CN111586062A - Method and system for label management - Google Patents

Method and system for label management Download PDF

Info

Publication number
CN111586062A
CN111586062A CN202010392768.3A CN202010392768A CN111586062A CN 111586062 A CN111586062 A CN 111586062A CN 202010392768 A CN202010392768 A CN 202010392768A CN 111586062 A CN111586062 A CN 111586062A
Authority
CN
China
Prior art keywords
data packet
engineer
instruction
authority management
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010392768.3A
Other languages
Chinese (zh)
Inventor
范亮
汤坚
王秋媚
秦若涵
曹梓峰
郑路铭
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhongke Zhi Tour Technology Co ltd
Original Assignee
Guangzhou Zhongke Zhi Tour Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhongke Zhi Tour Technology Co ltd filed Critical Guangzhou Zhongke Zhi Tour Technology Co ltd
Priority to CN202010392768.3A priority Critical patent/CN111586062A/en
Publication of CN111586062A publication Critical patent/CN111586062A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a label management method and a system, the method is applied to a data transfer system, the data transfer system comprises a label server and an algorithm server, and the method comprises the following steps: receiving a data downloading instruction through a labeling server, and acquiring a labeling data packet corresponding to the data downloading instruction; carrying out encryption operation on the labeled data packet by using a labeling server, generating an encrypted data packet and sending the encrypted data packet to an algorithm processor; responding to a decryption request instruction, judging the decryption request instruction according to a preset authority management library, and when the judgment result is that the decryption request instruction is an authorized instruction, acquiring a password associated with the decryption request instruction and sending the password to an algorithm processor; and carrying out decryption operation on the encrypted data packet of the algorithm processor through the password to obtain a labeled data packet. Therefore, the security of the transmission of the marking data can be improved.

Description

Method and system for label management
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for label management.
Background
In the current data transfer work, a data team generally transmits a data downloading command to a labeling server, the labeling server transmits a labeling data packet to a specified position of an algorithm server through a network, and an algorithm engineer uses labeling data to complete the training of an online algorithm. However, since the data information handed over in the network transmission process is not encrypted, the opportunity of stealing data is given to others in the transmission process, and the security of data hand-over cannot be ensured.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a label management method and system, which can encrypt information of handover data by using encryption technology, and implement information hiding, thereby playing a role in protecting information security, and greatly improving data security.
In order to solve the above technical problem, a first aspect of the present invention discloses an annotation management method applied to a data handover system including an annotation server and an algorithm server, the method including:
receiving a data downloading instruction through a labeling server, and acquiring a labeling data packet corresponding to the data downloading instruction; carrying out encryption operation on the labeled data packet by using a labeling server, generating an encrypted data packet and sending the encrypted data packet to an algorithm processor; responding to a decryption request instruction, judging the decryption request instruction according to a preset authority management library, and when the judgment result is that the decryption request instruction is an authorized instruction, acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor; and carrying out decryption operation on the encrypted data packet of the algorithm processor through the password to obtain the labeled data packet.
In some embodiments, the determining the decryption request instruction according to a preset authority management library, where the authority management library stores an association relationship between an engineer ID and a matched encrypted data packet, includes: acquiring an engineer ID and a target encryption data packet contained in the decryption request instruction; judging whether the engineer ID is stored in the authority management library; when the engineer ID is stored in the authority management library, acquiring an encrypted data packet associated with the engineer ID; and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
In some embodiments, after determining whether the engineer ID is stored in the rights management repository, the method further comprises: and when the engineer ID is not stored in the authority management library, generating a judgment result as an unauthorized instruction, and generating and outputting early warning information.
In some embodiments, further comprising: and after the marked data packet is obtained through the authorized instruction and the decryption request instruction, performing online algorithm training on the algorithm server.
In some embodiments, after performing an encryption operation on the annotation data packet by using the annotation server, generating an encrypted data packet and sending the encrypted data packet to the algorithm processor, the method further includes:
generating authority management information; and updating the preset authority management library through the authority management information.
In a second aspect of the present invention, there is provided an annotation management system, the system comprising: the acquisition module is used for receiving a data downloading instruction through the marking server and acquiring a marking data packet corresponding to the data downloading instruction; the encryption module is used for carrying out encryption operation on the labeling data packet, generating an encrypted data packet and sending the encrypted data packet to the algorithm processor; the authority management module is used for judging the decryption request instruction according to a preset authority management library after receiving the decryption request instruction, and acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor when the judgment result shows that the decryption request instruction is an authorized instruction; and the decryption module is used for decrypting the encrypted data packet of the algorithm processor through the password to obtain the labeled data packet.
In some embodiments, the rights management module comprises: the authority management base stores an engineer ID and an incidence relation ID acquisition unit of the matched encrypted data packet, and is used for acquiring the engineer ID contained in the decryption request instruction; a judging unit configured to judge whether the engineer ID is stored in the authority management library; when the engineer ID is stored in the authority management library, acquiring an encrypted data packet associated with the engineer ID; and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
In some embodiments, the rights management module further comprises: and the early warning unit is used for generating a judgment result as an unauthorized instruction when the engineer ID is not stored in the authority management library, and generating early warning information for outputting.
A third aspect of the present invention discloses an annotation management apparatus, the apparatus comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the label management method according to any one of the first aspect of the present invention.
A fourth aspect of the present invention discloses a computer storage medium storing computer instructions for executing the annotation management method according to any one of the first aspect of the present invention when the computer instructions are invoked.
Compared with the prior art, the invention has the beneficial effects that:
by implementing the invention, sufficient and effective safety protection can be made before the marked data packet enters the external transmission through a series of perfect encryption and decryption technologies, and a plurality of security holes are blocked. Even if data is stolen in the transmission process, a thief cannot open a data packet and cannot know the content and the value of the data due to the absence of a password, so that the data security is improved practically. Furthermore, the defect that the data is not encrypted in network transmission information is considered, effective safety protection is adopted for the data from the source, a plurality of safety holes are avoided, and the safety of the data is greatly improved.
Drawings
FIG. 1 is a schematic flow chart of a label management method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating another annotation management method according to an embodiment of the present invention;
FIG. 3 is a schematic flowchart of a label management method for practical application according to an embodiment of the present invention;
FIG. 4 is a diagram of a label management system according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a label management device according to an embodiment of the present invention.
Detailed Description
For better understanding and implementation, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules explicitly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses a label management method and a label management device, which can make sufficient and effective safety protection before a label data packet enters external transmission through a series of perfect encryption and decryption technologies so as to block a plurality of safety loopholes. Even if data is stolen in the transmission process, a thief cannot open a data packet and cannot know the content and the value of the data due to the absence of a password, so that the data security is improved practically. Furthermore, the defect that the data is not encrypted in network transmission information is considered, effective safety protection is adopted for the data from the source, a plurality of safety holes are avoided, and the safety of the data is greatly improved.
Example one
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a label management method according to an embodiment of the present invention. The method described in fig. 1 may be applied to a data handover system including an annotation server and an algorithm server, and other data handover systems having an annotation server and an algorithm server are not limited by the embodiments of the present invention. As shown in fig. 1, the annotation management method may include the following operations:
101. and receiving the data downloading instruction through the annotation server, and acquiring an annotation data packet corresponding to the data downloading instruction.
When a data team wants to hand over data, a data downloading instruction is issued to the marking server, wherein the data downloading instruction comprises a marking data packet and a storage path of the marking data packet.
102. And the annotation server is used for carrying out encryption operation on the annotation data packet, generating an encrypted data packet and sending the encrypted data packet to the algorithm processor.
Because data handover is mostly realized by network transmission, such as HTTP network transmission, in order to overcome the problem that data is easily stolen due to such a network transmission manner, an encryption operation is directly performed on a target labeled data packet, the encryption operation can be realized as a cryptographic technique for configuring a key for data in the prior art, after the encryption operation, the cryptographic technique and the labeled data packet are packaged into an encrypted data packet, and then the encrypted data packet is transmitted to an algorithm server for storage through the network for data transmission.
103. And responding to the decryption request instruction, judging the decryption request instruction according to a preset authority management library, and acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor when the judgment result is that the decryption request instruction is an authorized instruction.
For some engineers who need to use the annotation data packet for application, a decryption request command is issued, wherein the decryption request command includes the engineer ID issuing the decryption request command and the target annotation data packet. Judging the decryption request instruction by using a preset authority management library to obtain an authorized instruction, wherein the preset authority management library can be an authority management library created by a data transfer team according to transferred data, and the authority management library stores an incidence relation between an engineer ID and a matched encrypted data packet;
as a specific implementation manner, the determining manner may be implemented by, after obtaining the engineer ID included in the decryption request instruction, searching in the authority management library whether the engineer ID is stored in the authority management library and matches the target annotation data packet included in the decryption request instruction, and when the engineer ID is stored in the authority management library, obtaining an encrypted data packet associated with the engineer ID; and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
In a preferred embodiment, the engineer ID may be registered, and the association binding between the engineer ID and the encrypted data packet that may be associated with the engineer ID is stored in the rights management library.
In an optional implementation manner, when the engineer ID is not stored in the authority management library, the judgment result is generated as an unauthorized instruction, and the warning information is generated and output. The early warning information may be voice information or display information, the form of the early warning information is not limited in the present invention, and exemplarily, the fixed display information may be returned as "you have no permission to decrypt the data packet temporarily".
104. And carrying out decryption operation on the encrypted data packet of the algorithm processor through the password to obtain the labeled data packet.
And after the password is obtained, the encrypted data packet is decrypted by using a decoding technology, so that the marked data packet is obtained, and the safe transfer of the data is completed.
In a preferred embodiment, after the right instruction and the decryption request instruction are used to obtain the annotation data packet, the algorithm server performs online algorithm training. In this way, the algorithm engineer can directly use the labeled data in the labeled data packet to complete the on-line algorithm training.
According to the method provided by the embodiment, sufficient and effective safety protection can be made before the marked data packet enters external transmission through a series of perfect encryption and decryption technologies, so that a plurality of security holes are blocked. Even if data is stolen in the transmission process, a thief cannot open a data packet and cannot know the content and the value of the data due to the absence of a password, so that the data security is improved practically. Furthermore, the defect that the data is not encrypted in network transmission information is considered, effective safety protection is adopted for the data from the source, a plurality of safety holes are avoided, and the safety of the data is greatly improved. Moreover, on-line algorithm training can be carried out on the labeled data on the basis of ensuring data safety, and the utilization efficiency of the labeled data is improved conveniently.
Example two
Referring to fig. 2, the method described in fig. 2 is applied to a data handover system including an annotation server and an algorithm server, and the embodiment of the present invention is not limited to other data handover systems having an annotation server and an algorithm server. As shown in fig. 2, the annotation management method may include the following operations:
201. and receiving the data downloading instruction through the annotation server, and acquiring an annotation data packet corresponding to the data downloading instruction.
When a data team wants to hand over data, a data downloading instruction is issued to the marking server, wherein the data downloading instruction comprises a marking data packet and a storage path of the marking data packet.
202. And the annotation server is used for carrying out encryption operation on the annotation data packet, generating an encrypted data packet and sending the encrypted data packet to the algorithm processor.
Because data handover is mostly realized by network transmission, such as HTTP network transmission, in order to overcome the problem that data is easily stolen due to such a network transmission manner, an encryption operation is directly performed on a target labeled data packet, the encryption operation can be realized as a cryptographic technique for configuring a key for data in the prior art, after the encryption operation, the cryptographic technique and the labeled data packet are packaged into an encrypted data packet, and then the encrypted data packet is transmitted to an algorithm server for storage through the network for data transmission.
203. And generating authority management information, and updating the preset authority management library through the authority management information.
The authority management information comprises total authority information managed by all engineer IDs, so that the authority management information can carry out management distribution on all the engineer IDs and associated encrypted data packets in the authority management library again, and more intelligent monitoring on all the engineer IDs which send decryption instructions can be realized.
204. And responding to the decryption request instruction, judging the decryption request instruction according to a preset authority management library, and acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor when the judgment result is that the decryption request instruction is an authorized instruction.
For some engineers who need to use the annotation data packet for application, a decryption request command is issued, wherein the decryption request command includes the engineer ID issuing the decryption request command and the target annotation data packet. And judging the decryption request instruction by using a preset authority management library to obtain an authorized instruction, wherein the preset authority management library can be an authority management library created by a data transfer team according to the transferred data, and the authority management library stores the association relationship between the engineer ID and the matched encrypted data packet.
As a specific implementation manner, the determining manner may be implemented by, after obtaining the engineer ID included in the decryption request instruction, searching in the authority management library whether the engineer ID is stored in the authority management library and matches the target annotation data packet included in the decryption request instruction, and when the engineer ID is stored in the authority management library, obtaining an encrypted data packet associated with the engineer ID; and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
In a preferred embodiment, the engineer ID may be registered, and the association binding between the engineer ID and the encrypted data packet that may be associated with the engineer ID is stored in the rights management library.
In an optional implementation manner, when the engineer ID is not stored in the authority management library, the judgment result is generated as an unauthorized instruction, and the warning information is generated and output. The early warning information may be voice information or display information, the form of the early warning information is not limited in the present invention, and exemplarily, the fixed display information may be returned as "you have no permission to decrypt the data packet temporarily".
205. And carrying out decryption operation on the encrypted data packet of the algorithm processor through the password to obtain the labeled data packet.
And after the password is obtained, the encrypted data packet is decrypted by using a decoding technology, so that the marked data packet is obtained, and the safe transfer of the data is completed.
In a preferred embodiment, after the right instruction and the decryption request instruction are used to obtain the annotation data packet, the algorithm server performs online algorithm training. In this way, the algorithm engineer can directly use the labeled data in the labeled data packet to complete the on-line algorithm training.
As shown in fig. 3, in this embodiment, a data downloading command is first sent to the annotation server through the data team, and the annotation server encrypts the annotation data packet and transmits the encrypted annotation data packet to the algorithm server. When an engineer wants to decrypt, an algorithm engineer ID and a decryption request are sent to the authority management library, if the engineer ID exists in a decryption authority list of the authority management library, if the engineer ID exists in the decryption authority list of the authority management library, a password is obtained from the authority management library, and therefore the encrypted data packet is decrypted to obtain a labeled data packet to complete online algorithm training. And if the engineer ID does not exist in the decryption authority list of the authority management library, displaying that the ID has no access authority. Therefore, encryption is carried out before transmission of the label data packet, and meanwhile, a perfect decryption program is added, so that various hazards of data leakage are avoided, and data safety is practically maintained.
EXAMPLE III
Referring to fig. 4, fig. 4 illustrates a label management system, which includes:
the obtaining module 1 is configured to receive the data downloading instruction through the annotation server, and obtain an annotation data packet corresponding to the data downloading instruction.
When a data team wants to hand over data, a data downloading instruction is issued to the marking server, wherein the data downloading instruction comprises a marking data packet and a storage path of the marking data packet.
And the encryption module 2 is used for carrying out encryption operation on the marking data packet, generating an encrypted data packet and sending the encrypted data packet to the algorithm processor.
Because data handover is mostly realized by network transmission, such as HTTP network transmission, in order to overcome the problem that data is easily stolen due to such a network transmission manner, an encryption operation is directly performed on a target labeled data packet, the encryption operation can be realized as a cryptographic technique for configuring a key for data in the prior art, after the encryption operation, the cryptographic technique and the labeled data packet are packaged into an encrypted data packet, and then the encrypted data packet is transmitted to an algorithm server for storage through the network for data transmission.
And the authority management module 3 is used for judging the decryption request instruction according to a preset authority management library after receiving the decryption request instruction, and acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor when the judgment result shows that the decryption request instruction is an authorized instruction.
Wherein, the authority management module 3 includes:
a preset rights management library 301; wherein, the authority management base stores the incidence relation between the engineer ID and the matched encrypted data packet;
an ID acquisition unit 302 configured to acquire an engineer ID included in the decryption request instruction;
a judging unit 303, configured to judge whether the engineer ID is stored in the rights management base; when the engineer ID is stored in the authority management library, acquiring an encrypted data packet associated with the engineer ID; and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
The judgment mode can be realized in such a way that after the engineer ID contained in the decryption request instruction is obtained, whether the engineer ID is stored in the authority management library or not is searched in the authority management library and is matched with the target marking data packet contained in the decryption request instruction, and when the engineer ID is stored in the authority management library, the encrypted data packet associated with the engineer ID is obtained; and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
And the decryption module 4 is used for decrypting the encrypted data packet of the algorithm processor through the password to obtain the marked data packet.
In a preferred embodiment, the rights management module 3 further comprises:
and the early warning unit 304 is used for generating a judgment result as an unauthorized instruction when the engineer ID is not stored in the authority management library, and generating early warning information for outputting.
In an optional implementation manner, when the engineer ID is not stored in the authority management library, the judgment result is generated as an unauthorized instruction, and the warning information is generated and output. The early warning information may be voice information or display information, the form of the early warning information is not limited in the present invention, and exemplarily, the fixed display information may be returned as "you have no permission to decrypt the data packet temporarily".
According to the system provided by the embodiment, sufficient and effective safety protection can be made before the marked data packet enters external transmission through a series of perfect encryption and decryption technologies, so that a plurality of security holes are blocked. Even if data is stolen in the transmission process, a thief cannot open a data packet and cannot know the content and the value of the data due to the absence of a password, so that the data security is improved practically. Furthermore, the defect that the data is not encrypted in network transmission information is considered, effective safety protection is adopted for the data from the source, a plurality of safety holes are avoided, and the safety of the data is greatly improved. Moreover, on-line algorithm training can be carried out on the labeled data on the basis of ensuring data safety, and the utilization efficiency of the labeled data is improved conveniently.
Example four
Referring to fig. 5, fig. 5 is a schematic structural diagram of a label management device according to an embodiment of the present invention. The apparatus described in fig. 5 may be, but is not limited to, the embodiment of the present invention. As shown in fig. 5, the apparatus may include:
a memory 501 in which executable program code is stored;
a processor 502 coupled to a memory 501;
the processor 502 calls the executable program code stored in the memory 501 for executing the annotation management method described in the first embodiment or the second embodiment.
EXAMPLE five
The embodiment of the invention discloses a computer-readable storage medium which stores a computer program for electronic data exchange, wherein the computer program enables a computer to execute the annotation management method described in the first embodiment or the second embodiment.
EXAMPLE six
An embodiment of the present invention discloses a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute the annotation management method described in the first embodiment or the second embodiment.
The above-described embodiments are only illustrative, and the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above detailed description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. Based on such understanding, the above technical solutions may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, wherein the storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), a One-time Programmable Read-Only Memory (OTPROM), an Electrically Erasable rewritable Read-Only Memory (EEPROM), a compact disc-Read-Only Memory (CD-ROM) or other magnetic disk memories, a magnetic tape Memory, a magnetic disk, a magnetic tape Memory, a magnetic tape, and a magnetic tape, Or any other medium which can be used to carry or store data and which can be read by a computer.
Finally, it should be noted that: the method and apparatus for label management disclosed in the embodiments of the present invention are only disclosed as preferred embodiments of the present invention, and are only used for illustrating the technical solutions of the present invention, not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art; the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An annotation management method applied to a data handover system comprising an annotation server and an algorithm server, the method comprising:
receiving a data downloading instruction through a labeling server, and acquiring a labeling data packet corresponding to the data downloading instruction;
carrying out encryption operation on the labeled data packet by using a labeling server, generating an encrypted data packet and sending the encrypted data packet to an algorithm processor;
responding to a decryption request instruction, judging the decryption request instruction according to a preset authority management library, and when the judgment result is that the decryption request instruction is an authorized instruction, acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor;
and carrying out decryption operation on the encrypted data packet of the algorithm processor through the password to obtain the labeled data packet.
2. The label management method according to claim 1, wherein the authority management library stores an association relationship between an engineer ID and a matched encrypted data packet, and the determining the decryption request command according to a preset authority management library includes:
acquiring an engineer ID and a target encryption data packet contained in the decryption request instruction;
judging whether the engineer ID is stored in the authority management library;
when the engineer ID is stored in the authority management library, acquiring an encrypted data packet associated with the engineer ID;
and if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction.
3. The method of claim 2, after determining whether the engineer ID is stored in the rights management repository, further comprising:
and when the engineer ID is not stored in the authority management library, generating a judgment result as an unauthorized instruction, and generating and outputting early warning information.
4. The annotation management method according to claim 1 or 2, further comprising:
and after the marked data packet is obtained through the authorized instruction and the decryption request instruction, performing online algorithm training on the algorithm server.
5. The annotation management method of claim 1, wherein after the using the annotation server to perform an encryption operation on the annotation data packet, generate an encrypted data packet and send the encrypted data packet to the algorithm processor, the method further comprises:
generating authority management information;
and updating the preset authority management library through the authority management information.
6. An annotation management system, the system comprising:
the acquisition module is used for receiving a data downloading instruction through the marking server and acquiring a marking data packet corresponding to the data downloading instruction;
the encryption module is used for carrying out encryption operation on the labeling data packet, generating an encrypted data packet and sending the encrypted data packet to the algorithm processor;
the authority management module is used for judging the decryption request instruction according to a preset authority management library after receiving the decryption request instruction, and acquiring a password associated with the decryption request instruction and sending the password to the algorithm processor when the judgment result shows that the decryption request instruction is an authorized instruction;
and the decryption module is used for decrypting the encrypted data packet of the algorithm processor through the password to obtain the labeled data packet.
7. The annotation management system of claim 6, wherein the rights management module comprises:
the system comprises a preset authority management library, a database and a database, wherein the authority management library stores the association relationship between an engineer ID and a matched encrypted data packet;
an ID acquisition unit configured to acquire an engineer ID included in the decryption request instruction;
a judging unit configured to judge whether the engineer ID is stored in the authority management library; when the engineer ID is stored in the authority management library, acquiring an encrypted data packet associated with the engineer ID;
if the target encrypted data packet belongs to the encrypted data packet associated with the engineer ID, generating a judgment result as an authorized instruction;
and the authority management module is used for judging whether the engineer ID is stored in the authority management library, and when the engineer ID is stored in the authority management library, generating a judgment result as an authorized instruction.
8. The annotation management system of claim 7, wherein the rights management module further comprises:
and the early warning unit is used for generating a judgment result as an unauthorized instruction when the engineer ID is not stored in the authority management library, and generating early warning information for outputting.
9. An apparatus for annotation management, the apparatus comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to perform the method of annotation management according to any of claims 1-5.
10. A computer storage medium storing computer instructions for performing a method of annotation management according to any one of claims 1-5 when invoked.
CN202010392768.3A 2020-05-11 2020-05-11 Method and system for label management Pending CN111586062A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010392768.3A CN111586062A (en) 2020-05-11 2020-05-11 Method and system for label management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010392768.3A CN111586062A (en) 2020-05-11 2020-05-11 Method and system for label management

Publications (1)

Publication Number Publication Date
CN111586062A true CN111586062A (en) 2020-08-25

Family

ID=72112879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010392768.3A Pending CN111586062A (en) 2020-05-11 2020-05-11 Method and system for label management

Country Status (1)

Country Link
CN (1) CN111586062A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114117494A (en) * 2021-11-30 2022-03-01 国网重庆市电力公司电力科学研究院 Encryption type data annotation system and use method thereof

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1076431A2 (en) * 1999-08-11 2001-02-14 Hitachi, Ltd. Digital Broadcasting system transmitting information, such as vehicle navigation information, to a mobile terminal and information service station
WO2005004485A1 (en) * 2003-07-04 2005-01-13 Koninklijke Philips Electronics N.V. Method of broadcasting multimedia content via a distribution network
CN102143175A (en) * 2011-03-25 2011-08-03 北京百纳威尔科技有限公司 Method for distributing DRM (Data Rights Management) document, mobile terminal and application server
CN103188242A (en) * 2011-12-30 2013-07-03 中国移动通信集团广东有限公司 Data protecting method, data protecting server and system
CN103220141A (en) * 2012-01-18 2013-07-24 中国移动通信集团辽宁有限公司 Sensitive data protecting method and system based on group key strategy
CN103701596A (en) * 2012-09-27 2014-04-02 西门子公司 Document access method, system and equipment and document access request response method, system and equipment
US20150026456A1 (en) * 2012-02-08 2015-01-22 Fasoo.Com Co., Ltd Apparatus and method for managing digital copyright on epub-based content, and apparatus and method for providing epub-based content according to user's right
US20150113290A1 (en) * 2009-11-16 2015-04-23 Rahul V. Auradkar Containerless data for trustworthy computing and data services
CN110138716A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of offer of key, video broadcasting method, server and client

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1076431A2 (en) * 1999-08-11 2001-02-14 Hitachi, Ltd. Digital Broadcasting system transmitting information, such as vehicle navigation information, to a mobile terminal and information service station
WO2005004485A1 (en) * 2003-07-04 2005-01-13 Koninklijke Philips Electronics N.V. Method of broadcasting multimedia content via a distribution network
US20150113290A1 (en) * 2009-11-16 2015-04-23 Rahul V. Auradkar Containerless data for trustworthy computing and data services
CN102143175A (en) * 2011-03-25 2011-08-03 北京百纳威尔科技有限公司 Method for distributing DRM (Data Rights Management) document, mobile terminal and application server
CN103188242A (en) * 2011-12-30 2013-07-03 中国移动通信集团广东有限公司 Data protecting method, data protecting server and system
CN103220141A (en) * 2012-01-18 2013-07-24 中国移动通信集团辽宁有限公司 Sensitive data protecting method and system based on group key strategy
US20150026456A1 (en) * 2012-02-08 2015-01-22 Fasoo.Com Co., Ltd Apparatus and method for managing digital copyright on epub-based content, and apparatus and method for providing epub-based content according to user's right
CN103701596A (en) * 2012-09-27 2014-04-02 西门子公司 Document access method, system and equipment and document access request response method, system and equipment
CN110138716A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of offer of key, video broadcasting method, server and client

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114117494A (en) * 2021-11-30 2022-03-01 国网重庆市电力公司电力科学研究院 Encryption type data annotation system and use method thereof

Similar Documents

Publication Publication Date Title
CN110535833B (en) Data sharing control method based on block chain
CN110365670A (en) Blacklist sharing method, device, computer equipment and storage medium
CN104392188A (en) Security data storage method and system
EP3780484A1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
KR20180094063A (en) Document processing method and apparatus
CN108768963A (en) The communication means and system of trusted application and safety element
JP2010514000A (en) Method for securely storing program state data in an electronic device
CN1322431C (en) Encryption retention and data retrieve based on symmetric cipher key
CN109086578A (en) A kind of method that soft ware authorization uses, equipment and storage medium
CN112307515A (en) Database-based data processing method and device, electronic equipment and medium
CN108416224B (en) A kind of data encryption/decryption method and device
CN110266640A (en) Single-sign-on tamper resistant method, device, computer equipment and storage medium
CN104484628A (en) Multi-application intelligent card with encryption and decryption functions
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN109325360B (en) Information management method and device
CN111586062A (en) Method and system for label management
CN107992760B (en) Key writing method, device, equipment and storage medium
CN109145557A (en) A kind of computer data protection system
KR102559101B1 (en) Power metering apparatus, power metering server and, power metering method base on block chain
CN117014196A (en) File encryption storage method, system and computer readable storage medium
KR102542213B1 (en) Real-time encryption/decryption security system and method for data in network based storage
CN115001700B (en) Ecological environment supervision method and system based on blockchain
CN116599750A (en) System and method for ensuring traceability of data change by utilizing encryption technology
CN105897730A (en) User name and password information encryption and verification method
CN113901498B (en) Data sharing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200825

RJ01 Rejection of invention patent application after publication