encryption instruction set stores the preset encryption mark matrix of the to-be-encrypted data area and a preset encryption instruction;
and taking a preset encryption instruction corresponding to the target preset encryption mark matrix as a preset encryption instruction corresponding to the area range information.
6. An encryption system of a scientific and technological achievement transfer protocol, which is applied to a server, the system comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a scientific and technological achievement transfer protocol of a preset protocol generation path, and the scientific and technological achievement transfer protocol comprises a data area to be encrypted;
a second obtaining module, configured to obtain area range information of the data area to be encrypted in the preset protocol generation path, perform feature identification on the area range information, determine, in a preset encryption instruction set, a preset encryption instruction corresponding to the area range information, where a preset encryption instruction of the data area to be encrypted is stored in the preset encryption instruction set;
the encryption marking module is used for carrying out encryption marking on the data area to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol to obtain encryption marking information of the data area to be encrypted;
and the encryption module is used for storing the encryption mark information in a preset encryption instruction corresponding to the area range information of the preset encryption instruction set, and encrypting the data area to be encrypted according to the preset encryption instruction.
7. The encryption system of scientific and technological achievement transfer protocol according to claim 6, wherein the manner of obtaining the area range information of the data area to be encrypted in the preset protocol generation path includes:
and according to the scientific and technological achievement transfer protocol, determining an encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol, and tracking the encrypted object to obtain the area range information of the data area to be encrypted.
8. The encryption system of a scientific and technological achievement transfer protocol according to claim 7, wherein when the scientific and technological achievement transfer protocol includes a plurality of data areas to be encrypted, the manner of determining the encrypted object of the data area to be encrypted in the scientific and technological achievement transfer protocol according to the scientific and technological achievement transfer protocol, tracking the encrypted object, and obtaining the area range information of the data area to be encrypted includes:
according to the scientific and technological achievement transfer protocol, determining the encrypted objects of the data area to be encrypted in the scientific and technological achievement transfer protocol, and determining the positioning information of the encrypted objects in the scientific and technological achievement transfer protocol;
tracking each encrypted object respectively to obtain area range information of a data area to be encrypted corresponding to the encrypted object, and taking the positioning information of the encrypted object as the positioning information of the area range information;
the performing feature recognition on the area range information, and determining a preset encryption instruction corresponding to the area range information in a preset encryption instruction set, includes:
respectively carrying out feature recognition on each region range information, and determining a preset encryption instruction corresponding to each region range information in a preset encryption instruction set;
the method for encrypting and marking the to-be-encrypted data area in the scientific and technological achievement transfer protocol to obtain the encryption marking information of the to-be-encrypted data area according to the scientific and technological achievement transfer protocol comprises the following steps:
according to the scientific and technological achievement transfer protocol, encryption marking is respectively carried out on each to-be-encrypted data area in the scientific and technological achievement transfer protocol to obtain encryption marking information of each to-be-encrypted data area, and positioning information of each to-be-encrypted data area in the scientific and technological achievement transfer protocol is determined;
the manner of storing the encryption flag information in the preset encryption instruction corresponding to the area range information in the preset encryption instruction set includes:
aiming at each data area to be encrypted, matching the positioning information of the data area to be encrypted with the positioning information of the range information of each area one by one;
and when the positioning information of the data area to be encrypted is matched with the positioning information of the first area range information, storing the encryption mark information of the data area to be encrypted in a preset encryption instruction corresponding to the first area range information in the preset encryption instruction set.
9. The encryption system of scientific and technological achievement transfer protocol according to claim 8, wherein the mode of matching the positioning information of the data area to be encrypted with the positioning information of each area range information one by one for each data area to be encrypted comprises:
for each to-be-encrypted data area, respectively calculating the association degree of the positioning information of the to-be-encrypted data area and the positioning information of the range information of each area;
and when the association degree of the positioning information of the data area to be encrypted and the positioning information of the first area range information is greater than a preset threshold value, matching the positioning information of the data area to be encrypted with the positioning information of the first area range information.
10. The encryption system of scientific and technological achievement transfer protocol according to claim 6, wherein the performing feature recognition on the area scope information and determining a mode of a preset encryption instruction corresponding to the area scope information in a preset encryption instruction set includes:
according to the area range information, establishing an encryption mark matrix corresponding to the area range information;
comparing the encryption mark matrix with a preset encryption mark matrix of the to-be-encrypted data area stored in a preset encryption instruction set to determine a target preset encryption mark matrix matched with the encryption mark matrix, wherein the preset encryption instruction set stores the preset encryption mark matrix of the to-be-encrypted data area and a preset encryption instruction;
and taking a preset encryption instruction corresponding to the target preset encryption mark matrix as a preset encryption instruction corresponding to the area range information.
CN202010113449.4A 2020-02-24 2020-02-24 Encryption method and system for scientific and technological achievement transfer protocol Withdrawn CN111355717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010113449.4A CN111355717A (en) 2020-02-24 2020-02-24 Encryption method and system for scientific and technological achievement transfer protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010113449.4A CN111355717A (en) 2020-02-24 2020-02-24 Encryption method and system for scientific and technological achievement transfer protocol

Publications (1)

Publication Number Publication Date
CN111355717A true CN111355717A (en) 2020-06-30

Family

ID=71197152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010113449.4A Withdrawn CN111355717A (en) 2020-02-24 2020-02-24 Encryption method and system for scientific and technological achievement transfer protocol

Country Status (1)

Country Link
CN (1) CN111355717A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783122A (en) * 2020-07-03 2020-10-16 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783122A (en) * 2020-07-03 2020-10-16 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system
CN111783122B (en) * 2020-07-03 2022-07-15 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system

Similar Documents

Publication Publication Date Title
CN111355717A (en) Encryption method and system for scientific and technological achievement transfer protocol
CN111274437B (en) Video material resource management method and system based on Internet
CN113810356A (en) Cloud server encryption management method and system
CN113779582A (en) Threat perception method and system based on big data
CN113282312A (en) Software package updating method and system
CN111951143A (en) Scientific and technological information policy issuing method and system
CN111340883A (en) Product information management method and system
CN111339160A (en) Scientific and technological achievement data mining method and system
CN112256329A (en) Material manufacturing process information management method and system
CN113742399B (en) Cloud edge collaboration-based data tracing method and system
CN114006710A (en) Intelligent medical data access method and system
CN112118247B (en) Internet of vehicles data encryption method and system
CN111767437B (en) Enterprise science and technology project management method and system
CN113901486A (en) Intelligent medical information encryption method and system
CN114462066A (en) Data encryption method and system for identity recognition
CN113810355A (en) Server resource management method and system
KR102027815B1 (en) Pin-based file decryption method and apparatus for performing the same
CN111967029A (en) Intellectual property data management method and system
CN111340374A (en) Production cooperative management method and system
CN113904782A (en) Online cloud platform management method and system
CN113849216A (en) Method and system for verifying software development kit
CN113886844A (en) Customer information management method and system
CN113761029A (en) Interactive encryption processing method and system based on cloud edge cooperation
CN111767561A (en) Enterprise financial road performance information processing method and system
CN112039998A (en) Cloud service virtual client information processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200630