CN110557361B - Method and system for dynamically managing overall process cost - Google Patents

Method and system for dynamically managing overall process cost Download PDF

Info

Publication number
CN110557361B
CN110557361B CN201910194517.1A CN201910194517A CN110557361B CN 110557361 B CN110557361 B CN 110557361B CN 201910194517 A CN201910194517 A CN 201910194517A CN 110557361 B CN110557361 B CN 110557361B
Authority
CN
China
Prior art keywords
network
local
cost
user terminal
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910194517.1A
Other languages
Chinese (zh)
Other versions
CN110557361A (en
Inventor
赵芳静
涂君
曾俊平
邱卫民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fenghoda Project Management Co ltd
Original Assignee
Shenzhen Fenghoda Project Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fenghoda Project Management Co ltd filed Critical Shenzhen Fenghoda Project Management Co ltd
Priority to CN201910194517.1A priority Critical patent/CN110557361B/en
Publication of CN110557361A publication Critical patent/CN110557361A/en
Application granted granted Critical
Publication of CN110557361B publication Critical patent/CN110557361B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06312Adjustment or analysis of established resource schedule, e.g. resource or task levelling, or dynamic rescheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/08Construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a whole-process construction cost dynamic management method and a system, belonging to the technical field of construction cost, and the technical scheme has the key points that the dynamic management method comprises the steps of local encryption, decomposition retrieval, encryption transmission, decryption integration, data refreshing and the like; the dynamic management system comprises a user terminal, a local server and a plurality of network servers, wherein the local server comprises a local processor and a local memory, and the network servers comprise a network processor and a network memory; the local server is used for locally encrypting and decrypting the local encryption and synthesizing the cost update table and refreshing the cost list of the user terminal; the network server is used for performing dispersed retrieval on the project names and encrypting the process; the problems that in the existing method and system, information in a cloud server is easy to leak data due to network intrusion, and the information security is low are solved; the security of the cost data can be improved when updating the item prices of the cost list of the user terminal.

Description

Method and system for dynamically managing overall process cost
Technical Field
The invention relates to the technical field of construction cost, in particular to a method and a system for dynamically managing the total construction cost
Background
The project cost refers to the project price, namely the price of the building installation project and the total price of the construction project which are predicted or actually formed in the markets of land, equipment, technical labor, contract and the like through the trading modes of bidding, bidding and the like. The construction cost needs to be estimated and evaluated for many times, the actual land, equipment, technical labor and the price on the contract are changed continuously, and the estimation and the evaluation of the cost engineer are influenced to a certain extent.
The Chinese patent application publication No. CN106530143A discloses a whole-process cost dynamic management method and a whole-process cost dynamic management system, wherein the whole-process cost dynamic management method comprises the following steps: the method comprises the steps that a cloud server obtains a real-time updating list and reads a cost list stored in the cloud server, wherein item names and item prices are stored in the updating list and the cost list; if the updated list and the cost list have the same item name, updating the item price of the cost list; if the item prices of the cost list are updated, the updated cost list is stored in a cloud server; the whole-process manufacturing cost dynamic management system comprises a cloud server, wherein the cloud server comprises a processor and a memory, the memory of the cloud server is used for storing instructions, and the processor of the cloud server is used for calling the instructions stored in the memory to execute the following operations: the method comprises the steps that a cloud server obtains a real-time updating list and reads a cost list stored in the cloud server, wherein item names and item prices are stored in the updating list and the cost list; if the updated list and the cost list have the same item name, updating the item price of the cost list; wherein, the item price is updated to replace the item price of the cost list with the item price of the corresponding item name of the updated list; and if the item prices of the cost list are updated, storing the updated cost list in a cloud server.
In the above dynamic management method and system for the whole process, the cloud server obtains the real-time update list and reads the cost list stored in the cloud server, wherein the update list and the cost list both store the project name and the project price, so that a large amount of information of the project cost is stored in the cloud server; the cloud service can communicate with other terminal devices through a network, and further, data leakage is easily caused by network intrusion of information in the cloud server, adverse effects are further caused to engineering projects, and the safety of the information is low.
Disclosure of Invention
One of the objects of the present invention is to provide a whole-process construction cost dynamic management method capable of improving the safety of construction cost data when updating item prices of a construction cost list of a user terminal.
The above object of the present invention is achieved by the following technical solutions: a whole-process cost dynamic management method comprises the following steps:
step S1: local encryption, wherein the local server encrypts the project names in the cost list of the user terminal to form a plurality of encrypted retrieval data packets, and randomly sends the encrypted retrieval data packets to a plurality of different network servers;
step S2: decomposing and searching, wherein the plurality of network servers respectively decrypt the received encrypted searching data packets to obtain corresponding item names, and search the item prices corresponding to the item names in the network database according to the received item names;
step S3: encrypting and transmitting, wherein the network server generates a price grid list for the item price corresponding to the retrieved item name, and encrypts the price sub-list to generate an encrypted price data packet;
step S4: decrypting and integrating, wherein the network server sends the encrypted data packets to a local server, and the local server decrypts the encrypted data packets sent by the plurality of network servers to synthesize a cost updating table;
step S5: and data refreshing, wherein the local server compares the cost updating table with the item prices of the same item names in the cost list of the user terminal, and refreshes and covers the item prices in the cost list when the item prices in the cost updating table are different from the item prices in the cost list.
By adopting the technical scheme, the project names of the cost list are randomly distributed to the network servers, the network servers are used for retrieving the project prices of the project names received by the network servers, and the data are collected to the local server, so that the influence of the network servers when the data are leaked is reduced, and the transmitted data are encrypted in the data transmission process of the network servers and the local server, so that the data safety is further improved.
The invention is further configured to: the local server generates a password account book at regular time, sends the password account book to a plurality of network servers, and carries out coverage refreshing on the current password account book.
By adopting the technical scheme, the encryption and decryption modes are replaced by locally adopting a mode of positioning to generate the password account book, so that the security of encryption protection is improved.
The invention is further configured to: and the network server monitors illegal intrusion through a firewall, and empties the temporary data of the decrypted price sublist when intrusion behavior is detected.
By adopting the technical scheme, the illegal invasion is monitored through the firewall, and when the invasion behavior is detected, the decrypted temporary data of the price sublist is emptied, so that the phenomenon that when the network service is invaded, the unencrypted data of the network server in the process of flow processing is leaked, and the information is leaked is avoided.
The invention is further configured to: when the user terminal sends a connection request to the local server, the local server reads the item name in the cost list of the user terminal, otherwise, the user terminal and the local server are disconnected.
By adopting the technical scheme, when the user terminal sends a connection request to the local server, the local server reads the project name in the cost list of the user terminal, otherwise, the user terminal is disconnected with the local server user terminal, so that the user terminal is isolated from communication equipment such as the local server and the like when the cost list of the user terminal is not required to be refreshed, and the data security of the cost list in the user terminal is further ensured.
The invention is further configured to: the user terminal is connected and communicated with the local server through Bluetooth or NFC or a wireless network.
Through adopting above-mentioned technical scheme, user terminal passes through multiple modes such as bluetooth or NFC or wireless network and connects the communication with local server to the user can be according to the use habit and the use occasion of oneself to selecting communication connection mode, and the person of facilitating the use uses.
It is another object of the present invention to provide a full process cost dynamic management system,
the above object of the present invention is achieved by the following technical solutions: a whole-process cost dynamic management system comprises a user terminal, a local server and a plurality of network servers, wherein the local server comprises a local processor and a local memory, and the network servers comprise a network processor and a network memory;
the local processor reads the item names in the cost list of the user terminal, encrypts the item names in the cost list of the user terminal to form a plurality of encrypted retrieval data packets, and randomly sends the encrypted retrieval data packets to network memories of a plurality of different network servers;
the network processor decrypts the encrypted data packet in the network memory to generate item name information, and retrieves price information in a network database according to the item name information to generate a price sublist; the network processor encrypts the price grid list to generate an encrypted price data packet and sends the encrypted price data packet to a local memory;
the local processor decrypts the plurality of encrypted price data packets in the local memory to generate a synthesized cost update table; and the local processor compares the cost updating table with the item prices corresponding to the same item names in the cost list of the user terminal, and performs coverage refreshing on the item prices in the cost list.
By adopting the technical scheme, the project names are randomly distributed to the network servers through the local processor to be respectively retrieved, so that each network server receives and processes part of project name information, only local information leakage can be caused when the network server sends data leakage, the projects of the cost list cannot be analyzed, data encryption is carried out when the local server and the network servers carry out data transmission, the protection capability of the data is further improved, and the safety of the information is improved when the project prices of the cost list are inquired and updated.
The invention is further configured to: the local processor generates a password account book at regular time, stores the password in a local memory and sends the password account book to network memories of a plurality of network servers; and the new password account book carries out coverage refreshing on the current password account book.
By adopting the technical scheme, the encryption mode and the decryption mode are changed in the mode that the local processor generates the password account book at regular time, so that the possibility of encrypted data leakage caused by cracking of the encryption mode is reduced, and the data security is further improved.
The invention is further configured to: the network server also comprises a firewall, wherein the firewall monitors the reading state of the network memory, and when the firewall detects illegal invasion, the firewall empties the temporary data of the price sublist in the local memory.
By adopting the technical scheme, the illegal invasion is monitored through the firewall, and when the invasion behavior is detected, the decrypted temporary data of the price sublist is emptied, so that the phenomenon that when the network service is invaded, the unencrypted data of the network server in the process of flow processing is leaked, and the information is leaked is avoided.
In conclusion, the beneficial technical effects of the invention are as follows:
1. the project names of the cost list are randomly distributed to the network servers, the network servers are used for retrieving the project prices of the project names received by the network servers, and the data are gathered to the local server, so that the influence of the network servers when the data are leaked is reduced, and the transmitted data are encrypted in the data transmission process of the network servers and the local server, so that the safety of the data is further improved;
2. the encryption and decryption modes are changed by locally adopting a mode of positioning and generating a password account book, so that the security of encryption protection is improved, illegal invasion is monitored through a firewall, and when an invasion behavior is detected, temporary data of a decrypted price sublist is emptied, so that the leakage of information caused by leakage of unencrypted data in the process of processing the network server in the case that the network server is invaded is avoided;
3. when the user terminal sends a connection request to the local server, the local server reads the item name in the cost list of the user terminal, otherwise, the user terminal and the local server are disconnected, so that the user terminal is isolated from communication equipment such as the local server when the cost list of the user terminal does not need to be refreshed, and the data security of the cost list in the user terminal is further ensured.
Drawings
FIG. 1 is a flowchart of a dynamic management method of the total process cost in embodiment 1;
FIG. 2 is a block diagram showing the structure of a dynamic management system for the total cost in the whole process of embodiment 2;
FIG. 3 is a block diagram of a total process cost dynamic management system.
In the figure, 1, a user terminal; 2. a local server; 21. a local processor; 22. a local memory; 3. a network server; 31. a network processor; 32. a network memory; 33. a firewall.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Example 1: a dynamic management method for the whole process cost is disclosed, referring to FIG. 1, comprising the following steps:
step S1: and (4) local encryption. When the user refreshes the current cost list through the user terminal 1, the user terminal 1 is connected and communicated with the local server 2 through Bluetooth or NFC or a wireless network. When the user terminal 1 sends a connection request to the local server 2, the local server 2 reads the item name in the cost list of the user terminal 1, otherwise, the user terminal 1 and the local server 2 are disconnected with each other. The local server 2 reads the cost list of the user terminal 1, encrypts the item names in the cost list of the user terminal 1 to form a plurality of encrypted retrieval packets, and randomly transmits the encrypted retrieval packets to a plurality of different network servers 3.
Step S2: and (5) decomposing and searching. The local server 2 generates the password account book at regular time and sends the password account book to the plurality of network servers 3, and the current password account book is subjected to coverage refreshing. The plurality of network servers 3 decrypt the received encrypted retrieval data packet according to the current password account book to obtain the corresponding project name. The network server 3 retrieves the item price corresponding to the item name in the network database according to the received item name.
Step S3: and (5) encrypting transmission. The web server 3 creates a price grid list for the item price corresponding to the retrieved item name, and the created price sublist is temporarily stored in the web server 3. The network server 3 encrypts the price sublist according to the current password account book to generate an encrypted price data packet. The network server 3 monitors the illegal intrusion through the firewall 33, and when the intrusion behavior is detected, the temporary data of the decrypted price sublist is emptied, so that the possibility of data leakage of the unencrypted price sublist when the network server 3 is subjected to the illegal intrusion is reduced.
Step S4: and (6) decryption and integration. The network server 3 transmits the encrypted data packet to the local server 2, and the local server 2 decrypts the encrypted data packets transmitted from the plurality of network servers to synthesize a cost update table.
Step S5: and (3) data refreshing, wherein the local server 2 compares the cost updating table with the item prices of the same item names in the cost list of the user terminal 1, and when the item prices of the cost updating table are different from the item prices in the cost list, the local server 2 refreshes and covers the corresponding item prices in the cost list by the item price data in the current cost updating table.
Example 2: a whole-process cost dynamic management system, refer to FIG. 2, includes a user terminal 1, a local server 2 and a plurality of network servers 3. The local server 2 includes a local processor 21 and a local storage 22, and the network server 3 includes a network processor 31, a network storage 32, and a firewall 33. The user terminal 1 is a smart phone, a tablet computer, a notebook computer or other intelligent equipment with a communication function. The user terminal 1 stores the cost list, and then the cost information of the cost list is read through the user terminal 1. The user terminal 1 is provided with Bluetooth, NFC and wireless network communication modules, and then makes things convenient for the staff to select the communication mode according to the actual service condition. When the user terminal 1 sends a connection request to the local server 2, the local server 2 reads the item name in the cost list of the user terminal 1, otherwise, the user terminal 1 and the local server 2 are disconnected with each other.
Referring to fig. 2 and 3, when the user refreshes the cost list of the user terminal 1, the user terminal 1 sends a connection request to the local server 2, and a communication connection is established between the local server 2 and the user terminal 1. The local server 2 now sends a connection request to the network server 3, and the local server 2 establishes a wireless network connection with the network server 3. The local processor 21 periodically generates a password book, stores the password in the local memory 22 and transmits the password book to the network memories 32 of the plurality of network servers 3; and the new password account book carries out coverage refreshing on the current password account book. The local processor 21 reads the item name in the cost list of the user terminal 1, encrypts the item name in the cost list of the user terminal 1 based on the password book to form a plurality of encrypted retrieval packets, and randomly transmits the encrypted retrieval packets to the network memories 32 of the plurality of different network servers 3.
The network processor 31 decrypts the encrypted data packet in the network memory 32 according to the current crypto-book to generate item name information, and retrieves price information in the network database according to the item name information to generate a price sublist, which is temporarily stored in the network memory 32. The network processor 31 encrypts the price grid list, generates an encrypted price packet, and sends the encrypted price packet to the local memory 22. The firewall 33 monitors the read state of the network storage 32, and when the firewall 33 detects an illegal intrusion, the firewall 33 clears the temporary data of the price sublist in the local storage 22 so as to avoid leakage of unencrypted data of the network server 3 in the process of flow processing when the network service is invaded, thereby causing leakage of information.
The local processor 21 decrypts the plurality of encrypted price data packets in the local memory 22 to generate a composite price update table. The local processor 21 compares the cost update table with the item prices corresponding to the same item names in the cost list of the user terminal 1, and when the item prices in the cost update table are different from the item prices in the cost list, the local server 2 refreshes and covers the corresponding item prices in the cost list with the item price data in the current cost update table, so that the item prices in the cost list of the user terminal 1 are updated, and engineering personnel can know the latest cost information in time.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (2)

1. A whole-process cost dynamic management method is characterized by comprising the following steps:
step S1: local encryption, wherein the local server (2) encrypts the item names in the cost list of the user terminal (1) to form a plurality of encrypted retrieval data packets, and randomly sends the encrypted retrieval data packets to a plurality of different network servers (3); the local server (2) generates a password account book at regular time, sends the password account book to a plurality of network servers (3), and performs coverage refreshing on the current password account book;
step S2: decomposing and searching, wherein the plurality of network servers (3) respectively decrypt the received encrypted searching data packets to obtain corresponding project names, and search the project prices corresponding to the project names in the network database according to the received project names; the network server (3) monitors illegal intrusion through a firewall (33), and empties the temporary data of the decrypted price sublist when intrusion behavior is detected;
step S3: encrypting transmission, wherein the network server (3) generates a price grid list for the item price corresponding to the retrieved item name, and encrypts the price sub-list to generate an encrypted price data packet;
step S4: decrypting and integrating, wherein the network server (3) sends the encrypted data packets to the local server (2), and the local server (2) decrypts the encrypted data packets sent by the network servers (3) to synthesize a cost updating table; the user terminal (1) is connected and communicated with the local server (2) through Bluetooth or NFC or a wireless network; when the user terminal (1) sends a connection request to the local server (2), the local server (2) reads the project name in the cost list of the user terminal (1), otherwise, the user terminal (1) and the local server (2) are disconnected;
step S5: and (3) refreshing the data, wherein the local server (2) compares the cost updating table with the item prices of the same item names in the cost list of the user terminal (1), and refreshes and covers the item prices in the cost list when the item prices in the cost updating table are different from the item prices in the cost list.
2. A whole-process cost dynamic management system is characterized in that: the system comprises a user terminal (1), a local server (2) and a plurality of network servers (3), wherein the local server (2) comprises a local processor (21) and a local memory (22), and the network servers (3) comprise a network processor (31) and a network memory (32);
the user terminal (1) is connected and communicated with the local server (2) through Bluetooth or NFC or a wireless network; when the user terminal (1) sends a connection request to the local server (2), the local server (2) reads the project name in the cost list of the user terminal (1), otherwise, the user terminal (1) and the local server (2) are disconnected;
the local processor (21) reads the item names in the cost list of the user terminal (1), encrypts the item names in the cost list of the user terminal (1), forms a plurality of encrypted retrieval data packets, and randomly transmits the encrypted retrieval data packets to the network memories (32) of the different network servers (3);
the network processor (31) decrypts the encrypted data packet in the network memory (32) to generate item name information, and retrieves price information in a network database according to the item name information to generate a price sublist; -said network processor (31) encrypting the price grid list, generating an encrypted price data packet, and sending the encrypted price data packet to a local memory (22);
the local processor (21) decrypts the plurality of encrypted price data packets in the local memory (22) to generate a composite price update table; the local processor (21) compares the cost updating table with the item prices corresponding to the same item names in the cost list of the user terminal (1), and performs coverage refreshing on the item prices in the cost list;
the local processor (21) generates a password book at regular time, stores the password in a local memory (22) and sends the password book to a network memory (32) of a plurality of network servers (3); the new password account book carries out coverage refreshing on the current password account book;
the network server (3) further comprises a firewall (33), the firewall (33) monitors the reading state of the network storage (32), and when the firewall (33) detects illegal intrusion, the firewall (33) empties temporary data of the price sublist in the local storage (22).
CN201910194517.1A 2019-03-14 2019-03-14 Method and system for dynamically managing overall process cost Active CN110557361B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910194517.1A CN110557361B (en) 2019-03-14 2019-03-14 Method and system for dynamically managing overall process cost

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910194517.1A CN110557361B (en) 2019-03-14 2019-03-14 Method and system for dynamically managing overall process cost

Publications (2)

Publication Number Publication Date
CN110557361A CN110557361A (en) 2019-12-10
CN110557361B true CN110557361B (en) 2022-04-26

Family

ID=68736316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910194517.1A Active CN110557361B (en) 2019-03-14 2019-03-14 Method and system for dynamically managing overall process cost

Country Status (1)

Country Link
CN (1) CN110557361B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111724141A (en) * 2020-06-29 2020-09-29 张群 Dynamic management method for construction cost in whole process of engineering cost settlement
CN114553499B (en) * 2022-01-28 2024-02-13 中国银联股份有限公司 Image encryption and image processing method, device, equipment and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1689040A (en) * 2003-03-31 2005-10-26 富士通株式会社 Collator and register
CN102667845A (en) * 2009-08-05 2012-09-12 帕特奈株式会社 Electronic price-proposing system, electronic price-proposing device, and electronic price-proposing method
CN102710661A (en) * 2012-06-25 2012-10-03 上海交通大学 Cloud storage and aggregation architecture and data storage and aggregation method by using same
CN103593476A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage
CN105100115A (en) * 2015-08-27 2015-11-25 中国科学院信息工程研究所 Data storage method for privacy protection based on encryption password and data fractionation
CN105407119A (en) * 2014-09-12 2016-03-16 北京计算机技术及应用研究所 Cloud computing system and method thereof
CN106530143A (en) * 2016-11-08 2017-03-22 河南财政税务高等专科学校 Engineering cost list service system
CN109064024A (en) * 2018-08-02 2018-12-21 广东展诚工程咨询有限公司 A kind of engineering Whole Process Cost dynamic management approach and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8892866B2 (en) * 2011-09-26 2014-11-18 Tor Anumana, Inc. Secure cloud storage and synchronization systems and methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1689040A (en) * 2003-03-31 2005-10-26 富士通株式会社 Collator and register
CN102667845A (en) * 2009-08-05 2012-09-12 帕特奈株式会社 Electronic price-proposing system, electronic price-proposing device, and electronic price-proposing method
CN102710661A (en) * 2012-06-25 2012-10-03 上海交通大学 Cloud storage and aggregation architecture and data storage and aggregation method by using same
CN103593476A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage
CN105407119A (en) * 2014-09-12 2016-03-16 北京计算机技术及应用研究所 Cloud computing system and method thereof
CN105100115A (en) * 2015-08-27 2015-11-25 中国科学院信息工程研究所 Data storage method for privacy protection based on encryption password and data fractionation
CN106530143A (en) * 2016-11-08 2017-03-22 河南财政税务高等专科学校 Engineering cost list service system
CN109064024A (en) * 2018-08-02 2018-12-21 广东展诚工程咨询有限公司 A kind of engineering Whole Process Cost dynamic management approach and system

Also Published As

Publication number Publication date
CN110557361A (en) 2019-12-10

Similar Documents

Publication Publication Date Title
Puttaswamy et al. Preserving privacy in location-based mobile social applications
CN101512525B (en) Encrypted data search
CN110213036B (en) Safe data storage and calculation method based on fog calculation-edge calculation of Internet of things
KR101699192B1 (en) A privacy-preserving database system
CN102026090B (en) Node positioning method in IOT (Internet of things) and node
CN103841099A (en) System for encrypting content name
US20090138698A1 (en) Method of searching encrypted data using inner product operation and terminal and server therefor
CN111327616A (en) Key management method, device, equipment and computer readable storage medium
CN108632030A (en) A kind of fine-grained access control method efficient and safe based on CP-ABE
CN110557361B (en) Method and system for dynamically managing overall process cost
US20170006313A1 (en) System and Method for Distributed Video Storage Across Enterprises
KR102535322B1 (en) System for providing privacy protection service and method thereof
Ashouri-Talouki et al. Homomorphic encryption to preserve location privacy
Elkhodr et al. Managing the internet of things
KR101398033B1 (en) Remote control system and method using short message
CN112632063B (en) Restricted shortest distance query method, electronic device, and readable storage medium
CN106230856A (en) A kind of System of Industrial Device Controls based on Internet of Things
Xin et al. Privacy-preserving spectrum query with location proofs in database-driven CRNs
CN106131088A (en) A kind of information transferring method based on Internet of Things information private passage, Apparatus and system
JP2020003897A (en) Data management system and node device
CN115296808B (en) Key replacing method, device, computer equipment and storage medium
CN114726613B (en) Micro-grid and terminal data communication encryption method and device and computer equipment
WO2017059282A1 (en) System and method for privacy enabled discovery of wireless devices and their location
CN113190878A (en) National secret encryption algorithm and water affair internet of things acquisition system
CN117155671A (en) Track data transmitting method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant