CN109697346A - A kind of government affairs file management system based on big data - Google Patents

A kind of government affairs file management system based on big data Download PDF

Info

Publication number
CN109697346A
CN109697346A CN201811446085.0A CN201811446085A CN109697346A CN 109697346 A CN109697346 A CN 109697346A CN 201811446085 A CN201811446085 A CN 201811446085A CN 109697346 A CN109697346 A CN 109697346A
Authority
CN
China
Prior art keywords
file
module
signal
library
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811446085.0A
Other languages
Chinese (zh)
Other versions
CN109697346B (en
Inventor
郭亚光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Internet Think Tank Data Technology Co ltd
Original Assignee
Hefei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei University of Technology filed Critical Hefei University of Technology
Priority to CN201811446085.0A priority Critical patent/CN109697346B/en
Publication of CN109697346A publication Critical patent/CN109697346A/en
Application granted granted Critical
Publication of CN109697346B publication Critical patent/CN109697346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The government affairs file management system based on big data that the invention discloses a kind of, including data acquisition module, memory module, identification module, uploading module, data analysis module, controller, mark module, backup module and data interconnection module;The present invention carries out analysis operation by data analysis module come the file consulted user and downloaded, and getting Wi, E, after Ri and T, it is greater than E when meeting Wi, and Ri be less than T when, it then generates priority signal and is transmitted separately to mark module and backup module via controller, mark module is after receiving priority signal, file corresponding with priority signal is identified with red font, so that the common file of government staff is more eye-catching, conducive to subsequent access and downloading, and backup module is after receiving priority signal, file corresponding with priority signal is backed up, in order to avoid the common file of government staff is lost and is impacted to work.

Description

A kind of government affairs file management system based on big data
Technical field
The present invention relates to government affairs art file management technology field, specially a kind of government affairs file management system based on big data System.
Background technique
In recent years, the management of government affairs file is increasingly by the attention of government official.By constructing unified and standard political affairs Business file management system to the various decisions of government official disclose or is protected, and is the important way of reinforcement government affairs file management One of diameter.
But in existing government affairs file management system, it is difficult to the common file of government staff is judged, and Mark backup, and then when common file is lost, easily government work is impacted;Existing government affairs file management system simultaneously System, can not determine the file that the common people often pay close attention to, and encryption identification, and then make it difficult for government staff real Recognize the demand direction of the common people;And in the renewal process of government affairs file, it is difficult to which a kind of effective mode, Lai Tigao political affairs are provided Mansion auditor updates the inspection efficiency of quality to file.
In order to solve drawbacks described above, a kind of technical solution is now provided.
Summary of the invention
The government affairs file management system based on big data that the purpose of the present invention is to provide a kind of.
The technical problems to be solved by the invention are as follows:
(1) how the common file of government staff judged, and identifies backup, with improve search efficiency and File is avoided to lose;
(2) how a kind of effective mode is provided, to determine the file that the common people often pay close attention to, and encryption identification, To allow government staff really to recognize the demand direction of the common people;
(3) a kind of effective mode how is provided, Lai Tigao government audit personnel update the inspection efficiency of quality to file.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of government affairs file management system based on big data, including data acquisition module, memory module, identification module, Uploading module, data analysis module, controller, mark module, backup module and data interconnection module;
The data acquisition module is used to acquire the fingerprint of user, and the fingerprint that the data acquisition module is used to acquire passes Transport to identification module;The memory module is used to store the fingerprint of the preparatory typing of user, and is conducted into fingerprint base and is transmitted to knowledge Other module;After the fingerprint that the identification module transmits in receiving data acquisition module, by its with transmit in memory module Fingerprint in fingerprint base when consistent fingerprint is arrived in comparison, then generates compared to pair and trusts signal and be transmitted separately to uploading module And data analysis module, and assert that the user is government staff at this time;The uploading module is in receiving identification module When the trust signal of transmission, then the user is allowed to upload encryption file and ordinary file, the uploading module is used for user The encryption file and ordinary file of biography are transmitted separately to data analysis module;The data analysis module is for receiving uploading module The encryption file and ordinary file of middle transmission, and typing is distinguished to encryption library and ordinary file library, the data point When the trust signal that analysis module is transmitted in receiving identification module, then the user is allowed to consult and downloading encryption library and general File in logical library, the file that the data analysis module is also used to consult the user and download carry out analysis operation, Specific step is as follows:
Step 1: getting in first time period, and each file is marked in the total degree consulted and downloaded daily It is denoted as Qij, i=1...n, j=1...m, and as i=1, Q1j indicates in first time period that first file is in quilt daily The total degree consulted and downloaded, and same file is both consulted when being downloaded, then its total degree is regarded as twice;
Step 2: first according to formulaIt acquires in first time period, each file is every Its average total degree consulted and downloaded, and Qij and Wi is corresponded, further according to formulaCome when acquiring first Between in section, each file is in the average total degree mean value consulted and downloaded daily;
Step 3: first according to formulaIt acquires in first time period, often A file the total degree consulted and downloaded daily dispersion degree, and Qij, Wi and Ri correspond, further according to formulaIt acquires in first time period, dispersion degree mean value of each file in the total degree consulted and downloaded daily;
The data analysis module is compared after getting Wi, E, Ri and T, by Wi with E, Ri and T respectively, is being met When Wi is greater than E and Ri less than T, then generates priority signal and be transmitted to controller, and in other situations, then it will not generate and appoint What signal is transmitted to controller;When the priority signal that the controller transmits in receiving data analysis module, will preferentially it believe Number it is transmitted separately to mark module and backup module;The mark module is used to receive the priority signal transmitted in controller, and File corresponding with priority signal is identified with red font, so that common file is more eye-catching, is convenient for government's work Make the access and downloading of personnel;The backup module is used to receive the priority signal transmitted in controller, and will be with priority signal Corresponding file is backed up, in case common file is lost and is impacted to work;
After the fingerprint that the identification module transmits in receiving data acquisition module, by its with transmit in memory module Fingerprint in fingerprint base is compared to pair, when not comparing consistent fingerprint, then generates and suspects signal and be transmitted to data analysis module, And assert that the user is the common people at this time;The data analysis module transmitted in receiving identification module when suspecting signal, then The user is allowed to consult the file in ordinary file library, the data analysis module is also used to carry out the file that the user consults Analysis operation, the specific steps are as follows:
Step 1: getting in second time period, the total degree that each file is consulted, and is demarcated as Yi, i= 1...n;
Step 2: first according to formulaIt acquires in second time period, each file consulted Average total degree, and Yi and Ui are corresponded, further according to formulaIt acquires in second time period, each file quilt The average total degree mean value consulted;
Step 3: according to formulaIt acquires in second time period, what each file was consulted The mean range coefficient of total degree;
The data analysis module is compared after getting Ui, I, Yi and O, by Ui with I, Yi and O respectively, is being met When Ui is greater than I and Yi and is greater than O, then generate coded signal and will file typing corresponding with coded signal to encrypting file Library, and the coded signal generated is also transmitted to controller, and in other situations, then it will not generate any signal and be transmitted to control Device;When the coded signal that the controller transmits in receiving data analysis module, mark module can be transmitted it to;It is described Mark module for receiving the coded signal transmitted in controller, and will file blue font corresponding with coded signal into Line identifier, the file convenient for often paying close attention to the common people in ordinary file library carry out encryption identification, are conducive to government staff in the future Check, to allow government staff really to recognize the demand direction of the common people;
The data analysis module is distinguished for receiving the encryption file and ordinary file transmitted in uploading module Typing is to encryption library and ordinary file library, the trust signal that the data analysis module transmits in receiving identification module When, also allow the user to encryption library and ordinary file library in file be updated, and in file word, symbol and What the date modified regards as updating operation, and the data analysis module is also used to divide the file that the user updates Analysis operation, the specific steps are as follows:
Step 1: getting in the third period, the update total degree of each file, and is demarcated as Pi, i= 1...n, and according to formulaIt acquires in the third period, the average update total degree of each file;
Step 2: getting in the third period, the update total number of word of each file, and is demarcated as Si, i= 1...n, Pi and Si is corresponded, and according to formulaIt acquires in the third period, the average update of each file Total number of word;
Step 3: first according to formulaIt acquires in the third period, the update system of each file Number, Pi, Si and Fi are corresponded, further according to formulaIt acquires in the third period, the update coefficient of each file Mean value;
Wherein, each file in the third period upon each update, and when generating new file, with each file Initial subject title is named, at the same import update library in stored, the data analysis module get Pi, A, after Si, D, Fi and G, first Pi is compared respectively with A, Si and D, and meet Pi greater than A, Si be greater than D when, then by Fi with G is compared, and when Fi is greater than G, then generates dual audit signal, when Fi is less than or equal to G, then generates normal review signal, And meet Pi less than or equal to A, Si be less than or equal to D when, then generate selective examination audit signal, while will update library in it is dual Respectively in corresponding file, the two subject name is identical all for audit signal, normal review signal and selective examination audit signal File export is updated, and via controller is transmitted to data interconnection module;The data interconnection module with dual audit for that will believe Number, all update files of the respective corresponding file of normal review signal and selective examination audit signal be shown in government audit personnel's It in mobile phone, is communicated to connect between the data interconnection module and the mobile phone of government audit personnel, convenient for government audit personnel to not File update quality with the degree of update is checked, and with different levels test mode, while guaranteeing to audit effect significantly Improve working efficiency.
Further, the first time period, second time period and third period are defined as first day of last month Interval time to the last day of last month.
Further, the fingerprint base is set in advance in identification module, the update library, encryption library and general Logical library is set in advance in data analysis module.
Beneficial effects of the present invention:
1. identification module by the fingerprint of acquisition compared with the fingerprint in fingerprint base pair, when comparing to consistent fingerprint, then Generate and trust signal and be simultaneously transmitted separately to uploading module and data analysis module, and uploading module receive trust signal when, The user can be allowed to upload encryption file and ordinary file, and transmit it to data analysis module, data analysis module is connecing After receiving encryption file and ordinary file, it can be distinguished in typing to the encryption library of itself and ordinary file library, and number According to analysis module when receiving trust signal, the user can be allowed to consult and download self-encryption library and ordinary file library In file, while the file consulted the user and downloaded also be carried out analysis operation by data analysis module, and got After Wi, E, Ri and T, when meet Wi greater than E and Ri be less than T when, then generate priority signal and be transmitted to controller, controller exists When receiving the priority signal transmitted in data analysis module, priority signal is transmitted separately to mark module and backup module, File corresponding with priority signal can be identified by mark module after receiving priority signal with red font, so that The common file of government staff is more eye-catching, and convenient for the access and downloading of government staff, and backup module is receiving To after priority signal, file corresponding with priority signal can be backed up, in case the common file of government staff is lost It loses and work is impacted, greatly improve search efficiency while having ensured active file safety;
2. identification module by the fingerprint of acquisition compared with the fingerprint in fingerprint base pair, when not comparing consistent fingerprint, Then generate and suspect signal and be transmitted to data analysis module, data analysis module receive suspect signal when, the user can be allowed The file in itself ordinary file library is consulted, while the file consulted the user is also carried out analysis behaviour by data analysis module Make, and after getting Ui, I, Yi and O, when meeting Ui and being greater than O greater than I and Yi, then generate coded signal and will with add The corresponding file typing of secret letter number is to encrypting library, and the coded signal generated is also transmitted to controller, and controller is connecing When receiving the coded signal transmitted in data analysis module, mark module can be transmitted it to, mark module is receiving encryption After signal, file corresponding with coded signal can be identified with blue font, convenient for being passed through to the common people in ordinary file library The file often paid close attention to carries out encryption identification, conducive to government staff's checking in the future, to make government staff real Solve the demand direction of the common people;
3. when the trust signal that data analysis module transmits in receiving identification module, also allowing the user to encryption text File in part library and ordinary file library is updated, and to regarding as of modifying of word, symbol and the date in file Update operation, while data analysis module is also used to carry out analysis operation to the file that the user updates, and get Pi, A, After Si, D, Fi and G, when meeting Pi and being greater than D greater than A, Si, then Fi is compared with G, when Fi is greater than G, is then generated dual Signal is audited, when Fi is less than or equal to G, then generates normal review signal, and is less than or equal to D less than or equal to A, Si when meeting Pi When, then selective examination audit signal is generated, while will update in library and audit with dual audit signal, normal review signal and selective examination Signal is respectively in corresponding file, and the identical all update files of the two subject name export, and via controller is transmitted to number According to interconnection module, data interconnection module can will audit signal with dual audit signal, normal review signal and selective examination, and respectively institute is right Answer all update files of file to be shown in the mobile phone of auditor, convenient for auditor to the file of different update degree more New quality is checked, and with different levels test mode, is guaranteeing to greatly improve working efficiency while auditing effect.
Detailed description of the invention
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is system block diagram of the invention.
Specific embodiment
As shown in Figure 1, a kind of government affairs file management system based on big data, including data acquisition module, memory module, Identification module, uploading module, data analysis module, controller, mark module, backup module and data interconnection module;
The data acquisition module is used to acquire the fingerprint of user, and the fingerprint that the data acquisition module is used to acquire passes Transport to identification module;The memory module is used to store the fingerprint of the preparatory typing of user, and is conducted into fingerprint base and is transmitted to knowledge Other module;After the fingerprint that the identification module transmits in receiving data acquisition module, by its with transmit in memory module Fingerprint in fingerprint base when consistent fingerprint is arrived in comparison, then generates compared to pair and trusts signal and be transmitted separately to uploading module And data analysis module, and assert that the user is government staff at this time;The uploading module is in receiving identification module When the trust signal of transmission, then the user is allowed to upload encryption file and ordinary file, the uploading module is used for user The encryption file and ordinary file of biography are transmitted separately to data analysis module;The data analysis module is for receiving uploading module The encryption file and ordinary file of middle transmission, and typing is distinguished to encryption library and ordinary file library, the data point When the trust signal that analysis module is transmitted in receiving identification module, then the user is allowed to consult and downloading encryption library and general File in logical library, the file that the data analysis module is also used to consult the user and download carry out analysis operation, Specific step is as follows:
Step 1: getting in first time period, and each file is marked in the total degree consulted and downloaded daily It is denoted as Qij, i=1...n, j=1...m, and as i=1, Q1j indicates in first time period that first file is in quilt daily The total degree consulted and downloaded, and same file is both consulted when being downloaded, then its total degree is regarded as twice;
Step 2: first according to formulaIt acquires in first time period, each file is every Its average total degree consulted and downloaded, and Qij and Wi is corresponded, further according to formulaCome when acquiring first Between in section, each file is in the average total degree mean value consulted and downloaded daily;
Step 3: first according to formulaIt acquires in first time period, often A file the total degree consulted and downloaded daily dispersion degree, and Qij, Wi and Ri correspond, further according to formulaIt acquires in first time period, dispersion degree mean value of each file in the total degree consulted and downloaded daily;
The data analysis module is compared after getting Wi, E, Ri and T, by Wi with E, Ri and T respectively, is being met When Wi is greater than E and Ri less than T, then generates priority signal and be transmitted to controller, and in other situations, then it will not generate and appoint What signal is transmitted to controller;When the priority signal that the controller transmits in receiving data analysis module, will preferentially it believe Number it is transmitted separately to mark module and backup module;The mark module is used to receive the priority signal transmitted in controller, and File corresponding with priority signal is identified with red font, so that common file is more eye-catching, is convenient for government's work Make the access and downloading of personnel;The backup module is used to receive the priority signal transmitted in controller, and will be with priority signal Corresponding file is backed up, in case common file is lost and is impacted to work;
After the fingerprint that the identification module transmits in receiving data acquisition module, by its with transmit in memory module Fingerprint in fingerprint base is compared to pair, when not comparing consistent fingerprint, then generates and suspects signal and be transmitted to data analysis module, And assert that the user is the common people at this time;The data analysis module transmitted in receiving identification module when suspecting signal, then The user is allowed to consult the file in ordinary file library, the data analysis module is also used to carry out the file that the user consults Analysis operation, the specific steps are as follows:
Step 1: getting in second time period, the total degree that each file is consulted, and is demarcated as Yi, i= 1...n;
Step 2: first according to formulaIt acquires in second time period, each file consulted Average total degree, and Yi and Ui are corresponded, further according to formulaIt acquires in second time period, each file quilt The average total degree mean value consulted;
Step 3: according to formulaIt acquires in second time period, what each file was consulted The mean range coefficient of total degree;
The data analysis module is compared after getting Ui, I, Yi and O, by Ui with I, Yi and O respectively, is being met When Ui is greater than I and Yi and is greater than O, then generate coded signal and will file typing corresponding with coded signal to encrypting file Library, and the coded signal generated is also transmitted to controller, and in other situations, then it will not generate any signal and be transmitted to control Device;When the coded signal that the controller transmits in receiving data analysis module, mark module can be transmitted it to;It is described Mark module for receiving the coded signal transmitted in controller, and will file blue font corresponding with coded signal into Line identifier, the file convenient for often paying close attention to the common people in ordinary file library carry out encryption identification, are conducive to government staff in the future Check, to allow government staff really to recognize the demand direction of the common people;
The data analysis module is distinguished for receiving the encryption file and ordinary file transmitted in uploading module Typing is to encryption library and ordinary file library, the trust signal that the data analysis module transmits in receiving identification module When, also allow the user to encryption library and ordinary file library in file be updated, and in file word, symbol and What the date modified regards as updating operation, and the data analysis module is also used to divide the file that the user updates Analysis operation, the specific steps are as follows:
Step 1: getting in the third period, the update total degree of each file, and is demarcated as Pi, i= 1...n, and according to formulaIt acquires in the third period, the average update total degree of each file;
Step 2: getting in the third period, the update total number of word of each file, and is demarcated as Si, i= 1...n, Pi and Si is corresponded, and according to formulaIt acquires in the third period, the average update of each file Total number of word;
Step 3: first according to formulaIt acquires in the third period, the update system of each file Number, Pi, Si and Fi are corresponded, further according to formulaIt acquires in the third period, the update coefficient of each file Mean value;
Wherein, each file in the third period upon each update, and when generating new file, with each file Initial subject title is named, at the same import update library in stored, the data analysis module get Pi, A, after Si, D, Fi and G, first Pi is compared respectively with A, Si and D, and meet Pi greater than A, Si be greater than D when, then by Fi with G is compared, and when Fi is greater than G, then generates dual audit signal, when Fi is less than or equal to G, then generates normal review signal, And meet Pi less than or equal to A, Si be less than or equal to D when, then generate selective examination audit signal, while will update library in it is dual Respectively in corresponding file, the two subject name is identical all for audit signal, normal review signal and selective examination audit signal File export is updated, and via controller is transmitted to data interconnection module;The data interconnection module with dual audit for that will believe Number, all update files of the respective corresponding file of normal review signal and selective examination audit signal be shown in government audit personnel's It in mobile phone, is communicated to connect between the data interconnection module and the mobile phone of government audit personnel, convenient for government audit personnel to not File update quality with the degree of update is checked, and with different levels test mode, while guaranteeing to audit effect significantly Improve working efficiency.
Further, the first time period, second time period and third period are defined as first day of last month Interval time to the last day of last month.
Further, the fingerprint base is set in advance in identification module, the update library, encryption library and general Logical library is set in advance in data analysis module.
A kind of government affairs file management system based on big data, during the work time, by data acquisition module come to The fingerprint at family is acquired, and is transmitted to identification module, and memory module is used to be stored in the fingerprint of the preparatory typing of user, and by its It imports and is transmitted to identification module in the fingerprint base of itself together, identification module is by the fingerprint in the fingerprint and fingerprint base of acquisition later Compared to pair, when consistent fingerprint is arrived in comparison, then generates trust signal and is transmitted separately to uploading module and data analysis module, And uploading module can allow the user to upload encryption file and ordinary file when receiving trust signal, and transmit it to Data analysis module, data analysis module receive encryption file and ordinary file after, can be distinguished typing to itself Encrypt in library and ordinary file library, and data analysis module receive trust signal when, can allow the user consult and The file in self-encryption library and ordinary file library is downloaded, while data analysis module will also be consulted and be downloaded to the user File carry out analysis operation, and after getting Wi, E, Ri and T, when meeting Wi and being less than T greater than E and Ri, then generate Priority signal is transmitted to controller, and in other situations, then it will not generate any signal and be transmitted to controller, controller is connecing When receiving the priority signal transmitted in data analysis module, priority signal is transmitted separately to mark module and backup module, is marked Remember that file corresponding with priority signal after receiving priority signal, can be identified, so that political affairs by module with red font The common file of mansion staff is more eye-catching, and convenient for the access and downloading of government staff, and backup module is receiving After priority signal, file corresponding with priority signal can be backed up, in case the common file of government staff is lost And work is impacted, search efficiency is greatly improved while having ensured active file safety;
And identification module by the fingerprint of acquisition compared with the fingerprint in fingerprint base pair, when not comparing consistent fingerprint, Then generate and suspect signal and be transmitted to data analysis module, data analysis module receive suspect signal when, the user can be allowed The file in itself ordinary file library is consulted, while the file consulted the user is also carried out analysis behaviour by data analysis module Make, and after getting Ui, I, Yi and O, when meeting Ui and being greater than O greater than I and Yi, then generate coded signal and will with add The corresponding file typing of secret letter number is to encrypting library, and the coded signal generated is also transmitted to controller, and in other feelings When condition, then it will not generate any signal and be transmitted to controller, the encryption letter that controller transmits in receiving data analysis module Number when, mark module can be transmitted it to, mark module, can will text corresponding with coded signal after receiving coded signal Part is identified with blue font, and the file convenient for often paying close attention to the common people in ordinary file library carries out encryption identification, is conducive to political affairs Mansion staff checking in the future, to allow government staff really to recognize the demand direction of the common people;
And data analysis module transmitted in receiving identification module trust signal when, also allow the user to encryption text File in part library and ordinary file library is updated, and to regarding as of modifying of word, symbol and the date in file Update operation, while data analysis module is also used to carry out analysis operation to the file that the user updates, and get Pi, A, After Si, D, Fi and G, when meeting Pi and being greater than D greater than A, Si, then Fi is compared with G, when Fi is greater than G, is then generated dual Signal is audited, when Fi is less than or equal to G, then generates normal review signal, and is less than or equal to D less than or equal to A, Si when meeting Pi When, then selective examination audit signal is generated, while will update in library and audit with dual audit signal, normal review signal and selective examination Signal is respectively in corresponding file, and the identical all update files of the two subject name export, and via controller is transmitted to number According to interconnection module, data interconnection module can will audit signal with dual audit signal, normal review signal and selective examination, and respectively institute is right Answer all update files of file to be shown in the mobile phone of auditor, convenient for auditor to the file of different update degree more New quality is checked, and with different levels test mode, is guaranteeing to greatly improve working efficiency while auditing effect.
Beneficial effects of the present invention are as follows:
(1) identification module by the fingerprint of acquisition compared with the fingerprint in fingerprint base pair, when comparing to consistent fingerprint, then Generate and trust signal and be simultaneously transmitted separately to uploading module and data analysis module, and uploading module receive trust signal when, The user can be allowed to upload encryption file and ordinary file, and transmit it to data analysis module, data analysis module is connecing After receiving encryption file and ordinary file, it can be distinguished in typing to the encryption library of itself and ordinary file library, and number According to analysis module when receiving trust signal, the user can be allowed to consult and download self-encryption library and ordinary file library In file, while the file consulted the user and downloaded also be carried out analysis operation by data analysis module, and got After Wi, E, Ri and T, when meet Wi greater than E and Ri be less than T when, then generate priority signal and be transmitted to controller, controller exists When receiving the priority signal transmitted in data analysis module, priority signal is transmitted separately to mark module and backup module, File corresponding with priority signal can be identified by mark module after receiving priority signal with red font, so that The common file of government staff is more eye-catching, and convenient for the access and downloading of government staff, and backup module is receiving To after priority signal, file corresponding with priority signal can be backed up, in case the common file of government staff is lost It loses and work is impacted, greatly improve search efficiency while having ensured active file safety;
(2) identification module by the fingerprint of acquisition compared with the fingerprint in fingerprint base pair, when not comparing consistent fingerprint, Then generate and suspect signal and be transmitted to data analysis module, data analysis module receive suspect signal when, the user can be allowed The file in itself ordinary file library is consulted, while the file consulted the user is also carried out analysis behaviour by data analysis module Make, and after getting Ui, I, Yi and O, when meeting Ui and being greater than O greater than I and Yi, then generate coded signal and will with add The corresponding file typing of secret letter number is to encrypting library, and the coded signal generated is also transmitted to controller, and controller is connecing When receiving the coded signal transmitted in data analysis module, mark module can be transmitted it to, mark module is receiving encryption After signal, file corresponding with coded signal can be identified with blue font, convenient for being passed through to the common people in ordinary file library The file often paid close attention to carries out encryption identification, conducive to government staff's checking in the future, to make government staff real Solve the demand direction of the common people;
(3) when the trust signal that data analysis module transmits in receiving identification module, also allow the user to encryption File in library and ordinary file library is updated, and the identification modified to word, symbol and the date in file To update operation, while data analysis module is also used to carry out analysis operation to the file that the user updates, and get Pi, A, after Si, D, Fi and G, when meeting Pi and being greater than D greater than A, Si, then Fi is compared with G, when Fi is greater than G, then generated pair Nuclear signal is reheard, when Fi is less than or equal to G, then generates normal review signal, and is less than or equal to D less than or equal to A, Si when meeting Pi When, then selective examination audit signal is generated, while will update in library and audit with dual audit signal, normal review signal and selective examination Signal is respectively in corresponding file, and the identical all update files of the two subject name export, and via controller is transmitted to number According to interconnection module, data interconnection module can will audit signal with dual audit signal, normal review signal and selective examination, and respectively institute is right Answer all update files of file to be shown in the mobile phone of auditor, convenient for auditor to the file of different update degree more New quality is checked, and with different levels test mode, is guaranteeing to greatly improve working efficiency while auditing effect.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.

Claims (3)

1. a kind of government affairs file management system based on big data, which is characterized in that including data acquisition module, memory module, Identification module, uploading module, data analysis module, controller, mark module, backup module and data interconnection module;
The data acquisition module is used to acquire the fingerprint of user, and the data acquisition module is for the fingerprint of acquisition to be transmitted to Identification module;The memory module is used to store the fingerprint of the preparatory typing of user, and is conducted into fingerprint base and is transmitted to identification mould Block;After the fingerprint that the identification module transmits in receiving data acquisition module, by itself and the fingerprint that is transmitted in memory module Fingerprint in library when consistent fingerprint is arrived in comparison, then generates compared to pair and trusts signal and be transmitted separately to uploading module sum number According to analysis module, and assert that the user is government staff at this time;The uploading module is transmitted in receiving identification module Trust signal when, then allow the user to upload encryption file and ordinary file, what the uploading module was used to upload user Encryption file and ordinary file are transmitted separately to data analysis module;The data analysis module is passed for receiving in uploading module Defeated encryption file and ordinary file, and typing is distinguished to encryption library and ordinary file library, the data analyze mould When the trust signal that block transmits in receiving identification module, then the user is allowed to consult and download encryption library and common text File in part library, the file that the data analysis module is also used to consult the user and download carry out analysis operation, specifically Steps are as follows:
Step 1: getting in first time period, and each file is marked as in the total degree consulted and downloaded daily Qij, i=1...n, j=1...m;
Step 2: first according to formulaIt acquires in first time period, each file is in quilt daily The average total degree consulted and downloaded, and Qij and Wi is corresponded, further according to formulaTo acquire first time period Interior, each file is in the average total degree mean value consulted and downloaded daily;
Step 3: first according to formulaIt acquires in first time period, Mei Gewen Part the total degree consulted and downloaded daily dispersion degree, and Qij, Wi and Ri correspond, further according to formulaIt acquires in first time period, dispersion degree mean value of each file in the total degree consulted and downloaded daily;
The data analysis module is compared after getting Wi, E, Ri and T, by Wi with E, Ri and T respectively, big meeting Wi When E and Ri is less than T, then generates priority signal and be transmitted to controller;The controller is in receiving data analysis module When the priority signal of transmission, priority signal is transmitted separately to mark module and backup module;The mark module is for receiving The priority signal transmitted in controller, and file corresponding with priority signal is identified with red font;The backup Module backs up file corresponding with priority signal for receiving the priority signal transmitted in controller;
After the fingerprint that the identification module transmits in receiving data acquisition module, by itself and the fingerprint that is transmitted in memory module Fingerprint in library is compared to pair, when not comparing consistent fingerprint, then generates and suspects signal and be transmitted to data analysis module, and this When assert the user be the common people;The data analysis module transmitted in receiving identification module when suspecting signal, then allow The user consults the file in ordinary file library, and the data analysis module is also used to analyze the file that the user consults Operation, the specific steps are as follows:
Step 1: getting in second time period, the total degree that each file is consulted, and is demarcated as Yi, i=1...n;
Step 2: first according to formulaIt acquires in second time period, each file is consulted flat Equal total degree, and Yi and Ui is corresponded, further according to formulaIt acquires in second time period, each file consulted Average total degree mean value;
Step 3: according to formulaIt acquires in second time period, consulted total time of each file Several mean range coefficients;
The data analysis module is compared after getting Ui, I, Yi and O, by Ui with I, Yi and O respectively, big meeting Ui When I and Yi is greater than O, then generate coded signal and will file typing corresponding with coded signal to encrypting library, and The coded signal of generation is also transmitted to controller;The coded signal that the controller transmits in receiving data analysis module When, mark module can be transmitted it to;The mark module is used to receive the coded signal transmitted in controller, and will be with encryption The corresponding file of signal is identified with blue font;
The data analysis module is distinguished typing for receiving the encryption file and ordinary file transmitted in uploading module To encryption library and ordinary file library, when the trust signal that the data analysis module transmits in receiving identification module, The user is also allowed to be updated the file in encryption library and ordinary file library, and to word, symbol and the day in file What the phase modified regards as updating operation, and the data analysis module is also used to analyze the file that the user updates Operation, the specific steps are as follows:
Step 1: getting in the third period, the update total degree of each file, and is demarcated as Pi, i=1...n, and According to formulaIt acquires in the third period, the average update total degree of each file;
Step 2: getting in the third period, the update total number of word of each file, and is demarcated as Si, i=1...n, Pi It is corresponded with Si, and according to formulaIt acquires in the third period, the average update total number of word of each file;
Step 3: first according to formulaIt acquires in the third period, the update coefficient of each file, Pi, Si and Fi are corresponded, further according to formulaIt acquires in the third period, the update coefficient of each file is equal Value;
Wherein, each file in the third period upon each update, and when generating new file, with the initial of each file Subject name is named, at the same import update library in stored, the data analysis module get Pi, A, After Si, D, Fi and G, first Pi is compared respectively with A, Si and D, and when meeting Pi and being greater than D greater than A, Si, then by Fi and G It is compared, when Fi is greater than G, then generates dual audit signal, when Fi is less than or equal to G, then generate normal review signal, and Meet Pi less than or equal to A, Si be less than or equal to D when, then generate selective examination audit signal, while will update library in it is dual examine Nuclear signal, normal review signal and selective examination audit signal be respectively in corresponding file, the two subject name it is identical it is all more New file export, and via controller is transmitted to data interconnection module;The data interconnection module for will with dual audit signal, All update files of the respective corresponding file of normal review signal and selective examination audit signal are shown in the hand of government audit personnel In machine, communicated to connect between the data interconnection module and the mobile phone of government audit personnel.
2. a kind of government affairs file management system based on big data according to claim 1, which is characterized in that described first Period, second time period and third period are defined as first day of last month between the last day of last month Every the time.
3. a kind of government affairs file management system based on big data according to claim 1, which is characterized in that the fingerprint Library is set in advance in identification module, and the update library, encryption library and ordinary file library are set in advance in data In analysis module.
CN201811446085.0A 2018-11-29 2018-11-29 Government affair file management system based on big data Active CN109697346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811446085.0A CN109697346B (en) 2018-11-29 2018-11-29 Government affair file management system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811446085.0A CN109697346B (en) 2018-11-29 2018-11-29 Government affair file management system based on big data

Publications (2)

Publication Number Publication Date
CN109697346A true CN109697346A (en) 2019-04-30
CN109697346B CN109697346B (en) 2021-03-23

Family

ID=66230243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811446085.0A Active CN109697346B (en) 2018-11-29 2018-11-29 Government affair file management system based on big data

Country Status (1)

Country Link
CN (1) CN109697346B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1609827A (en) * 2003-10-25 2005-04-27 鸿富锦精密工业(深圳)有限公司 Download times limiting system and method
CN102968600A (en) * 2012-10-30 2013-03-13 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation
US20130254552A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
CN104715168A (en) * 2015-02-13 2015-06-17 陈佳阳 File security control and trace method and system based on digital fingerprints
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for on-line adding of instant file dynamic label and on-line encryption
CN106302709A (en) * 2016-08-12 2017-01-04 杭州东信北邮信息技术有限公司 A kind of method and system of network file management

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1609827A (en) * 2003-10-25 2005-04-27 鸿富锦精密工业(深圳)有限公司 Download times limiting system and method
US20130254552A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
CN102968600A (en) * 2012-10-30 2013-03-13 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for on-line adding of instant file dynamic label and on-line encryption
CN104715168A (en) * 2015-02-13 2015-06-17 陈佳阳 File security control and trace method and system based on digital fingerprints
CN106302709A (en) * 2016-08-12 2017-01-04 杭州东信北邮信息技术有限公司 A kind of method and system of network file management

Also Published As

Publication number Publication date
CN109697346B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
US11790097B1 (en) Systems and methods to track, store, and manage events, rights, and liabilities
US9864868B2 (en) Method and apparatus for process enforced configuration management
CN106874461B (en) A kind of workflow engine supports multi-data source configuration security access system and method
CN110957025A (en) Medical health information safety management system
CN109831327A (en) IMS full service network based on big data analysis monitors intelligent operation support system
CN106254462A (en) Method, server and the system of a kind of remote assistance realizing mobile terminal
CN101473628A (en) Systems and methods for accelerating delivery of a computing environment to remote user
CN109684854B (en) Bottom data encryption method suitable for enterprise management information system
CN109347625A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
WO2019193820A1 (en) Information processing device, information processing method, and program
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
DE112019003304T5 (en) DATA PROCESSING SYSTEM, DATA PROCESSING METHODS AND DATA PROCESSING DEVICE
CN112837194A (en) Intelligent system
CN109697346A (en) A kind of government affairs file management system based on big data
CN112069529A (en) Block chain-based volume management method and device, computer and storage medium
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
DE102016215630A1 (en) Communication system for proving a driving license
CN110138792A (en) A kind of public health geodata goes privacy processing method and system
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet
US20220414261A1 (en) Masking sensitive data for logging
US20070271229A1 (en) System and method for data searching among multiple enterprise applications
CN106131224A (en) A kind of data transmission system
EP1306820B1 (en) Document signature
CN112632014A (en) Private data sharing method based on block chain and private security calculation
CN113608933B (en) Distributed backup synchronization system for public cloud tenant service sensitive data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230726

Address after: 1212-1221 1223-1228, Building B, Jinzuo, Tuoji City Plaza, No. 687, Changjiang West Road, High tech Zone, Hefei, Anhui Province, 230000

Patentee after: Anhui internet think tank Data Technology Co.,Ltd.

Address before: 230000 Tunxi Road, Baohe District, Hefei, Anhui Province, No. 193

Patentee before: Hefei University of Technology