CN111967029A - Intellectual property data management method and system - Google Patents
Intellectual property data management method and system Download PDFInfo
- Publication number
- CN111967029A CN111967029A CN202010802203.8A CN202010802203A CN111967029A CN 111967029 A CN111967029 A CN 111967029A CN 202010802203 A CN202010802203 A CN 202010802203A CN 111967029 A CN111967029 A CN 111967029A
- Authority
- CN
- China
- Prior art keywords
- intellectual property
- encryption
- information
- data
- uploading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013523 data management Methods 0.000 title claims abstract description 29
- 230000005540 biological transmission Effects 0.000 claims abstract description 48
- 238000013518 transcription Methods 0.000 description 8
- 230000035897 transcription Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Data Mining & Analysis (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Operations Research (AREA)
- Primary Health Care (AREA)
- Databases & Information Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides an intellectual property data management method and system, which comprises the steps of obtaining a plurality of intellectual property uploading data, calling an encryption process to load an intellectual property recording node, obtaining a historical configuration table item of the intellectual property recording node, obtaining a matched intellectual property recording node and a historical table item parameter corresponding to the matched intellectual property recording node according to the historical configuration table item, then obtaining encryption label information of each intellectual property uploading data according to the matched intellectual property recording node and the historical table item parameter corresponding to the matched intellectual property recording node, determining encryption protocol script information of each intellectual property uploading data according to the encryption label information of each intellectual property uploading data and an encryption transmission channel of each intellectual property uploading data, and then determining the encryption protocol script information of each intellectual property uploading data according to the encryption protocol script information of each intellectual property uploading data, and carrying out encryption configuration control on the encryption transmission channel of each intellectual property right upload data. Therefore, the encryption efficiency can be improved and the encryption error rate can be reduced in the process of intellectual property data management.
Description
Technical Field
The invention relates to the technical field of information management, in particular to an intellectual property data management method and system.
Background
How to improve the encryption efficiency and reduce the encryption error rate in the intellectual property data management process is a technical problem to be solved urgently.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method and a system for managing intellectual property data, which can improve encryption efficiency and reduce encryption error rate in the process of managing intellectual property data.
According to an aspect of an embodiment of the present invention, there is provided an intellectual property data management method applied to a server, the method including:
acquiring a plurality of intellectual property right uploading data, wherein the intellectual property right uploading data are provided with a plurality of corresponding intellectual property right recording nodes;
calling an encryption process to load the intellectual property bibliographic nodes, acquiring historical configuration items of the intellectual property bibliographic nodes, and acquiring matched intellectual property bibliographic nodes and historical item parameters corresponding to the matched intellectual property bibliographic nodes according to the historical configuration items;
acquiring encryption label information of the uploaded data of each intellectual property according to the matched intellectual property entry node and the history table parameter corresponding to the matched intellectual property entry node;
determining encryption protocol script information of each intellectual property right uploading data according to the encryption label information of each intellectual property right uploading data and the encryption transmission channel of each intellectual property right uploading data;
and carrying out encryption configuration control on an encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data.
In one possible example, the step of obtaining the matched intellectual property bibliographic node and the history entry parameter corresponding to the matched intellectual property bibliographic node according to the history configuration entry includes:
according to historical configuration table entries, the configuration encryption function parameters are utilized to carry out circular traversal on the intellectual property bibliographic nodes loaded and the matched intellectual property bibliographic nodes, matching table entries in the table entry data set are inserted into the intellectual property bibliographic nodes and the matched intellectual property bibliographic nodes, and the matched intellectual property bibliographic nodes and historical table entry parameters corresponding to the matched intellectual property bibliographic nodes are obtained.
In one possible example, the step of determining the encrypted protocol script information of each intellectual property right upload data according to the encrypted tag information of each intellectual property right upload data and the encrypted transmission channel of each intellectual property right upload data includes:
searching preset label characteristic information corresponding to the encrypted label information of each intellectual property uploading data according to characteristic matching information between the encrypted label information of the prestored intellectual property uploading data and the preset label characteristic information;
acquiring an encrypted transmission object corresponding to an encrypted transmission channel of each intellectual property right uploading data;
and for each intellectual property right uploading data, calculating an encryption node parameter between preset label characteristic information corresponding to the encryption label information and an encryption transmission object corresponding to an encryption transmission channel, and searching encryption protocol script information corresponding to the encryption node parameter according to characteristic matching information between pre-stored target script information and encryption protocol script information to serve as the encryption protocol script information of each intellectual property right uploading data.
In one possible example, the method further comprises:
detecting uploading source information of intellectual property uploading data in the same encryption protocol script information;
if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information does not match the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information according to preset uploading logic;
and if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information is matched with the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information at the same time.
In a possible example, the step of performing encryption configuration control on an encryption transmission channel of each piece of intellectual property right upload data according to the encryption protocol script information of each piece of intellectual property right upload data includes:
according to the encryption protocol script information of each intellectual property right uploading data, carrying out encryption configuration control on an encryption transmission channel of each intellectual property right uploading data, acquiring encryption key fields in the acquired data, and calculating encryption program instructions corresponding to the encryption key fields;
splicing the encryption program instructions corresponding to the encryption key fields according to a preset rule to obtain object definition parameters corresponding to the encryption key fields, and calculating the encryption program instructions corresponding to the object definition parameters;
performing preset logic operation on the encryption program instruction corresponding to the encryption key field and the encryption program instruction corresponding to the object definition parameter to obtain a confusion character string;
and performing obfuscation encryption on the intellectual property upload data by replacing the corresponding encryption key field with the obfuscation character string.
According to another aspect of the embodiments of the present invention, there is provided an intellectual property data management system applied to a server, the system including:
the first acquisition module is used for acquiring a plurality of intellectual property right uploading data, and the intellectual property right uploading data are provided with a plurality of corresponding intellectual property right recording nodes;
the second acquisition module is used for calling an encryption process to load the intellectual property bibliographic nodes, acquiring historical configuration items of the intellectual property bibliographic nodes, and acquiring matched intellectual property bibliographic nodes and historical item parameters corresponding to the matched intellectual property bibliographic nodes according to the historical configuration items;
the third acquisition module is used for acquiring the encryption tag information of the uploaded data of each intellectual property according to the matched intellectual property entry node and the history table parameter corresponding to the matched intellectual property entry node;
the determining module is used for determining the encryption protocol script information of each intellectual property right uploading data according to the encryption label information of each intellectual property right uploading data and the encryption transmission channel of each intellectual property right uploading data;
and the encryption module is used for carrying out encryption configuration control on the encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data.
According to another aspect of embodiments of the present invention, there is provided a readable storage medium having stored thereon a computer program which, when executed by a processor, is capable of performing the steps of the above-mentioned intellectual property data management method.
Compared with the prior art, the intellectual property data management method and system provided by the embodiment of the invention acquire a plurality of intellectual property uploading data and call an encryption process to load the intellectual property transcription node, acquire the historical configuration table entry of the intellectual property transcription node, acquire the matched intellectual property transcription node and the historical table entry parameter corresponding to the matched intellectual property transcription node according to the historical configuration table entry, then acquire the encryption tag information of each intellectual property uploading data according to the matched intellectual property transcription node and the historical table entry parameter corresponding to the matched intellectual property transcription node, determine the encryption protocol script information of each intellectual property uploading data according to the encryption tag information of each intellectual property uploading data and the encryption transmission channel of each intellectual property uploading data, and then determine the encryption protocol script information of each intellectual property uploading data according to the encryption protocol script information of each intellectual property uploading data, and carrying out encryption configuration control on the encryption transmission channel of each intellectual property right upload data. Therefore, the encryption efficiency can be improved and the encryption error rate can be reduced in the process of intellectual property data management.
In order to make the aforementioned objects, features and advantages of the embodiments of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 illustrates a component diagram of a server provided by an embodiment of the invention;
fig. 2 shows a flow chart of an intellectual property data management method provided by an embodiment of the present invention;
fig. 3 shows a functional block diagram of an intellectual property data management system provided by an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by the scholars in the technical field, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 shows an exemplary component schematic of a server 100. The server 100 may include one or more processors 104, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The server 100 may also include any storage media 106 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, storage medium 106 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage medium may use any technology to store information. Further, any storage medium may provide volatile or non-volatile retention of information. Further, any storage medium may represent a fixed or removable component of server 100. In one case, when the processor 104 executes the associated instructions stored in any storage medium or combination of storage media, the server 100 may perform any of the operations of the associated instructions. The server 100 further comprises one or more drive units 108 for interacting with any storage medium, such as a hard disk drive unit, an optical disk drive unit, etc.
The server 100 also includes input/output 110(I/O) for receiving various inputs (via input unit 112) and for providing various outputs (via output unit 114)). One particular output mechanism may include a presentation device 116 and an associated Graphical User Interface (GUI) 118. The server 100 may also include one or more network interfaces 120 for exchanging data with other devices via one or more communication units 122. One or more communication buses 124 couple the above-described components together.
The communication unit 122 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. The communication unit 122 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers 100, and so forth, governed by any protocol or combination of protocols.
Fig. 2 shows a flow chart of an intellectual property data management method provided by an embodiment of the present invention, which can be executed by the server 100 shown in fig. 1, and the detailed steps of the intellectual property data management method are described as follows.
Step S110, acquiring a plurality of intellectual property right uploading data, where the intellectual property right uploading data has a plurality of corresponding intellectual property right entry nodes.
Step S120, an encryption process is called to load the intellectual property entry node, and a history configuration entry for the intellectual property entry node is obtained, and the matched intellectual property entry node and a history entry parameter corresponding to the matched intellectual property entry node are obtained according to the history configuration entry.
Step S130, obtaining the encryption tag information of each intellectual property upload data according to the matched intellectual property entry node and the history table parameter corresponding to the matched intellectual property entry node.
Step S140, determining the encryption protocol script information of each intellectual property right upload data according to the encryption tag information of each intellectual property right upload data and the encryption transmission channel of each intellectual property right upload data.
And S150, carrying out encryption configuration control on the encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data.
In the embodiment, by acquiring a plurality of intellectual property uploading data and calling the encryption process to load the intellectual property transcription node, the history configuration table entry of the intellectual property transcription node is acquired, acquiring the matched intellectual property bibliographic node and the history list item parameter corresponding to the matched intellectual property bibliographic node according to the history configuration list item, then obtaining the encryption label information of each intellectual property uploading data according to the matched intellectual property entry node and the history table parameter corresponding to the matched intellectual property entry node, and determining the encryption protocol script information of each intellectual property right uploading data according to the encryption label information of each intellectual property right uploading data and the encryption transmission channel of each intellectual property right uploading data, and then carrying out encryption configuration control on the encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data. Therefore, the encryption efficiency can be improved and the encryption error rate can be reduced in the process of intellectual property data management.
In a possible example, for step S120, specifically, according to the historical configuration entries, the loading of the intellectual property entry node and the cycle traversal of the matched intellectual property entry node may be performed by using the configuration encryption function parameter, and the matching entries in the entry data set are inserted into the intellectual property entry node and the matched intellectual property entry node, so as to obtain the matched intellectual property entry node and the historical entry parameter corresponding to the matched intellectual property entry node.
In a possible example, for step S140, specifically, according to feature matching information between the pre-stored encryption tag information of the intellectual property upload data and the preset tag feature information, the preset tag feature information corresponding to the encryption tag information of each intellectual property upload data is searched, and then the encryption transmission object corresponding to the encryption transmission channel of each intellectual property upload data is obtained. Next, for each piece of intellectual property right uploading data, calculating an encryption node parameter between preset tag characteristic information corresponding to the encryption tag information of the piece of intellectual property right uploading data and an encryption transmission object corresponding to an encryption transmission channel of the piece of intellectual property right uploading data, and searching for encryption protocol script information corresponding to the encryption node parameter according to characteristic matching information between pre-stored target script information and encryption protocol script information to serve as the encryption protocol script information of each piece of intellectual property right uploading data.
In one possible example, the method further comprises:
detecting uploading source information of intellectual property uploading data in the same encryption protocol script information;
if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information does not match the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information according to preset uploading logic;
and if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information is matched with the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information at the same time.
In a possible example, the encryption configuration control may be performed on the encryption transmission channel of each intellectual property right upload data according to the encryption protocol script information of each intellectual property right upload data, specifically, the encryption configuration control may be performed on the encryption transmission channel of each intellectual property right upload data according to the encryption protocol script information of each intellectual property right upload data, an encryption key field in the acquired data is obtained, and an encryption program instruction corresponding to the encryption key field is calculated. And then, splicing the encryption program instructions corresponding to the encryption key fields according to a preset rule to obtain object definition parameters corresponding to the encryption key fields, and calculating the encryption program instructions corresponding to the object definition parameters. And then, carrying out preset logic operation on the encryption program instruction corresponding to the encryption key field and the encryption program instruction corresponding to the object definition parameter to obtain an obfuscated character string, so that the obfuscated character string replaces the corresponding encryption key field to carry out obfuscation and encryption on the intellectual property upload data.
Fig. 3 shows a functional block diagram of an intellectual property data management system 200 provided by an embodiment of the present invention, and the functions implemented by the intellectual property data management system 200 may correspond to the steps executed by the above method. The intellectual property data management system 200 may be understood as the server 100 or a processor of the server 100, or may be understood as a component which is independent from the server 100 or the processor and implements the functions of the present invention under the control of the server 100, as shown in fig. 3, and the functions of the functional modules of the intellectual property data management system 200 are described in detail below.
The first obtaining module 210 is configured to obtain a plurality of intellectual property upload data, where the intellectual property upload data has a plurality of corresponding intellectual property entry nodes.
The second obtaining module 220 is configured to invoke an encryption process to load the intellectual property bibliographic node, obtain a history configuration entry for the intellectual property bibliographic node, and obtain the matched intellectual property bibliographic node and a history entry parameter corresponding to the matched intellectual property bibliographic node according to the history configuration entry.
The third obtaining module 230 is configured to obtain encryption tag information of each piece of intellectual property upload data according to the matched intellectual property entry node and the history entry parameter corresponding to the matched intellectual property entry node.
The determining module 240 is configured to determine the encryption protocol script information of each intellectual property right upload data according to the encryption tag information of each intellectual property right upload data and the encryption transmission channel of each intellectual property right upload data.
And the encryption module is used for carrying out encryption configuration control on the encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data.
In one possible example, the second obtaining module 220 obtains the matched intellectual property bibliographic node and the history entry parameter corresponding to the matched intellectual property bibliographic node by:
according to historical configuration table entries, the configuration encryption function parameters are utilized to carry out circular traversal on the intellectual property bibliographic nodes loaded and the matched intellectual property bibliographic nodes, matching table entries in the table entry data set are inserted into the intellectual property bibliographic nodes and the matched intellectual property bibliographic nodes, and the matched intellectual property bibliographic nodes and historical table entry parameters corresponding to the matched intellectual property bibliographic nodes are obtained.
In one possible example, the determining module 240 determines the encryption protocol script information of each intellectual property upload data by:
searching preset label characteristic information corresponding to the encrypted label information of each intellectual property uploading data according to characteristic matching information between the encrypted label information of the prestored intellectual property uploading data and the preset label characteristic information;
acquiring an encrypted transmission object corresponding to an encrypted transmission channel of each intellectual property right uploading data;
and for each intellectual property right uploading data, calculating an encryption node parameter between preset label characteristic information corresponding to the encryption label information and an encryption transmission object corresponding to an encryption transmission channel, and searching encryption protocol script information corresponding to the encryption node parameter according to characteristic matching information between pre-stored target script information and encryption protocol script information to serve as the encryption protocol script information of each intellectual property right uploading data.
In a possible example, the encryption module 250 is further specifically configured to:
detecting uploading source information of intellectual property uploading data in the same encryption protocol script information;
if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information does not match the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information according to preset uploading logic;
and if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information is matched with the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information at the same time.
In a possible example, the encryption module 250 is further specifically configured to:
according to the encryption protocol script information of each intellectual property right uploading data, carrying out encryption configuration control on an encryption transmission channel of each intellectual property right uploading data, acquiring encryption key fields in the acquired data, and calculating encryption program instructions corresponding to the encryption key fields;
splicing the encryption program instructions corresponding to the encryption key fields according to a preset rule to obtain object definition parameters corresponding to the encryption key fields, and calculating the encryption program instructions corresponding to the object definition parameters;
performing preset logic operation on the encryption program instruction corresponding to the encryption key field and the encryption program instruction corresponding to the object definition parameter to obtain a confusion character string;
and performing obfuscation encryption on the intellectual property upload data by replacing the corresponding encryption key field with the obfuscation character string.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
Alternatively, all or part of the implementation may be in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any drawing credit or debit acknowledgement in the claims should not be construed as limiting the claim concerned.
Claims (10)
1. An intellectual property data management method applied to a server, the method comprising:
acquiring a plurality of intellectual property right uploading data, wherein the intellectual property right uploading data are provided with a plurality of corresponding intellectual property right recording nodes;
calling an encryption process to load the intellectual property bibliographic nodes, acquiring historical configuration items of the intellectual property bibliographic nodes, and acquiring matched intellectual property bibliographic nodes and historical item parameters corresponding to the matched intellectual property bibliographic nodes according to the historical configuration items;
acquiring encryption label information of the uploaded data of each intellectual property according to the matched intellectual property entry node and the history table parameter corresponding to the matched intellectual property entry node;
determining encryption protocol script information of each intellectual property right uploading data according to the encryption label information of each intellectual property right uploading data and the encryption transmission channel of each intellectual property right uploading data;
and carrying out encryption configuration control on an encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data.
2. The method of claim 1, wherein the step of obtaining the matched intellectual property bibliographic node and the history list parameters corresponding to the matched intellectual property bibliographic node according to the history configuration list comprises:
according to historical configuration table entries, the configuration encryption function parameters are utilized to carry out circular traversal on the intellectual property bibliographic nodes loaded and the matched intellectual property bibliographic nodes, matching table entries in the table entry data set are inserted into the intellectual property bibliographic nodes and the matched intellectual property bibliographic nodes, and the matched intellectual property bibliographic nodes and historical table entry parameters corresponding to the matched intellectual property bibliographic nodes are obtained.
3. The intellectual property data management method according to claim 1, wherein the step of determining the encryption protocol script information of each intellectual property upload data according to the encryption tag information of each intellectual property upload data and the encryption transmission channel of each intellectual property upload data comprises:
searching preset label characteristic information corresponding to the encrypted label information of each intellectual property uploading data according to characteristic matching information between the encrypted label information of the prestored intellectual property uploading data and the preset label characteristic information;
acquiring an encrypted transmission object corresponding to an encrypted transmission channel of each intellectual property right uploading data;
and for each intellectual property right uploading data, calculating an encryption node parameter between preset label characteristic information corresponding to the encryption label information and an encryption transmission object corresponding to an encryption transmission channel, and searching encryption protocol script information corresponding to the encryption node parameter according to characteristic matching information between pre-stored target script information and encryption protocol script information to serve as the encryption protocol script information of each intellectual property right uploading data.
4. The intellectual property data management method of claim 3 further comprising:
detecting uploading source information of intellectual property uploading data in the same encryption protocol script information;
if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information does not match the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information according to preset uploading logic;
and if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information is matched with the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information at the same time.
5. The intellectual property data management method according to claim 1, wherein the step of controlling encryption configuration of the encryption transmission channel of each intellectual property upload data according to the encryption protocol script information of each intellectual property upload data comprises:
according to the encryption protocol script information of each intellectual property right uploading data, carrying out encryption configuration control on an encryption transmission channel of each intellectual property right uploading data, acquiring encryption key fields in the acquired data, and calculating encryption program instructions corresponding to the encryption key fields;
splicing the encryption program instructions corresponding to the encryption key fields according to a preset rule to obtain object definition parameters corresponding to the encryption key fields, and calculating the encryption program instructions corresponding to the object definition parameters;
performing preset logic operation on the encryption program instruction corresponding to the encryption key field and the encryption program instruction corresponding to the object definition parameter to obtain a confusion character string;
and performing obfuscation encryption on the intellectual property upload data by replacing the corresponding encryption key field with the obfuscation character string.
6. An intellectual property data management system applied to a server, the system comprising:
the first acquisition module is used for acquiring a plurality of intellectual property right uploading data, and the intellectual property right uploading data are provided with a plurality of corresponding intellectual property right recording nodes;
the second acquisition module is used for calling an encryption process to load the intellectual property bibliographic nodes, acquiring historical configuration items of the intellectual property bibliographic nodes, and acquiring matched intellectual property bibliographic nodes and historical item parameters corresponding to the matched intellectual property bibliographic nodes according to the historical configuration items;
the third acquisition module is used for acquiring the encryption tag information of the uploaded data of each intellectual property according to the matched intellectual property entry node and the history table parameter corresponding to the matched intellectual property entry node;
the determining module is used for determining the encryption protocol script information of each intellectual property right uploading data according to the encryption label information of each intellectual property right uploading data and the encryption transmission channel of each intellectual property right uploading data;
and the encryption module is used for carrying out encryption configuration control on the encryption transmission channel of each intellectual property right uploading data according to the encryption protocol script information of each intellectual property right uploading data.
7. The intellectual property data management system of claim 6 wherein the second obtaining module obtains the matched intellectual property entry node and the history entry parameter corresponding to the matched intellectual property entry node by:
according to historical configuration table entries, the configuration encryption function parameters are utilized to carry out circular traversal on the intellectual property bibliographic nodes loaded and the matched intellectual property bibliographic nodes, matching table entries in the table entry data set are inserted into the intellectual property bibliographic nodes and the matched intellectual property bibliographic nodes, and the matched intellectual property bibliographic nodes and historical table entry parameters corresponding to the matched intellectual property bibliographic nodes are obtained.
8. The intellectual property data management system of claim 6 wherein the determining module determines the cryptographic protocol script information for each intellectual property upload data by:
searching preset label characteristic information corresponding to the encrypted label information of each intellectual property uploading data according to characteristic matching information between the encrypted label information of the prestored intellectual property uploading data and the preset label characteristic information;
acquiring an encrypted transmission object corresponding to an encrypted transmission channel of each intellectual property right uploading data;
and for each intellectual property right uploading data, calculating an encryption node parameter between preset label characteristic information corresponding to the encryption label information and an encryption transmission object corresponding to an encryption transmission channel, and searching encryption protocol script information corresponding to the encryption node parameter according to characteristic matching information between pre-stored target script information and encryption protocol script information to serve as the encryption protocol script information of each intellectual property right uploading data.
9. The intellectual property data management system of claim 8 wherein the encryption module is further configured to:
detecting uploading source information of intellectual property uploading data in the same encryption protocol script information;
if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information does not match the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information according to preset uploading logic;
and if the uploading source information of the intellectual property right uploading data in the same encryption protocol script information is matched with the preset uploading source information, encrypting the intellectual property right uploading data in the same encryption protocol script information at the same time.
10. The intellectual property data management system of claim 6 wherein the encryption module is further specifically configured to:
according to the encryption protocol script information of each intellectual property right uploading data, carrying out encryption configuration control on an encryption transmission channel of each intellectual property right uploading data, acquiring encryption key fields in the acquired data, and calculating encryption program instructions corresponding to the encryption key fields;
splicing the encryption program instructions corresponding to the encryption key fields according to a preset rule to obtain object definition parameters corresponding to the encryption key fields, and calculating the encryption program instructions corresponding to the object definition parameters;
performing preset logic operation on the encryption program instruction corresponding to the encryption key field and the encryption program instruction corresponding to the object definition parameter to obtain a confusion character string;
and performing obfuscation encryption on the intellectual property upload data by replacing the corresponding encryption key field with the obfuscation character string.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010802203.8A CN111967029A (en) | 2020-08-11 | 2020-08-11 | Intellectual property data management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010802203.8A CN111967029A (en) | 2020-08-11 | 2020-08-11 | Intellectual property data management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111967029A true CN111967029A (en) | 2020-11-20 |
Family
ID=73365576
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010802203.8A Withdrawn CN111967029A (en) | 2020-08-11 | 2020-08-11 | Intellectual property data management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111967029A (en) |
-
2020
- 2020-08-11 CN CN202010802203.8A patent/CN111967029A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111967029A (en) | Intellectual property data management method and system | |
CN111274437B (en) | Video material resource management method and system based on Internet | |
CN113904782A (en) | Online cloud platform management method and system | |
CN111355717A (en) | Encryption method and system for scientific and technological achievement transfer protocol | |
CN113810356A (en) | Cloud server encryption management method and system | |
CN111783122B (en) | Research and development trial-production information management method and system | |
CN112019632A (en) | Information management method and system of Internet cloud platform | |
CN111339160A (en) | Scientific and technological achievement data mining method and system | |
CN111767437B (en) | Enterprise science and technology project management method and system | |
CN113179289B (en) | Conference video information uploading method and system based on cloud computing service | |
CN112215527A (en) | Logistics management method and device | |
CN111767561B (en) | Enterprise financial road information processing method and system | |
CN113282924A (en) | Method and system for detecting malicious behaviors of software | |
CN113810355A (en) | Server resource management method and system | |
CN111340374A (en) | Production cooperative management method and system | |
CN112256329A (en) | Material manufacturing process information management method and system | |
CN114462066A (en) | Data encryption method and system for identity recognition | |
CN111178569A (en) | Office meeting management method and system | |
CN113282823A (en) | Hot topic tracking method and system based on artificial intelligence | |
CN113901020A (en) | Database remote backup method and system | |
CN113282596A (en) | Data updating method and system for live broadcast delivery service | |
CN113886844A (en) | Customer information management method and system | |
CN113206818A (en) | Cloud server safety protection method and system | |
CN112035327A (en) | Palm application management method and device | |
CN113901487A (en) | Digital information encryption method and system based on cloud computing service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20201120 |
|
WW01 | Invention patent application withdrawn after publication |