CN111158322A - On-site management system based on enterprise WeChat - Google Patents
On-site management system based on enterprise WeChat Download PDFInfo
- Publication number
- CN111158322A CN111158322A CN201911398671.7A CN201911398671A CN111158322A CN 111158322 A CN111158322 A CN 111158322A CN 201911398671 A CN201911398671 A CN 201911398671A CN 111158322 A CN111158322 A CN 111158322A
- Authority
- CN
- China
- Prior art keywords
- management
- management system
- project
- enterprise wechat
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 16
- 238000013475 authorization Methods 0.000 claims abstract description 15
- 238000005516 engineering process Methods 0.000 claims abstract description 15
- 238000010276 construction Methods 0.000 claims description 17
- 239000000344 soap Substances 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 69
- 238000004458 analytical method Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 6
- 238000000354 decomposition reaction Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000000007 visual effect Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000004080 punching Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000012952 Resampling Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000011265 semifinished product Substances 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000011426 transformation method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/41865—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by job scheduling, process planning, material flow
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/32—Operator till task planning
- G05B2219/32252—Scheduling production, machining, job shop
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an enterprise WeChat-based field management system, which relates to the field of field management application systems and comprises a project access layer, a management configuration layer, a data acquisition layer and a service management and control layer, wherein the service management and control layer is realized by adopting a user unified authorization system; the data acquisition layer adopts a dynamic digital watermarking technology and a mobile terminal multi-place sign-in assessment system. The invention solves the problems of login among multiple systems and real attendance checking of field personnel by directly using the WeChat; the method can intuitively position the location of the project, truly reflect the situation of the scene photo, and realize closed-loop management through an innovative project circle management mode.
Description
Technical Field
The invention relates to the field of field management application systems, in particular to a field management system based on enterprise WeChat.
Background
The engineering construction project implementation phase, namely the construction phase, is a process of changing design drawings, raw materials, semi-finished products, equipment and the like into engineering entities, and is a main phase for realizing the value and the use value of the construction project. The construction site management is a key part of engineering project management, and only by enhancing the construction site management, the engineering quality can be ensured, the cost is reduced, the construction period is shortened, the competitiveness of construction enterprises in the market is improved, and the construction site management plays an important role in survival and development of the construction enterprises.
Single Sign On (Single Sign On), abbreviated as SSO, is one of the more popular solutions for business integration of enterprises. SSO is defined as the fact that in multiple applications, a user only needs to log in once to access all mutually trusted applications. However, the conventional single sign-on has the following disadvantages:
1) is not conducive to reconstruction
Because of the many systems involved, reconfiguring must be compatible with all systems, which can be time consuming
2) Unattended desktop
Since the login is only required once, all authorized application systems can access the login, which may cause some important information to be leaked.
The traditional single sign-on can not solve the problem of login among multiple systems by directly using WeChat, and the traditional field management system can not realize on-site card-punching attendance of field personnel and effectively and intuitively track the location of the project because a plurality of projects are simultaneously constructed and the mobility of the field personnel is large, so that whether the picture is shot on site or not can not be effectively judged, and closed-loop management can not be efficiently formed.
Accordingly, those skilled in the art have endeavored to develop a field management application system necessary to manage the full lifecycle of the associated work.
Disclosure of Invention
In view of the defects in the prior art, the invention aims to solve the technical problems of unified login among multiple systems, real attendance checking condition of field personnel, intuitive positioning of the location of a project, real reflection of the condition of a field photo, effective prevention of fake behavior and realization of closed-loop management through an innovative project circle management mode. In order to achieve the above object, the present invention provides an enterprise WeChat-based field management system, which is characterized in that the field management system comprises a project access layer, a management configuration layer, a data acquisition layer and a service management and control layer, wherein the field management system is implemented by a user unified authorization system; the data acquisition layer adopts a dynamic digital watermarking technology and a mobile terminal multi-place sign-in assessment system.
Furthermore, the user unified authorization system comprises a mobile phone end application and a service end management platform application based on the WeChat enterprise number.
Furthermore, the user uniform authorization system consists of a uniform identity authentication management module, a uniform identity authentication server and an identity information storage server; the unified identity authentication management module consists of a management tool and a management server; the management tool realizes interface operation and delivers operation data to the management server, and the management server modifies the content in the identity information storage server according to the operation data.
Further, the unified identity authentication server provides a unified Webservice authentication service to the application program.
Furthermore, the dynamic digital watermarking technology automatically identifies the relevant information of the project according to the information of acquisition time, acquisition place and the like by intelligently analyzing and acquiring the photos.
Further, the dynamic digital watermarking technology adopts a digital watermarking algorithm based on discrete wavelet transform.
Furthermore, the mobile terminal multi-place check-in assessment system establishes a comparison function for automatically verifying the relation among the corresponding items of check-in time, check-in places and check-in for the project management personnel needing to manage a plurality of construction sites simultaneously.
Furthermore, the field management system adopts a project circle management mode; and after the data acquisition layer personnel submit the acquired data, the field management system automatically synchronizes the related information to the project circle.
Further, the service management and control layer personnel directly check and publish the content through the project circle.
The field management system adopts a user unified authorization technology, and identity and authority data are stored through the identity storage server. The identity storage server selects the relational database and supports digital certificates to be stored in the identity storage server. Compared with the traditional single sign-on function, the method has the following advantages:
1) convenient and practical
And realizing single sign-on. After the user logs in once, the user can switch between different systems by means of the authentication token. All management functions of the user unified identity authentication system are realized on the basis of pages, and an administrator can complete management work only through a browser.
2) Cross-platform
The user unified identity authentication system is realized based on an SOA (service oriented architecture), the interface adopts the SOAP XML standard, and the system can be in cross-platform butt joint with various types of application systems.
3) Supporting multiple identity presence modes
At present, a variety of identity accounts such as WeChat enterprise accounts, business office platform accounts, digital signature accounts and the like are integrated.
4) Safe and reliable
The system can integrate a mature authentication system: the digital signature account number is included, so that the identity in the examination and approval of important documents in an enterprise can be guaranteed to be unreliable, and the signature of a user can not be forged.
The watermark technology adopted by the field management system is a digital watermark algorithm based on discrete wavelet transform. Compared with the traditional DCT, the wavelet transformation is a resolution-variable analysis method combining a time domain and a frequency domain, and the size of a time window is automatically adjusted along with the frequency, so that the method is more in line with the visual characteristics of human eyes. The wavelet analysis has good locality in time and frequency domains, and provides good combination for traditional time domain analysis and frequency domain analysis.
Compared with the spatial domain method, the domain transformation method has the following advantages:
(1) the watermark signal energy embedded in the transform domain can be distributed to all pixels in the space domain, which is beneficial to ensuring the invisibility of the watermark;
(2) in the transform domain, certain characteristics of the Human Visual System (HVS), such as frequency masking characteristics, can be more conveniently incorporated into the watermark encoding process, and thus its concealment is better;
(3) the transform domain approach is compatible with international data compression standards, thereby facilitating implementation of watermarking algorithms in the compressed domain (compressed domain) while also being resistant to corresponding lossy compression.
The conception, the specific structure and the technical effects of the present invention will be further described with reference to the accompanying drawings to fully understand the objects, the features and the effects of the present invention.
Drawings
FIG. 1 is a general schematic diagram of an enterprise WeChat based field management system in accordance with a preferred embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a user unified authorization system according to a preferred embodiment of the present invention;
FIG. 3 is a signal and filter definition for a discrete wavelet transform in accordance with a preferred embodiment of the present invention;
FIG. 4 is a diagram illustrating a discrete wavelet transform of a discrete signal according to a preferred embodiment of the present invention;
FIG. 5 is a diagram illustrating the energy dispersion of the noise components according to a preferred embodiment of the present invention.
Detailed Description
The technical contents of the preferred embodiments of the present invention will be more clearly and easily understood by referring to the drawings attached to the specification. The present invention may be embodied in many different forms of embodiments and the scope of the invention is not limited to the embodiments set forth herein.
Example one
Fig. 1 shows a set of field management application systems required for managing the whole life cycle of related work based on gas pipeline construction, and the field management application systems comprise: the system comprises a project access layer, a management configuration layer, a data acquisition layer and a service management and control layer. The system is realized by adopting a mobile phone end application and a server end management platform application based on the WeChat enterprise number.
The field management application system is realized by adopting a user unified authorization system. Establishing a set of user management system corresponding to the enterprise micro-signal user and the enterprise user management platform to realize the association binding of the enterprise user and the micro credit user; the method has the advantages that the user of the WeChat enterprise number can log in and authenticate the basic information of the user in a single point without secondary login; the automatic authorization of the WeChat enterprise number user on the server management platform is realized.
At present, a user unified authorization system manages identity information and corresponding relations among application identities of different application systems such as a company pmis project management system, an enterprise micro signal, an oa management system and the like, so that identities of the same user in all the application systems are consistent, and an application program does not need to care about an identity authentication process.
The data acquisition layer of the field management application system adopts a mobile terminal multi-place check-in assessment system. Due to the particularity of gas pipeline construction, project managers need to manage a plurality of construction sites at the same time, work fluidity and change are strong, and attendance of such site personnel management cannot be checked through common modes such as punching cards by a unit attendance machine. The automatic checking and comparing function of the relation among the corresponding items of the check-in time, the check-in place and the check-in is established, and the validity of the check-in and attendance information is ensured. Different from the traditional mobile terminal attendance, the attendance checking method is characterized in that one project manager needs to manage a plurality of construction sites simultaneously for the attendance checking of the project construction sites, and the attendance checking of a plurality of places is realized.
The field management application system has a project billboard function. And displaying the tracking item condition in a map mode. The map, the project, the geographical position, the project site navigation and the latest condition of the project are provided for checking, and the project can be checked on site conveniently.
The field management application system adopts a project circle management mode. The idea of field project management is that the progress of each project can be known and mastered at the first time, and the field situation can be communicated and fed back in real time when a problem exists. In order to achieve the point, the project is subjected to bold innovation on the aspects of management concept and user experience. A management mode similar to a WeChat friend circle is introduced, meanwhile, a personalized management means is added on the basis, and breakthrough attempts are made on timeliness and interactivity of field management. In timeliness, after the collected data is submitted by field collection personnel, the system can automatically synchronize related information to a project circle, and issue project element information, collected person information and collected photo information in a mode similar to that of a WeChat friend circle; in the interactive aspect, the branch management auditors can directly audit the release content through the pc management terminal or the project circle, if any, the two parties can communicate with each other through a reply mode to the condition of a certain collected photo or the whole condition, the problem can be solved in a closed loop mode, and meanwhile, a tracing log of the problem is formed.
Example two
Fig. 2 is a schematic structural diagram of a user unified authorization system.
Structurally, the user unified authorization system consists of three parts, namely a unified identity authentication management module, a unified identity authentication server and an identity information storage server.
The unified identity authentication management module consists of a management tool and a management service, and realizes user group management and user management; the management tool realizes interface operation and submits the operation data to the management server, and the management server modifies the content in the storage server.
The uniform identity authentication server provides uniform Webservice authentication service for the application program. The authentication token of the user is returned to the application program after the authentication is passed.
EXAMPLE III
And the data acquisition layer of the field management application system adopts dynamic digital watermarking. The collection of the on-site photos requires examination of each collected photo for each key point due to the requirements for the construction site management, so as to ensure the faithful feedback of the on-site conditions and the problem discovery. The workload for the examiners is very large, and how to assist the examiners in intelligently screening the photos through an information technology means for the authenticity and the effectiveness of the collected photos is also a technical highlight of the project. By investigation and on-site typesetting, the auxiliary technology for photo collection adopts the dynamic watermarking technology of photos. The system automatically identifies the relevant information of the project through intelligently analyzing the collected photos according to the information of the collection time, the collection place and the like, and simultaneously adds the watermark information relevant to the project on the photos, thereby ensuring the real effectiveness of the collected photos (intelligently eliminating invalid photos uploaded in real time on site) and facilitating the subsequent browsing and inspection of the sampled photos.
The digital watermarking technology is a computer information hiding technology based on a content and non-password mechanism. It is to embed some identification information (i.e. digital watermark) directly into the digital carrier (including multimedia, document, software, etc.) or indirectly (modifying the structure of a specific area), and it does not affect the use value of the original carrier, and is not easy to be ascertained and modified again. But can be identified and recognized by the producer. The information hidden in the carrier can achieve the purposes of confirming content creators and purchasers, transmitting secret information, judging whether the carrier is tampered or not and the like. Digital watermarking is an effective method for protecting information safety, realizing anti-counterfeiting tracing and copyright protection, and is an important branch and research direction in the field of information hiding technology research.
1) Safety: the information of the digital watermark should be safe and difficult to be falsified or forged, and meanwhile, the false detection rate should be low, and when the original content changes, the digital watermark should change, so that the change of the original data can be detected; of course, the digital watermark also has strong resistance to repeated addition;
2) concealment: digital watermarks should be imperceptible and should not affect the normal use of the protected data; the quality is not degraded;
3) robustness: this property is suitable for robust watermarking. That is, the digital watermark remains partially intact and can be accurately authenticated after undergoing various unintentional or intentional signal processing procedures. Possible signal processing procedures include channel noise, filtering, digital/analog and analog/digital conversion, resampling, shearing, displacement, scale change, lossy compression coding and the like;
4) sensitivity: this property applies to fragile watermarks. After the distribution, transmission and use processes, the digital watermark can accurately judge whether the data is falsified. Furthermore, the position and the degree of data tampering can be judged, and even the original information can be restored.
In the digital watermarking technology, a digital watermarking algorithm based on discrete wavelet transform is adopted, compared with the traditional DCT transform, the wavelet transform is variable in resolution, an analysis method combining a time domain and a frequency domain is adopted, the size of a time window is automatically adjusted along with the frequency, and the human visual characteristics are better met. The wavelet analysis has good locality in time and frequency domains, and provides good combination for traditional time domain analysis and frequency domain analysis.
(1) For discrete wavelet transform we define some signals and filters that need to be used, as shown in fig. 3.
x [ n ]: discrete input signal of length N.
g [ n ]: the low pass filter can filter the high frequency part of the input signal and output the low frequency part.
h [ n ]: the high pass filter filters out the low frequency portion and outputs the high frequency portion, as opposed to the low pass filter.
↓andQ: the downsampling filter outputs y [ n ] ═ x [ Qn ] if x [ n ] is used as input. Here, Q is 2.
After the above symbols are clearly defined, the hierarchical structure can be used to describe how to perform discrete wavelet transform on a discrete signal, as shown in fig. 4.
α th layer of the architecture (α th stage)
(2) In wavelet analysis, it is often used to approximate details, which represent the high-scale, i.e., low-frequency, information of a signal; the details represent the high scale, i.e. high frequency information, of the signal. As shown in fig. 5, for a noisy signal, the main energy of the noise component is concentrated in the detail component of the wavelet solution.
In digital image processing, continuous wavelets and their wavelet transforms need to be discretized. In general, a binary discrete process is used in computer implementation, and the wavelet subjected to the discretization and the corresponding wavelet transform are converted into discrete wavelet transform (DWT for short). In practice, the discrete wavelet transform is obtained by discretizing the scale and displacement of the continuous wavelet transform by a power of 2, and is also called binary wavelet transform.
Although the classical fourier transform may reflect the overall connotation of the signal, the representation is often not intuitive and noise can complicate the signal spectrum. In the field of signal processing, a family of bandpass filters has been used to decompose a signal into different frequency components, i.e., signal f (x) is fed to a family of bandpass filters hi (x).
The significance of wavelet decomposition is that the signal can be decomposed on different scales, and the selection of different scales can be determined according to different targets.
For many signals, the low frequency component is important, often implying a characteristic of the signal, while the high frequency component gives details or differences in the signal. Human voice, if the high frequency components are removed, sounds different from before, but still knows what is being said; if enough low frequency components are removed, some meaningless sound is heard. Approximation and detail are commonly used in wavelet analysis. Approximately represents the high-scale, i.e., low-frequency, information of the signal; the details represent the high scale, i.e. high frequency information, of the signal. Thus, the original signal passes through two mutual filters to produce two signals.
By continuously decomposing the approximate signal through a continuous decomposition process, the signal can be decomposed into a plurality of low-resolution components. In theory the decomposition can proceed without restriction, but in fact the decomposition can proceed until the detail (high frequency) contains only a single sample. Therefore, in practical applications, the appropriate number of decomposition layers is generally selected according to the characteristics of the signal or an appropriate standard.
The foregoing detailed description of the preferred embodiments of the invention has been presented. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.
Claims (10)
1. The enterprise WeChat-based field management system is characterized by comprising a project access layer, a management configuration layer, a data acquisition layer and a business control layer, wherein the business control layer is realized by adopting a user unified authorization system; the data acquisition layer adopts a dynamic digital watermarking technology and a mobile terminal multi-place sign-in assessment system.
2. The enterprise wechat-based locale management system of claim 1, wherein the user unified authorization system comprises a wechat enterprise number-based mobile phone side application and a service side management platform application.
3. The enterprise wechat-based field management system of claim 1, wherein the user unified authorization system is comprised of a unified identity authentication management module, a unified identity authentication server, and an identity information storage server; the unified identity authentication management module consists of a management tool and a management server; the management tool realizes interface operation and delivers operation data to the management server, and the management server modifies the content in the identity information storage server according to the operation data.
4. The enterprise wechat-based locale management system of claim 3, wherein the unified identity authentication server provides a unified Webservice authentication service to the application program.
5. The enterprise wechat-based locale management system of claim 1, wherein the dynamic digital watermarking technology automatically identifies project related information based on time, location, etc. of collection by intelligently analyzing the collected photos.
6. The enterprise wechat-based locale management system of claim 5, wherein the dynamic digital watermarking technique employs a discrete wavelet transform-based digital watermarking algorithm.
7. The enterprise WeChat-based field management system according to claim 1, wherein the mobile-end multi-place check-in assessment system establishes a comparison function for automatically verifying the relationship among the check-in time, check-in place and check-in corresponding projects for project managers who need to manage a plurality of construction sites simultaneously.
8. The enterprise WeChat-based locale management system according to claim 1, wherein said locale management system employs a project circle management mode; and after the data acquisition layer personnel submit the acquired data, the field management system automatically synchronizes the related information to the project circle.
9. The enterprise wechat-based locale management system of claim 8, wherein the business management layer personnel directly review published content through the project circle.
10. The enterprise wechat-based locale management system of claim 1, wherein the implementation of the user unified authorization system is based on an SOA architecture, and an interface employs a SOAP XML standard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911398671.7A CN111158322A (en) | 2019-12-30 | 2019-12-30 | On-site management system based on enterprise WeChat |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911398671.7A CN111158322A (en) | 2019-12-30 | 2019-12-30 | On-site management system based on enterprise WeChat |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111158322A true CN111158322A (en) | 2020-05-15 |
Family
ID=70559660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911398671.7A Pending CN111158322A (en) | 2019-12-30 | 2019-12-30 | On-site management system based on enterprise WeChat |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111158322A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106572000A (en) * | 2016-10-29 | 2017-04-19 | 中国十七冶集团有限公司 | WeChat official account platform-based construction site quality and safety management method |
CN106803289A (en) * | 2016-12-22 | 2017-06-06 | 五邑大学 | A kind of false proof method and system of registering of intelligent mobile |
CN108132943A (en) * | 2016-11-30 | 2018-06-08 | 百度在线网络技术(北京)有限公司 | For showing the method and device of the evaluation information of project |
CN109166193A (en) * | 2018-07-26 | 2019-01-08 | 饶四强 | Taking pictures based on time, position, random number and bar code is checked card or evidence collecting method |
US10356079B2 (en) * | 2016-12-05 | 2019-07-16 | Keeper Security, Inc. | System and method for a single sign on connection in a zero-knowledge vault architecture |
CN110084733A (en) * | 2019-04-19 | 2019-08-02 | 中国科学院自动化研究所 | The embedding grammar and system of text image watermark, extracting method and system |
CN110263510A (en) * | 2019-06-26 | 2019-09-20 | 东营瀚睿达信息科技有限责任公司 | A kind of noninductive Verification System of software and hardware Unified Identity based on wechat enterprise |
-
2019
- 2019-12-30 CN CN201911398671.7A patent/CN111158322A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106572000A (en) * | 2016-10-29 | 2017-04-19 | 中国十七冶集团有限公司 | WeChat official account platform-based construction site quality and safety management method |
CN108132943A (en) * | 2016-11-30 | 2018-06-08 | 百度在线网络技术(北京)有限公司 | For showing the method and device of the evaluation information of project |
US10356079B2 (en) * | 2016-12-05 | 2019-07-16 | Keeper Security, Inc. | System and method for a single sign on connection in a zero-knowledge vault architecture |
CN106803289A (en) * | 2016-12-22 | 2017-06-06 | 五邑大学 | A kind of false proof method and system of registering of intelligent mobile |
CN109166193A (en) * | 2018-07-26 | 2019-01-08 | 饶四强 | Taking pictures based on time, position, random number and bar code is checked card or evidence collecting method |
CN110084733A (en) * | 2019-04-19 | 2019-08-02 | 中国科学院自动化研究所 | The embedding grammar and system of text image watermark, extracting method and system |
CN110263510A (en) * | 2019-06-26 | 2019-09-20 | 东营瀚睿达信息科技有限责任公司 | A kind of noninductive Verification System of software and hardware Unified Identity based on wechat enterprise |
Non-Patent Citations (3)
Title |
---|
毛世杰: "《Java Web服务》", 31 March 2003, 中国电力出版社 * |
郑文礼: "《管理信息系统原理与应用》", 31 August 2016, 厦门大学出版社 * |
黄育舜: "基于"企业微信"的现场管理系统开发与实现", 《上海煤气》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110598376B (en) | Copyright authentication method, device and equipment based on block chain and storage medium | |
CN110020956B (en) | Cross-block-chain interaction method and system, computer equipment and storage medium | |
Kumar et al. | Image Transformation Technique Using Steganography Methods Using LWT Technique Image Transformation Technique Using Steganography Methods Using LWT Technique | |
US8144924B2 (en) | Content objects with computer instructions steganographically encoded therein, and associated methods | |
US20190005268A1 (en) | Universal original document validation platform | |
Wolthusen | Overcast: Forensic discovery in cloud environments | |
CN102622545B (en) | Picture file tracking method | |
Adam | Preserving authenticity in the digital age | |
Gupta et al. | An insight review on multimedia forensics technology | |
Katariya | Digital watermarking | |
Kirovski | Multimedia watermarking techniques and applications | |
CN111158322A (en) | On-site management system based on enterprise WeChat | |
CN109992984B (en) | File identification method and equipment based on two-dimensional code | |
Stanković et al. | Image watermarking based on the space/spatial-frequency analysis and Hermite functions expansion | |
Cao et al. | Research on database watermarking based on independent component analysis and multiple rolling | |
Gupta et al. | Secret image digitization over public cloud through Cbtv based image fusion | |
Kamble et al. | DWT-based multiple watermarking for privacy and security of digital images in e-commerce | |
Yao et al. | A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments | |
Rastogi et al. | Implementation of digital watermarking technique to secure IPR of web application code | |
Liu et al. | A watermarking-based authentication and recovery scheme for encrypted audio | |
Chen et al. | Application Research of electronic authorized steganographic seal management and control platform based on invisible watermark | |
Aghbabaeyan et al. | Review of digital watermarking techniques | |
CN115795417B (en) | Method and device for tracing OOXML document, electronic equipment and storage medium | |
Koundinya et al. | Characteristic overview of digital image forensics tools | |
Ahmed et al. | Design and Development of Cloud based QR Coded Watermarking DLP system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: No.162 Weifang Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200122 Applicant after: Shanghai Energy Construction Group Co.,Ltd. Address before: No.162 Weifang Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200122 Applicant before: SHANGHAI MUNICIPAL GAS NO.2 PIPELINES ENGINEERING Co.,Ltd. |
|
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200515 |