CN116467711A - Data management and analysis method and system for incubator enterprise - Google Patents

Data management and analysis method and system for incubator enterprise Download PDF

Info

Publication number
CN116467711A
CN116467711A CN202310330103.3A CN202310330103A CN116467711A CN 116467711 A CN116467711 A CN 116467711A CN 202310330103 A CN202310330103 A CN 202310330103A CN 116467711 A CN116467711 A CN 116467711A
Authority
CN
China
Prior art keywords
data
target
incubator
enterprise
virus detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310330103.3A
Other languages
Chinese (zh)
Inventor
梁颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Da Hengqin Incubator Management Co ltd
Original Assignee
Zhuhai Da Hengqin Incubator Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Da Hengqin Incubator Management Co ltd filed Critical Zhuhai Da Hengqin Incubator Management Co ltd
Priority to CN202310330103.3A priority Critical patent/CN116467711A/en
Publication of CN116467711A publication Critical patent/CN116467711A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Virology (AREA)
  • Bioethics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the field of data processing, and discloses a data management and analysis method and system for an incubator enterprise, which are used for improving the security of enterprise data. The method comprises the following steps: acquiring incubator enterprise data to be processed, and carrying out data division on the incubator enterprise data to obtain secret data and common data; transmitting the confidential data to a cloud platform for virus detection to obtain a virus detection result; when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the confidential data to obtain candidate data files; carrying out transmission protocol matching on the candidate data file to obtain a target transmission protocol; performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a voiceprint encrypted candidate data file; and performing character coding conversion on the candidate data file after voiceprint encryption to obtain a target data file, and transmitting the target data file to an intranet database.

Description

Data management and analysis method and system for incubator enterprise
Technical Field
The invention relates to the field of data processing, in particular to a data management and analysis method and system for an incubator enterprise.
Background
In recent years, incubators have played an increasingly important role in promoting the development of innovative enterprises. However, as incubator enterprises grow in size and number, it becomes more difficult to manage and analyze large amounts of data. By applying the data management and analysis technology, the incubator enterprise can be helped to better know the development condition, evaluate the success index of the enterprise, optimize the resource allocation and the like, thereby improving the operation efficiency of the incubator and attracting the eyeballs of more investors.
Because the data sources are diversified, the data quality inconsistency is large, and safe data transmission is needed, however, in the existing data transmission mode, the risk of being invaded by viruses is often existed in file data of enterprises, meanwhile, the number of confidential files is large, and the situation of insufficient security when encrypting the files exists.
Disclosure of Invention
The invention provides a data management and analysis method and system for an incubator enterprise, which are used for improving the safety of enterprise data management and analysis.
The first aspect of the present invention provides a data management and analysis method for an incubator enterprise, the data management and analysis method for an incubator enterprise comprising: acquiring incubator enterprise data to be processed, and dividing the incubator enterprise data into secret data and common data; transmitting the confidential data to a preset cloud platform for virus detection to obtain a corresponding virus detection result, wherein the virus detection result comprises virus and virus-free data; when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the secret data to obtain a candidate data file; carrying out transmission protocol matching on the candidate data file to obtain a corresponding target transmission protocol; performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a candidate data file after voiceprint encryption; and performing character encoding conversion on the candidate data file after the voiceprint encryption to obtain a target data file, and transmitting the target data file to a preset intranet database.
With reference to the first aspect, in a first implementation manner of the first aspect of the present invention, the obtaining to-be-processed incubator enterprise data and performing data division on the incubator enterprise data to obtain confidential data and general data includes: acquiring the incubator enterprise data to be processed, performing protocol scanning on the incubator enterprise data, and determining a corresponding data storage protocol and a data code corresponding to the incubator enterprise data to be processed; primarily classifying the to-be-processed incubator enterprise data through the data storage protocol to obtain a first classification result; performing type mapping on the to-be-processed incubator enterprise data through the data code to obtain a corresponding second classification result; fusion processing is carried out on the first classification result and the second classification result to obtain a corresponding data division rule; and carrying out data classification on the incubator enterprise data through the data division rule to obtain secret type data and common type data.
With reference to the first aspect, in a second implementation manner of the first aspect of the present invention, the transmitting the secret data to a preset cloud platform to perform virus detection to obtain a corresponding virus detection result includes: transmitting the secret data to the cloud platform, and carrying out database matching on the secret data through the cloud platform to obtain a corresponding target virus detection database; performing detection function matching on the secret data through the cloud platform to obtain a corresponding virus detection function; and carrying out virus detection on the confidential data through the virus detection function based on the target virus detection database to obtain a corresponding virus detection result.
With reference to the first aspect, in a third implementation manner of the first aspect of the present invention, the performing virus detection on the confidential data by using the virus detection function based on the target virus detection database to obtain a corresponding virus detection result includes: performing nonlinear sequence conversion on the confidential data through the virus detection function to obtain a corresponding nonlinear sequence set; filling data into the nonlinear sequence set to obtain a target sequence set; acquiring a corresponding historical virus sequence set from the target virus detection database, and comparing the characteristics of the target sequence set through the historical virus sequence set to obtain a corresponding characteristic comparison result; and carrying out virus analysis on the confidential data based on the characteristic comparison result to obtain a corresponding virus detection result.
With reference to the first aspect, in a fourth implementation manner of the first aspect of the present invention, the performing transmission protocol matching on the candidate data file to obtain a corresponding target transmission protocol includes: predicting the storage area of the candidate data file to generate a corresponding prediction storage area; scanning a storage protocol based on the predicted storage area to obtain a corresponding target storage protocol; performing intranet transmission channel matching based on the target storage protocol to obtain a corresponding intranet transmission channel; and carrying out transmission protocol matching based on the intranet transmission channel to obtain a corresponding target transmission protocol.
With reference to the first aspect, in a fifth implementation manner of the first aspect of the present invention, the performing, based on the target transmission protocol, a voiceprint encryption process on the candidate data file to obtain a voiceprint encrypted candidate data file includes: performing transmission object matching on the target transmission protocol to obtain a corresponding transmission object set; performing level division on the transmission object set to obtain a plurality of corresponding levels; based on a preset level ordering rule, ordering the multiple levels to obtain a corresponding ordering result; determining a target transmission object based on the sorting result, and determining a target user through the target transmission object; based on a preset voiceprint database, voiceprint information acquisition is carried out on the target user to obtain target voiceprint information; and carrying out voiceprint encryption processing on the candidate file based on the target voiceprint information to obtain a candidate data file after voiceprint encryption.
With reference to the first aspect, in a sixth implementation manner of the first aspect of the present invention, performing character encoding conversion on the candidate data file after voiceprint encryption to obtain a target data file, and transmitting the target data file to a preset intranet database, where the method includes: performing character segmentation on the candidate data file after voiceprint encryption to obtain a segmented character string set; performing data format conversion on each segmented character string in the segmented character string combination to obtain candidate segmented character strings; coding the candidate segmentation character strings to obtain target segmentation character strings; and generating a file based on the target segmentation character string to obtain a target data file, and transmitting the target data file to the intranet database.
A second aspect of the present invention provides a data management and analysis system for an incubator enterprise, the data management and analysis system for an incubator enterprise comprising:
the acquisition module is used for acquiring the incubator enterprise data to be processed and carrying out data division on the incubator enterprise data to obtain secret data and common data;
the detection module is used for transmitting the confidential data to a preset cloud platform for virus detection to obtain a corresponding virus detection result, wherein the virus detection result comprises virus and virus-free data;
the isolation module is used for carrying out transmission isolation processing on the confidential data to obtain candidate data files when the virus detection result is that the virus is not contained;
the matching module is used for carrying out transmission protocol matching on the candidate data files to obtain corresponding target transmission protocols;
the encryption module is used for conducting voiceprint encryption processing on the candidate data files based on the target transmission protocol to obtain candidate data files after voiceprint encryption;
and the transmission module is used for carrying out character coding conversion on the candidate data file after the voiceprint encryption to obtain a target data file and transmitting the target data file to a preset intranet database.
A third aspect of the present invention provides a data management and analysis device for an incubator enterprise, comprising: a memory and at least one processor, the memory having instructions stored therein; the at least one processor invokes the instructions in the memory to cause the data management and analysis device of the incubator enterprise to perform the data management and analysis method of the incubator enterprise described above.
A fourth aspect of the present invention provides a computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the above-described method of data management and analysis for an incubator enterprise.
According to the technical scheme provided by the invention, the incubator enterprise data to be processed is obtained, and the incubator enterprise data is subjected to data division to obtain secret data and common data; transmitting the confidential data to a cloud platform for virus detection to obtain a virus detection result; when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the confidential data to obtain candidate data files; carrying out transmission protocol matching on the candidate data file to obtain a target transmission protocol; performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a voiceprint encrypted candidate data file; the invention firstly carries out virus detection on the incubator enterprise data, and then carries out voiceprint encryption processing on the secret data according to the virus detection result, so that the target data file can be safely stored in the intranet database, thereby improving the safety of the incubator enterprise data storage process and further improving the safety of the incubator enterprise data management and analysis.
Drawings
FIG. 1 is a schematic diagram of one embodiment of a method of data management and analysis for an incubator enterprise in accordance with an embodiment of the present invention;
FIG. 2 is a flow chart of virus detection in an embodiment of the invention;
FIG. 3 is a flow chart of transmission protocol matching in an embodiment of the present invention;
FIG. 4 is a flowchart of a voiceprint encryption process in an embodiment of the present invention;
FIG. 5 is a schematic diagram of one embodiment of a data management and analysis system for an incubator enterprise in accordance with an embodiment of the present invention;
fig. 6 is a schematic diagram of an embodiment of a data management and analysis apparatus of an incubator enterprise in an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a data management and analysis method and system for an incubator enterprise, which are used for improving the safety of enterprise data management and analysis. The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
For ease of understanding, a specific flow of an embodiment of the present invention will be described below with reference to fig. 1, where an embodiment of a method for managing and analyzing data of an incubator enterprise includes:
s101, acquiring incubator enterprise data to be processed and dividing the incubator enterprise data into secret data and common data;
it will be appreciated that the execution subject of the present invention may be a data management and analysis system of an incubator enterprise, and may also be a terminal or a server, and is not limited herein. The embodiment of the invention is described by taking a server as an execution main body as an example.
Specifically, the server firstly acquires the enterprise data of the incubator to be processed, and specifically includes: performing data query on a target enterprise to obtain data query information; mapping the data address in the data query information into a preset data query form to generate a query record, and obtaining candidate enterprise data corresponding to the data query form; carrying out association grade division on the candidate enterprise data to obtain an association list to be processed; carrying out data priority division on candidate enterprise data to obtain a data priority list; performing difference calculation on the association list to be processed and the data priority list to obtain a difference distribution sequence; and selecting the first candidate enterprise data from the difference distribution sequence as incubator enterprise data.
S102, transmitting the confidential data to a preset cloud platform for virus detection to obtain a corresponding virus detection result, wherein the virus detection result comprises virus and virus-free data;
specifically, the server transmits the secret type data to a preset cloud platform, database matching is carried out on the secret type data through the cloud platform, and a target virus detection database is obtained, wherein the database matching process comprises the following steps: extracting feature information of secret data, wherein the feature information is any distinguishing feature used for distinguishing different enterprise data, specifically, performing virus detection function matching on the secret data according to the feature information to obtain a virus detection function, providing a trigger virus detection function when performing virus detection in the embodiment, and calling a virus detection flow by the virus detection function to enable the virus detection flow to receive the secret data and buffer the secret data into a preset storage area, wherein the preset storage area comprises a virus detection storage area, and performing real-time conversion according to the virus detection storage area to obtain a virus detection result of the secret data, wherein the virus detection result comprises viruses and viruses.
S103, when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the confidential data to obtain candidate data files;
Specifically, when the virus detection result is that the virus is not contained, the transmission isolation processing is performed on the confidential data, which specifically includes: transmission isolation processing is performed on the secure data to render the secure data potentially inoperable. The potential viruses in the secret data can not run by isolating the secret data, and the safety problem can not be caused even if the potential viruses exist in the secret data; the data transmission isolation processing makes viruses unable to run, and can ensure that the viruses do not cause safety problems on the secret data, when the virus detection result is that the viruses are not contained, the transmission isolation processing can be automatically carried out on the secret data, and a target user is informed of the fact that the secret data is selected to be subjected to the isolation processing, and then the transmission isolation processing is carried out on the secret data, so that candidate data files are generated. By carrying out transmission isolation processing on the confidential data, some potential viruses in the confidential data can not run, so that the influence of security problems on target users in candidate data files is avoided, and the security of the confidential data is improved.
S104, carrying out transmission protocol matching on the candidate data file to obtain a corresponding target transmission protocol;
Specifically, transmission protocol matching is performed on the candidate data file, segmentation analysis processing is performed on the candidate data file, segmentation analysis content is obtained, storage area prediction of the candidate data file is performed according to the segmentation analysis content, and a corresponding prediction storage area is generated. According to the method, the device and the system, the transmission protocol matching model is adopted, the intranet transmission channel can be analyzed and identified, the time characteristics and the data characteristics of the candidate data files are comprehensively considered, the intranet transmission channel is matched, and the matching accuracy of the target transmission protocol is further improved.
S105, carrying out voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain the candidate data file after voiceprint encryption;
specifically, the server firstly acquires target voiceprint information of a target user, encrypts the candidate data file according to the target voiceprint information of the target user, and fuses the voiceprint information to an encryption technology to obtain the candidate data file after voiceprint encryption. According to the embodiment, the target voiceprint information of the corresponding target user is obtained by utilizing the personal information of the target user, so that the server can feed back the target voiceprint information of different target users to different target users, the target voiceprint information of the target user dynamically changes according to the requirements of the target users, and the candidate file is subjected to voiceprint encryption processing based on the target voiceprint information to obtain the candidate data file after voiceprint encryption, so that the target user can combine the voiceprint information with the candidate data file, and the data security of the candidate data file can be further improved.
S106, performing character encoding conversion on the candidate data file after the voiceprint encryption to obtain a target data file, and transmitting the target data file to a preset intranet database.
Specifically, the server acquires candidate data files after voiceprint encryption, and filters the candidate data files after voiceprint encryption based on a preset data filtering rule to obtain filtered candidate data files; extracting data values in the filtered candidate data files, and performing character code conversion on the data values to generate a segmented character string set; compressing each split character string in the split character string combination based on a preset compression rule, and combining the candidate data file after voiceprint encryption with a preset file header and a preset file tail to obtain a compressed candidate data file; and encoding each data in the compression candidate data file according to a preset encoding rule to generate a target segmentation character string, converting the target segmentation character string into a target data file, and transmitting the target data file to the intranet database. The embodiment of the invention realizes the transmission of the candidate data file after the voiceprint encryption, avoids the problem of data loss in the transmission process, and improves the efficiency and the safety of the transmission of the candidate data file after the voiceprint encryption.
In the embodiment of the invention, the incubator enterprise data to be processed is obtained and is subjected to data division to obtain secret data and common data; transmitting the confidential data to a cloud platform for virus detection to obtain a virus detection result; when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the confidential data to obtain candidate data files; carrying out transmission protocol matching on the candidate data file to obtain a target transmission protocol; performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a voiceprint encrypted candidate data file; the invention firstly carries out virus detection on the incubator enterprise data, and then carries out voiceprint encryption processing on the secret data according to the virus detection result, so that the target data file can be safely stored in the intranet database, thereby improving the safety of the incubator enterprise data storage process and further improving the safety of the incubator enterprise data management and analysis.
In a specific embodiment, the process of executing step S101 may specifically include the following steps:
(1) Acquiring incubator enterprise data to be processed, performing protocol scanning on the incubator enterprise data, and determining a corresponding data storage protocol and a data code corresponding to the incubator enterprise data to be processed;
(2) Primarily classifying the incubator enterprise data to be processed through a data storage protocol to obtain a first classification result;
(3) Performing type mapping on the incubator enterprise data to be processed through data coding to obtain a corresponding second classification result;
(4) Fusion processing is carried out on the first classification result and the second classification result to obtain a corresponding data division rule;
(5) And classifying the data of the incubator enterprise by the data division rule to obtain secret data and common data.
Specifically, the incubator enterprise data to be processed is obtained, protocol scanning is carried out on the incubator enterprise data, a corresponding data storage protocol and a data code corresponding to the incubator enterprise data to be processed are determined, wherein a plurality of code bytes similar to a preset data contract are screened from the data code of the incubator enterprise data to be processed, a plurality of weight coefficients are obtained, the data contract is a transmission protocol in a first access channel in a plurality of network protocols, and the network protocols comprise: the system comprises a plurality of transmission protocols, a plurality of virtual channel protocols and a plurality of access channel protocols, wherein the virtual channel protocols are history protocols corresponding to the transmission protocols, and the access channel protocols are real-time protocols corresponding to the transmission protocols. Primarily classifying the incubator enterprise data to be processed through a data storage protocol to obtain a first classification result, performing type mapping on the incubator enterprise data to be processed through data coding to obtain a corresponding second classification result, and performing fusion processing on the first classification result and the second classification result to obtain a corresponding data partitioning rule, wherein the data partitioning rule specifically comprises: carrying out association grade division on the candidate enterprise data to obtain an association list to be processed; carrying out data priority division on candidate enterprise data to obtain a data priority list; performing difference calculation on the association list to be processed and the data priority list to obtain a difference distribution sequence; selecting candidate enterprise data ranked first from the difference distribution sequence as incubator enterprise data; and carrying out data classification on the enterprise data of the incubator by using a data division rule to obtain secret data and common data, wherein the common data are transmitted to an intranet database.
In a specific embodiment, the process of executing step S102 may specifically include the following steps:
(1) Transmitting the secret data to a cloud platform, and carrying out database matching on the secret data through the cloud platform to obtain a corresponding target virus detection database;
(2) Performing detection function matching on the secret data through the cloud platform to obtain a corresponding virus detection function;
(3) And carrying out virus detection on the confidential data through a virus detection function based on the target virus detection database to obtain a corresponding virus detection result.
Specifically, the secret data is transmitted to the cloud platform, database matching is carried out on the secret data through the cloud platform, a corresponding target virus detection database is obtained, the cloud platform is established in advance, feature information corresponding to a plurality of virus files is pre-stored in the cloud platform, and when the feature information is received, a server can directly detect whether preset blacklist data matched with the received feature information exists in the cloud platform or not. If the virus file exists, the confidential data is consistent with the virus file corresponding to the preset blacklist data, namely the virus exists in the file; if the virus detection result does not exist, the virus detection function is provided to trigger the virus detection function, the virus detection function calls the virus detection flow so that the virus detection flow receives the virus detection data and caches the virus detection data in a preset storage area, the preset storage area comprises the virus detection storage area, and a virus detection result of the secret data is obtained through real-time conversion according to the virus detection storage area, wherein the virus detection result comprises virus and virus-free data, and the secret data comprising the virus is processed, and the processing can comprise deleting processing or releasing processing.
In a specific embodiment, as shown in fig. 2, based on the target virus detection database, the process of performing virus detection on the confidential data by using the virus detection function to obtain the corresponding virus detection result may specifically include the following steps:
s201, performing nonlinear sequence conversion on secret data through a virus detection function to obtain a corresponding nonlinear sequence set;
s202, data filling is carried out on a nonlinear sequence set to obtain a target sequence set;
s203, acquiring a corresponding historical virus sequence set from a target virus detection database, and comparing the characteristics of the target sequence set through the historical virus sequence set to obtain a corresponding characteristic comparison result;
s204, carrying out virus analysis on the confidential data based on the characteristic comparison result to obtain a corresponding virus detection result.
Specifically, nonlinear sequence conversion is carried out on the secret data through a virus detection function, so that a corresponding nonlinear sequence set is obtained; and performing data filling on the nonlinear sequence set to obtain a target sequence set, wherein when the nonlinear sequence set is acquired, the nonlinear sequence set is used as input of a preset virus behavior recognition model, the preset virus behavior recognition model outputs a characteristic comparison result of the nonlinear sequence set, and further, the nonlinear sequence set is subjected to data filling to obtain the target sequence set. If the target sequence set is contained in the historical virus sequence set, a corresponding historical virus sequence set is obtained from a target virus detection database, and feature comparison is carried out on the target sequence set through the historical virus sequence set to obtain a corresponding feature comparison result, so that a target user is reminded of risk in running the confidential data. If the target sequence set is not found in the historical virus sequence set, whether the confidential data contains viruses cannot be judged, and at the moment, the nonlinear sequence set of the confidential data can be further extracted, and the identification process of the nonlinear sequence set can be carried out. And sending the characteristic comparison result to the server so that the server updates the historical virus sequence set of the secret data according to the characteristic comparison result. After the feature comparison result is obtained, the feature comparison result and the target sequence set of the secret data can be associated and sent to the server so that the server can update the historical virus sequence set of the secret data, and virus analysis is performed on the secret data based on the feature comparison result to obtain a corresponding virus detection result.
In a specific embodiment, as shown in fig. 3, the process of executing step S104 may specifically include the following steps:
s301, predicting storage areas of candidate data files to generate corresponding prediction storage areas;
s302, scanning a storage protocol based on a predicted storage area to obtain a corresponding target storage protocol;
s303, matching an intranet transmission channel based on a target storage protocol to obtain a corresponding intranet transmission channel;
s304, carrying out transmission protocol matching based on the intranet transmission channel to obtain a corresponding target transmission protocol.
Specifically, the segmentation analysis processing is performed according to the preset segmentation analysis logic to obtain segmentation analysis content, the storage area prediction of the candidate data file is performed according to the segmentation analysis content, and each protocol control segmentation data is used as a protocol control segmentation data sequence. Executing a preset target operation on each protocol control segment data sequence to obtain segment analysis content: the storage protocol scanning is carried out based on the predicted storage area to obtain corresponding target storage protocols, the storage protocols in the predicted storage area can be ordered according to the time window sequence, the preset number of the storage protocols are determined, the corresponding target storage protocols are selected by scanning each storage protocol, the intranet transmission channel matching is carried out based on the target storage protocols, the corresponding intranet transmission channels are obtained, and the target storage protocols corresponding to the two adjacent intranet transmission channels are respectively matched; and traversing the transmission channel information corresponding to the two adjacent intranet transmission channels, determining the corresponding intranet transmission channels, and finally, carrying out transmission protocol matching according to the intranet transmission channels to obtain the corresponding target transmission protocol.
In a specific embodiment, as shown in fig. 4, the process of performing step S105 may specifically include the following steps:
s401, carrying out transmission object matching on a target transmission protocol to obtain a corresponding transmission object set;
s402, carrying out level division on a transmission object set to obtain a plurality of corresponding levels;
s403, sorting the multiple levels based on a preset level sorting rule to obtain a corresponding sorting result;
s404, determining a target transmission object based on the sorting result, and determining a target user through the target transmission object;
s405, based on a preset voiceprint database, voiceprint information acquisition is carried out on a target user to obtain target voiceprint information;
s406, conducting voiceprint encryption processing on the candidate file based on the target voiceprint information to obtain a candidate data file after voiceprint encryption.
Specifically, the server performs transmission object matching on the target transmission protocol to obtain a corresponding transmission object set; carrying out level division on the transmission object set to obtain a plurality of corresponding levels; based on a preset level ordering rule, ordering the multiple levels to obtain a corresponding ordering result; determining a target transmission object based on the sorting result, and determining a target user through the target transmission object, wherein the data file encryption request of the target user is acquired, and based on a preset voiceprint database, voiceprint information acquisition is carried out on the target user to obtain target voiceprint information, and the target voiceprint information of the target user is returned. Acquiring a user data set of a target user according to a target user identifier, wherein the user data set is a set formed by all target user sets of the target user; searching a target user set matched with the keywords in the user data set; the server responds to the target user set searching request, and searches the target user set matched with the keyword according to the keyword carried by the target user set searching request. The keyword is segmented to obtain keyword segmentation, and whether the keyword segmentation exists in the text data of the target user set is judged to judge whether the keyword is matched with the target user set. Thus, the target user set matched with the keywords can be searched, and the searched target user set is obtained. And binding the candidate data file based on the target voiceprint information, and then carrying out voiceprint encryption processing on the bound candidate data file to obtain the candidate data file after voiceprint encryption.
In a specific embodiment, the process of executing step S106 may specifically include the following steps:
(1) Performing character segmentation on the candidate data file after voiceprint encryption to obtain a segmented character string set;
(2) Performing data format conversion on each segmented character string in the segmented character string combination to obtain candidate segmented character strings;
(3) Encoding the candidate segmentation character strings to obtain target segmentation character strings;
(4) And generating a file based on the target segmentation character string to obtain a target data file and transmitting the target data file to an intranet database.
Specifically, character segmentation is carried out on candidate data files after voiceprint encryption to obtain a segmented character string set, data format conversion is carried out on each segmented character string in the segmented character string combination to obtain candidate segmented character strings, and filtering is carried out on the candidate data files after voiceprint encryption to obtain filtered candidate data files; extracting data values in the filtered candidate data files, and performing character code conversion on the data values to generate a segmented character string set; compressing each split character string in the split character string combination based on a preset compression rule, and combining the candidate data file after voiceprint encryption with a preset file header and a preset file tail to obtain a compressed candidate data file; and encoding each data in the compression candidate data file according to a preset encoding rule to generate a target segmentation character string, converting the target segmentation character string into a target data file, and transmitting the target data file to the intranet database.
In the embodiment of the invention, the incubator enterprise data to be processed is obtained and is subjected to data division to obtain secret data and common data; transmitting the confidential data to a cloud platform for virus detection to obtain a virus detection result; when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the confidential data to obtain candidate data files; carrying out transmission protocol matching on the candidate data file to obtain a target transmission protocol; performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a voiceprint encrypted candidate data file; the invention firstly carries out virus detection on the incubator enterprise data, and then carries out voiceprint encryption processing on the secret data according to the virus detection result, so that the target data file can be safely stored in the intranet database, thereby improving the safety of the incubator enterprise data storage process and further improving the safety of the incubator enterprise data management and analysis.
The above describes a method for managing and analyzing data of an incubator enterprise in an embodiment of the present invention, and the following describes a system for managing and analyzing data of an incubator enterprise in an embodiment of the present invention, referring to fig. 5, an embodiment of the system for managing and analyzing data of an incubator enterprise in an embodiment of the present invention includes:
The acquisition module 501 is used for acquiring incubator enterprise data to be processed and dividing the incubator enterprise data into confidential data and common data;
the detection module 502 is configured to transmit the secret data to a preset cloud platform for virus detection, so as to obtain a corresponding virus detection result, where the virus detection result includes a virus and a virus-free virus;
an isolation module 503, configured to perform transmission isolation processing on the secret data to obtain a candidate data file when the virus detection result is that the virus is not contained;
a matching module 504, configured to perform transmission protocol matching on the candidate data file to obtain a corresponding target transmission protocol;
the encryption module 505 is configured to perform voiceprint encryption on the candidate data file based on the target transmission protocol, to obtain a candidate data file after voiceprint encryption;
and the transmission module 506 is configured to perform character encoding conversion on the candidate data file after voiceprint encryption to obtain a target data file, and transmit the target data file to a preset intranet database.
The incubator enterprise data to be processed is obtained through the cooperation of the components, and the incubator enterprise data is subjected to data division to obtain secret data and common data; transmitting the confidential data to a cloud platform for virus detection to obtain a virus detection result; when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the confidential data to obtain candidate data files; carrying out transmission protocol matching on the candidate data file to obtain a target transmission protocol; performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a voiceprint encrypted candidate data file; the invention firstly carries out virus detection on the incubator enterprise data, and then carries out voiceprint encryption processing on the secret data according to the virus detection result, so that the target data file can be safely stored in the intranet database, thereby improving the safety of the incubator enterprise data storage process and further improving the safety of the incubator enterprise data management and analysis.
Fig. 6 is a schematic structural diagram of a data management and analysis device for an incubator enterprise according to an embodiment of the present invention, where the data management and analysis device 600 for an incubator enterprise may have a relatively large difference due to configuration or performance, and may include one or more processors (central processing units, CPU) 610 (e.g., one or more processors) and a memory 620, and one or more storage media 630 (e.g., one or more mass storage devices) storing security data 633 or data 632. Wherein the memory 620 and the storage medium 630 may be transitory or persistent storage. The program stored on the storage medium 630 may include one or more modules (not shown), each of which may include a series of instruction operations in the data management and analysis device 600 of the incubator enterprise. Still further, the processor 610 may be configured to communicate with the storage medium 630 to execute a series of instruction operations in the storage medium 630 on the data management and analysis device 600 of the incubator enterprise.
The incubator enterprise's data management and analysis device 600 may also include one or more power supplies 640, one or more wired or wireless network interfaces 650, one or more input/output interfaces 660, and/or one or more operating systems 631, such as Windows Serve, mac OS X, unix, linux, freeBSD, and the like. It will be appreciated by those skilled in the art that the data management and analysis device structure of the incubator assembly shown in fig. 6 does not constitute a limitation on the data management and analysis device of the incubator assembly, and may include more or less components than those illustrated, or may combine certain components, or may be a different arrangement of components.
The present invention also provides a data management and analysis apparatus for an incubator enterprise, the data management and analysis apparatus for an incubator enterprise including a memory and a processor, the memory storing computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the data management and analysis method for an incubator enterprise in the above embodiments.
The present invention also provides a computer readable storage medium, which may be a non-volatile computer readable storage medium, and which may also be a volatile computer readable storage medium, the computer readable storage medium having instructions stored therein which, when executed on a computer, cause the computer to perform the steps of the data management and analysis method of the incubator enterprise.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random acceS memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A data management and analysis method of an incubator enterprise, the data management and analysis method of the incubator enterprise comprising:
acquiring incubator enterprise data to be processed, and dividing the incubator enterprise data into secret data and common data;
transmitting the confidential data to a preset cloud platform for virus detection to obtain a corresponding virus detection result, wherein the virus detection result comprises virus and virus-free data;
when the virus detection result is that the virus is not contained, carrying out transmission isolation processing on the secret data to obtain a candidate data file;
Carrying out transmission protocol matching on the candidate data file to obtain a corresponding target transmission protocol;
performing voiceprint encryption processing on the candidate data file based on the target transmission protocol to obtain a candidate data file after voiceprint encryption;
and performing character encoding conversion on the candidate data file after the voiceprint encryption to obtain a target data file, and transmitting the target data file to a preset intranet database.
2. The method for managing and analyzing data of an incubator enterprise according to claim 1, wherein the steps of acquiring incubator enterprise data to be processed and dividing the incubator enterprise data into confidential data and general data comprise:
acquiring the incubator enterprise data to be processed, performing protocol scanning on the incubator enterprise data, and determining a corresponding data storage protocol and a data code corresponding to the incubator enterprise data to be processed;
primarily classifying the to-be-processed incubator enterprise data through the data storage protocol to obtain a first classification result;
performing type mapping on the to-be-processed incubator enterprise data through the data code to obtain a corresponding second classification result;
Fusion processing is carried out on the first classification result and the second classification result to obtain a corresponding data division rule;
and carrying out data classification on the incubator enterprise data through the data division rule to obtain secret type data and common type data.
3. The method for managing and analyzing data of an incubator enterprise according to claim 1, wherein the transmitting the confidential data to a preset cloud platform for virus detection to obtain a corresponding virus detection result comprises:
transmitting the secret data to the cloud platform, and carrying out database matching on the secret data through the cloud platform to obtain a corresponding target virus detection database;
performing detection function matching on the secret data through the cloud platform to obtain a corresponding virus detection function;
and carrying out virus detection on the confidential data through the virus detection function based on the target virus detection database to obtain a corresponding virus detection result.
4. A method for managing and analyzing data of an incubator enterprise according to claim 3, wherein said performing virus detection on said confidential data by said virus detection function based on said target virus detection database to obtain a corresponding virus detection result comprises:
Performing nonlinear sequence conversion on the confidential data through the virus detection function to obtain a corresponding nonlinear sequence set;
filling data into the nonlinear sequence set to obtain a target sequence set;
acquiring a corresponding historical virus sequence set from the target virus detection database, and comparing the characteristics of the target sequence set through the historical virus sequence set to obtain a corresponding characteristic comparison result;
and carrying out virus analysis on the confidential data based on the characteristic comparison result to obtain a corresponding virus detection result.
5. The method for managing and analyzing data of an incubator enterprise according to claim 1, wherein said performing transmission protocol matching on said candidate data file to obtain a corresponding target transmission protocol comprises:
predicting the storage area of the candidate data file to generate a corresponding prediction storage area;
scanning a storage protocol based on the predicted storage area to obtain a corresponding target storage protocol;
performing intranet transmission channel matching based on the target storage protocol to obtain a corresponding intranet transmission channel;
and carrying out transmission protocol matching based on the intranet transmission channel to obtain a corresponding target transmission protocol.
6. The method for managing and analyzing data of an incubator enterprise according to claim 1, wherein said performing voiceprint encryption processing on said candidate data file based on said target transmission protocol to obtain a voiceprint encrypted candidate data file comprises:
performing transmission object matching on the target transmission protocol to obtain a corresponding transmission object set;
performing level division on the transmission object set to obtain a plurality of corresponding levels;
based on a preset level ordering rule, ordering the multiple levels to obtain a corresponding ordering result;
determining a target transmission object based on the sorting result, and determining a target user through the target transmission object;
based on a preset voiceprint database, voiceprint information acquisition is carried out on the target user to obtain target voiceprint information;
and carrying out voiceprint encryption processing on the candidate file based on the target voiceprint information to obtain a candidate data file after voiceprint encryption.
7. The method for managing and analyzing data of an incubator enterprise according to claim 1, wherein the performing character encoding conversion on the candidate data file after voiceprint encryption to obtain a target data file and transmitting the target data file to a preset intranet database comprises:
Performing character segmentation on the candidate data file after voiceprint encryption to obtain a segmented character string set;
performing data format conversion on each segmented character string in the segmented character string combination to obtain candidate segmented character strings;
coding the candidate segmentation character strings to obtain target segmentation character strings;
and generating a file based on the target segmentation character string to obtain a target data file, and transmitting the target data file to the intranet database.
8. A data management and analysis system for an incubator enterprise, the data management and analysis system comprising:
the acquisition module is used for acquiring the incubator enterprise data to be processed and carrying out data division on the incubator enterprise data to obtain secret data and common data;
the detection module is used for transmitting the confidential data to a preset cloud platform for virus detection to obtain a corresponding virus detection result, wherein the virus detection result comprises virus and virus-free data;
the isolation module is used for carrying out transmission isolation processing on the confidential data to obtain candidate data files when the virus detection result is that the virus is not contained;
The matching module is used for carrying out transmission protocol matching on the candidate data files to obtain corresponding target transmission protocols;
the encryption module is used for conducting voiceprint encryption processing on the candidate data files based on the target transmission protocol to obtain candidate data files after voiceprint encryption;
and the transmission module is used for carrying out character coding conversion on the candidate data file after the voiceprint encryption to obtain a target data file and transmitting the target data file to a preset intranet database.
9. A data management and analysis device of an incubator enterprise, characterized in that the data management and analysis device of an incubator enterprise comprises: a memory and at least one processor, the memory having instructions stored therein;
the at least one processor invoking the instructions in the memory to cause the data management and analysis device of the incubator enterprise to perform the data management and analysis method of the incubator enterprise of any one of claims 1-7.
10. A computer readable storage medium having instructions stored thereon, which when executed by a processor, implement a method of data management and analysis of an incubator enterprise according to any one of claims 1-7.
CN202310330103.3A 2023-03-30 2023-03-30 Data management and analysis method and system for incubator enterprise Pending CN116467711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310330103.3A CN116467711A (en) 2023-03-30 2023-03-30 Data management and analysis method and system for incubator enterprise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310330103.3A CN116467711A (en) 2023-03-30 2023-03-30 Data management and analysis method and system for incubator enterprise

Publications (1)

Publication Number Publication Date
CN116467711A true CN116467711A (en) 2023-07-21

Family

ID=87179880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310330103.3A Pending CN116467711A (en) 2023-03-30 2023-03-30 Data management and analysis method and system for incubator enterprise

Country Status (1)

Country Link
CN (1) CN116467711A (en)

Similar Documents

Publication Publication Date Title
US8839419B2 (en) Distributive security investigation
US10404731B2 (en) Method and device for detecting website attack
EP3447669B1 (en) Information leakage detection method and device, server, and computer-readable storage medium
US20060048155A1 (en) Organizing transmission of repository data
GB2456619A (en) Managing errors generated in an apparatus
CN111866016B (en) Log analysis method and system
CN112307374B (en) To-do-based jump method, device, equipment and storage medium
US20160012226A1 (en) System and method for identifying installed software products
CN111667141A (en) Pending task case processing method, device, equipment and storage medium
CN114218606A (en) Tenant data isolation method, device, equipment and storage medium
CN113282630A (en) Data query method and device based on interface switching
EP3861433B1 (en) Upgrades based on analytics from multiple sources
CN112732693B (en) Intelligent internet of things data acquisition method, device, equipment and storage medium
CN116467711A (en) Data management and analysis method and system for incubator enterprise
CN108717438B (en) Chained data state acquisition system and method
CN111314326A (en) Method, device, equipment and medium for confirming HTTP vulnerability scanning host
JP2004326480A (en) Distributed parallel analysis method of mass data
CN112749197B (en) Data fragment refreshing method, device, equipment and storage medium
CN115396159A (en) Container mirror image detection method, client and server
CN114168610A (en) Distributed storage and query method and system based on line sequence division
CN111368294B (en) Virus file identification method and device, storage medium and electronic device
CN112686029A (en) SQL new sentence identification method and device for database audit system
CN111130921A (en) Method and device for processing performance index of core network element
Rump et al. Distributed and collaborative malware analysis with MASS
WO2019215735A1 (en) Network data clustering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination