CN111158322A - On-site management system based on enterprise WeChat - Google Patents

On-site management system based on enterprise WeChat Download PDF

Info

Publication number
CN111158322A
CN111158322A CN201911398671.7A CN201911398671A CN111158322A CN 111158322 A CN111158322 A CN 111158322A CN 201911398671 A CN201911398671 A CN 201911398671A CN 111158322 A CN111158322 A CN 111158322A
Authority
CN
China
Prior art keywords
management
management system
project
enterprise wechat
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911398671.7A
Other languages
Chinese (zh)
Inventor
黄育舜
郑诚
庄丽敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Municipal Gas No2 Pipelines Engineering Co ltd
Original Assignee
Shanghai Municipal Gas No2 Pipelines Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Municipal Gas No2 Pipelines Engineering Co ltd filed Critical Shanghai Municipal Gas No2 Pipelines Engineering Co ltd
Priority to CN201911398671.7A priority Critical patent/CN111158322A/en
Publication of CN111158322A publication Critical patent/CN111158322A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • G05B19/41865Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by job scheduling, process planning, material flow
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • G05B2219/32Operator till task planning
    • G05B2219/32252Scheduling production, machining, job shop
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an enterprise WeChat-based field management system, which relates to the field of field management application systems and comprises a project access layer, a management configuration layer, a data acquisition layer and a service management and control layer, wherein the service management and control layer is realized by adopting a user unified authorization system; the data acquisition layer adopts a dynamic digital watermarking technology and a mobile terminal multi-place sign-in assessment system. The invention solves the problems of login among multiple systems and real attendance checking of field personnel by directly using the WeChat; the method can intuitively position the location of the project, truly reflect the situation of the scene photo, and realize closed-loop management through an innovative project circle management mode.

Description

On-site management system based on enterprise WeChat
Technical Field
The invention relates to the field of field management application systems, in particular to a field management system based on enterprise WeChat.
Background
The engineering construction project implementation phase, namely the construction phase, is a process of changing design drawings, raw materials, semi-finished products, equipment and the like into engineering entities, and is a main phase for realizing the value and the use value of the construction project. The construction site management is a key part of engineering project management, and only by enhancing the construction site management, the engineering quality can be ensured, the cost is reduced, the construction period is shortened, the competitiveness of construction enterprises in the market is improved, and the construction site management plays an important role in survival and development of the construction enterprises.
Single Sign On (Single Sign On), abbreviated as SSO, is one of the more popular solutions for business integration of enterprises. SSO is defined as the fact that in multiple applications, a user only needs to log in once to access all mutually trusted applications. However, the conventional single sign-on has the following disadvantages:
1) is not conducive to reconstruction
Because of the many systems involved, reconfiguring must be compatible with all systems, which can be time consuming
2) Unattended desktop
Since the login is only required once, all authorized application systems can access the login, which may cause some important information to be leaked.
The traditional single sign-on can not solve the problem of login among multiple systems by directly using WeChat, and the traditional field management system can not realize on-site card-punching attendance of field personnel and effectively and intuitively track the location of the project because a plurality of projects are simultaneously constructed and the mobility of the field personnel is large, so that whether the picture is shot on site or not can not be effectively judged, and closed-loop management can not be efficiently formed.
Accordingly, those skilled in the art have endeavored to develop a field management application system necessary to manage the full lifecycle of the associated work.
Disclosure of Invention
In view of the defects in the prior art, the invention aims to solve the technical problems of unified login among multiple systems, real attendance checking condition of field personnel, intuitive positioning of the location of a project, real reflection of the condition of a field photo, effective prevention of fake behavior and realization of closed-loop management through an innovative project circle management mode. In order to achieve the above object, the present invention provides an enterprise WeChat-based field management system, which is characterized in that the field management system comprises a project access layer, a management configuration layer, a data acquisition layer and a service management and control layer, wherein the field management system is implemented by a user unified authorization system; the data acquisition layer adopts a dynamic digital watermarking technology and a mobile terminal multi-place sign-in assessment system.
Furthermore, the user unified authorization system comprises a mobile phone end application and a service end management platform application based on the WeChat enterprise number.
Furthermore, the user uniform authorization system consists of a uniform identity authentication management module, a uniform identity authentication server and an identity information storage server; the unified identity authentication management module consists of a management tool and a management server; the management tool realizes interface operation and delivers operation data to the management server, and the management server modifies the content in the identity information storage server according to the operation data.
Further, the unified identity authentication server provides a unified Webservice authentication service to the application program.
Furthermore, the dynamic digital watermarking technology automatically identifies the relevant information of the project according to the information of acquisition time, acquisition place and the like by intelligently analyzing and acquiring the photos.
Further, the dynamic digital watermarking technology adopts a digital watermarking algorithm based on discrete wavelet transform.
Furthermore, the mobile terminal multi-place check-in assessment system establishes a comparison function for automatically verifying the relation among the corresponding items of check-in time, check-in places and check-in for the project management personnel needing to manage a plurality of construction sites simultaneously.
Furthermore, the field management system adopts a project circle management mode; and after the data acquisition layer personnel submit the acquired data, the field management system automatically synchronizes the related information to the project circle.
Further, the service management and control layer personnel directly check and publish the content through the project circle.
The field management system adopts a user unified authorization technology, and identity and authority data are stored through the identity storage server. The identity storage server selects the relational database and supports digital certificates to be stored in the identity storage server. Compared with the traditional single sign-on function, the method has the following advantages:
1) convenient and practical
And realizing single sign-on. After the user logs in once, the user can switch between different systems by means of the authentication token. All management functions of the user unified identity authentication system are realized on the basis of pages, and an administrator can complete management work only through a browser.
2) Cross-platform
The user unified identity authentication system is realized based on an SOA (service oriented architecture), the interface adopts the SOAP XML standard, and the system can be in cross-platform butt joint with various types of application systems.
3) Supporting multiple identity presence modes
At present, a variety of identity accounts such as WeChat enterprise accounts, business office platform accounts, digital signature accounts and the like are integrated.
4) Safe and reliable
The system can integrate a mature authentication system: the digital signature account number is included, so that the identity in the examination and approval of important documents in an enterprise can be guaranteed to be unreliable, and the signature of a user can not be forged.
The watermark technology adopted by the field management system is a digital watermark algorithm based on discrete wavelet transform. Compared with the traditional DCT, the wavelet transformation is a resolution-variable analysis method combining a time domain and a frequency domain, and the size of a time window is automatically adjusted along with the frequency, so that the method is more in line with the visual characteristics of human eyes. The wavelet analysis has good locality in time and frequency domains, and provides good combination for traditional time domain analysis and frequency domain analysis.
Compared with the spatial domain method, the domain transformation method has the following advantages:
(1) the watermark signal energy embedded in the transform domain can be distributed to all pixels in the space domain, which is beneficial to ensuring the invisibility of the watermark;
(2) in the transform domain, certain characteristics of the Human Visual System (HVS), such as frequency masking characteristics, can be more conveniently incorporated into the watermark encoding process, and thus its concealment is better;
(3) the transform domain approach is compatible with international data compression standards, thereby facilitating implementation of watermarking algorithms in the compressed domain (compressed domain) while also being resistant to corresponding lossy compression.
The conception, the specific structure and the technical effects of the present invention will be further described with reference to the accompanying drawings to fully understand the objects, the features and the effects of the present invention.
Drawings
FIG. 1 is a general schematic diagram of an enterprise WeChat based field management system in accordance with a preferred embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a user unified authorization system according to a preferred embodiment of the present invention;
FIG. 3 is a signal and filter definition for a discrete wavelet transform in accordance with a preferred embodiment of the present invention;
FIG. 4 is a diagram illustrating a discrete wavelet transform of a discrete signal according to a preferred embodiment of the present invention;
FIG. 5 is a diagram illustrating the energy dispersion of the noise components according to a preferred embodiment of the present invention.
Detailed Description
The technical contents of the preferred embodiments of the present invention will be more clearly and easily understood by referring to the drawings attached to the specification. The present invention may be embodied in many different forms of embodiments and the scope of the invention is not limited to the embodiments set forth herein.
Example one
Fig. 1 shows a set of field management application systems required for managing the whole life cycle of related work based on gas pipeline construction, and the field management application systems comprise: the system comprises a project access layer, a management configuration layer, a data acquisition layer and a service management and control layer. The system is realized by adopting a mobile phone end application and a server end management platform application based on the WeChat enterprise number.
The field management application system is realized by adopting a user unified authorization system. Establishing a set of user management system corresponding to the enterprise micro-signal user and the enterprise user management platform to realize the association binding of the enterprise user and the micro credit user; the method has the advantages that the user of the WeChat enterprise number can log in and authenticate the basic information of the user in a single point without secondary login; the automatic authorization of the WeChat enterprise number user on the server management platform is realized.
At present, a user unified authorization system manages identity information and corresponding relations among application identities of different application systems such as a company pmis project management system, an enterprise micro signal, an oa management system and the like, so that identities of the same user in all the application systems are consistent, and an application program does not need to care about an identity authentication process.
The data acquisition layer of the field management application system adopts a mobile terminal multi-place check-in assessment system. Due to the particularity of gas pipeline construction, project managers need to manage a plurality of construction sites at the same time, work fluidity and change are strong, and attendance of such site personnel management cannot be checked through common modes such as punching cards by a unit attendance machine. The automatic checking and comparing function of the relation among the corresponding items of the check-in time, the check-in place and the check-in is established, and the validity of the check-in and attendance information is ensured. Different from the traditional mobile terminal attendance, the attendance checking method is characterized in that one project manager needs to manage a plurality of construction sites simultaneously for the attendance checking of the project construction sites, and the attendance checking of a plurality of places is realized.
The field management application system has a project billboard function. And displaying the tracking item condition in a map mode. The map, the project, the geographical position, the project site navigation and the latest condition of the project are provided for checking, and the project can be checked on site conveniently.
The field management application system adopts a project circle management mode. The idea of field project management is that the progress of each project can be known and mastered at the first time, and the field situation can be communicated and fed back in real time when a problem exists. In order to achieve the point, the project is subjected to bold innovation on the aspects of management concept and user experience. A management mode similar to a WeChat friend circle is introduced, meanwhile, a personalized management means is added on the basis, and breakthrough attempts are made on timeliness and interactivity of field management. In timeliness, after the collected data is submitted by field collection personnel, the system can automatically synchronize related information to a project circle, and issue project element information, collected person information and collected photo information in a mode similar to that of a WeChat friend circle; in the interactive aspect, the branch management auditors can directly audit the release content through the pc management terminal or the project circle, if any, the two parties can communicate with each other through a reply mode to the condition of a certain collected photo or the whole condition, the problem can be solved in a closed loop mode, and meanwhile, a tracing log of the problem is formed.
Example two
Fig. 2 is a schematic structural diagram of a user unified authorization system.
Structurally, the user unified authorization system consists of three parts, namely a unified identity authentication management module, a unified identity authentication server and an identity information storage server.
The unified identity authentication management module consists of a management tool and a management service, and realizes user group management and user management; the management tool realizes interface operation and submits the operation data to the management server, and the management server modifies the content in the storage server.
The uniform identity authentication server provides uniform Webservice authentication service for the application program. The authentication token of the user is returned to the application program after the authentication is passed.
EXAMPLE III
And the data acquisition layer of the field management application system adopts dynamic digital watermarking. The collection of the on-site photos requires examination of each collected photo for each key point due to the requirements for the construction site management, so as to ensure the faithful feedback of the on-site conditions and the problem discovery. The workload for the examiners is very large, and how to assist the examiners in intelligently screening the photos through an information technology means for the authenticity and the effectiveness of the collected photos is also a technical highlight of the project. By investigation and on-site typesetting, the auxiliary technology for photo collection adopts the dynamic watermarking technology of photos. The system automatically identifies the relevant information of the project through intelligently analyzing the collected photos according to the information of the collection time, the collection place and the like, and simultaneously adds the watermark information relevant to the project on the photos, thereby ensuring the real effectiveness of the collected photos (intelligently eliminating invalid photos uploaded in real time on site) and facilitating the subsequent browsing and inspection of the sampled photos.
The digital watermarking technology is a computer information hiding technology based on a content and non-password mechanism. It is to embed some identification information (i.e. digital watermark) directly into the digital carrier (including multimedia, document, software, etc.) or indirectly (modifying the structure of a specific area), and it does not affect the use value of the original carrier, and is not easy to be ascertained and modified again. But can be identified and recognized by the producer. The information hidden in the carrier can achieve the purposes of confirming content creators and purchasers, transmitting secret information, judging whether the carrier is tampered or not and the like. Digital watermarking is an effective method for protecting information safety, realizing anti-counterfeiting tracing and copyright protection, and is an important branch and research direction in the field of information hiding technology research.
1) Safety: the information of the digital watermark should be safe and difficult to be falsified or forged, and meanwhile, the false detection rate should be low, and when the original content changes, the digital watermark should change, so that the change of the original data can be detected; of course, the digital watermark also has strong resistance to repeated addition;
2) concealment: digital watermarks should be imperceptible and should not affect the normal use of the protected data; the quality is not degraded;
3) robustness: this property is suitable for robust watermarking. That is, the digital watermark remains partially intact and can be accurately authenticated after undergoing various unintentional or intentional signal processing procedures. Possible signal processing procedures include channel noise, filtering, digital/analog and analog/digital conversion, resampling, shearing, displacement, scale change, lossy compression coding and the like;
4) sensitivity: this property applies to fragile watermarks. After the distribution, transmission and use processes, the digital watermark can accurately judge whether the data is falsified. Furthermore, the position and the degree of data tampering can be judged, and even the original information can be restored.
In the digital watermarking technology, a digital watermarking algorithm based on discrete wavelet transform is adopted, compared with the traditional DCT transform, the wavelet transform is variable in resolution, an analysis method combining a time domain and a frequency domain is adopted, the size of a time window is automatically adjusted along with the frequency, and the human visual characteristics are better met. The wavelet analysis has good locality in time and frequency domains, and provides good combination for traditional time domain analysis and frequency domain analysis.
(1) For discrete wavelet transform we define some signals and filters that need to be used, as shown in fig. 3.
x [ n ]: discrete input signal of length N.
g [ n ]: the low pass filter can filter the high frequency part of the input signal and output the low frequency part.
h [ n ]: the high pass filter filters out the low frequency portion and outputs the high frequency portion, as opposed to the low pass filter.
↓andQ: the downsampling filter outputs y [ n ] ═ x [ Qn ] if x [ n ] is used as input. Here, Q is 2.
After the above symbols are clearly defined, the hierarchical structure can be used to describe how to perform discrete wavelet transform on a discrete signal, as shown in fig. 4.
α th layer of the architecture (α th stage)
Figure RE-GDA0002387806770000051
(2) In wavelet analysis, it is often used to approximate details, which represent the high-scale, i.e., low-frequency, information of a signal; the details represent the high scale, i.e. high frequency information, of the signal. As shown in fig. 5, for a noisy signal, the main energy of the noise component is concentrated in the detail component of the wavelet solution.
In digital image processing, continuous wavelets and their wavelet transforms need to be discretized. In general, a binary discrete process is used in computer implementation, and the wavelet subjected to the discretization and the corresponding wavelet transform are converted into discrete wavelet transform (DWT for short). In practice, the discrete wavelet transform is obtained by discretizing the scale and displacement of the continuous wavelet transform by a power of 2, and is also called binary wavelet transform.
Although the classical fourier transform may reflect the overall connotation of the signal, the representation is often not intuitive and noise can complicate the signal spectrum. In the field of signal processing, a family of bandpass filters has been used to decompose a signal into different frequency components, i.e., signal f (x) is fed to a family of bandpass filters hi (x).
The significance of wavelet decomposition is that the signal can be decomposed on different scales, and the selection of different scales can be determined according to different targets.
For many signals, the low frequency component is important, often implying a characteristic of the signal, while the high frequency component gives details or differences in the signal. Human voice, if the high frequency components are removed, sounds different from before, but still knows what is being said; if enough low frequency components are removed, some meaningless sound is heard. Approximation and detail are commonly used in wavelet analysis. Approximately represents the high-scale, i.e., low-frequency, information of the signal; the details represent the high scale, i.e. high frequency information, of the signal. Thus, the original signal passes through two mutual filters to produce two signals.
By continuously decomposing the approximate signal through a continuous decomposition process, the signal can be decomposed into a plurality of low-resolution components. In theory the decomposition can proceed without restriction, but in fact the decomposition can proceed until the detail (high frequency) contains only a single sample. Therefore, in practical applications, the appropriate number of decomposition layers is generally selected according to the characteristics of the signal or an appropriate standard.
The foregoing detailed description of the preferred embodiments of the invention has been presented. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.

Claims (10)

1. The enterprise WeChat-based field management system is characterized by comprising a project access layer, a management configuration layer, a data acquisition layer and a business control layer, wherein the business control layer is realized by adopting a user unified authorization system; the data acquisition layer adopts a dynamic digital watermarking technology and a mobile terminal multi-place sign-in assessment system.
2. The enterprise wechat-based locale management system of claim 1, wherein the user unified authorization system comprises a wechat enterprise number-based mobile phone side application and a service side management platform application.
3. The enterprise wechat-based field management system of claim 1, wherein the user unified authorization system is comprised of a unified identity authentication management module, a unified identity authentication server, and an identity information storage server; the unified identity authentication management module consists of a management tool and a management server; the management tool realizes interface operation and delivers operation data to the management server, and the management server modifies the content in the identity information storage server according to the operation data.
4. The enterprise wechat-based locale management system of claim 3, wherein the unified identity authentication server provides a unified Webservice authentication service to the application program.
5. The enterprise wechat-based locale management system of claim 1, wherein the dynamic digital watermarking technology automatically identifies project related information based on time, location, etc. of collection by intelligently analyzing the collected photos.
6. The enterprise wechat-based locale management system of claim 5, wherein the dynamic digital watermarking technique employs a discrete wavelet transform-based digital watermarking algorithm.
7. The enterprise WeChat-based field management system according to claim 1, wherein the mobile-end multi-place check-in assessment system establishes a comparison function for automatically verifying the relationship among the check-in time, check-in place and check-in corresponding projects for project managers who need to manage a plurality of construction sites simultaneously.
8. The enterprise WeChat-based locale management system according to claim 1, wherein said locale management system employs a project circle management mode; and after the data acquisition layer personnel submit the acquired data, the field management system automatically synchronizes the related information to the project circle.
9. The enterprise wechat-based locale management system of claim 8, wherein the business management layer personnel directly review published content through the project circle.
10. The enterprise wechat-based locale management system of claim 1, wherein the implementation of the user unified authorization system is based on an SOA architecture, and an interface employs a SOAP XML standard.
CN201911398671.7A 2019-12-30 2019-12-30 On-site management system based on enterprise WeChat Pending CN111158322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911398671.7A CN111158322A (en) 2019-12-30 2019-12-30 On-site management system based on enterprise WeChat

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911398671.7A CN111158322A (en) 2019-12-30 2019-12-30 On-site management system based on enterprise WeChat

Publications (1)

Publication Number Publication Date
CN111158322A true CN111158322A (en) 2020-05-15

Family

ID=70559660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911398671.7A Pending CN111158322A (en) 2019-12-30 2019-12-30 On-site management system based on enterprise WeChat

Country Status (1)

Country Link
CN (1) CN111158322A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572000A (en) * 2016-10-29 2017-04-19 中国十七冶集团有限公司 WeChat official account platform-based construction site quality and safety management method
CN106803289A (en) * 2016-12-22 2017-06-06 五邑大学 A kind of false proof method and system of registering of intelligent mobile
CN108132943A (en) * 2016-11-30 2018-06-08 百度在线网络技术(北京)有限公司 For showing the method and device of the evaluation information of project
CN109166193A (en) * 2018-07-26 2019-01-08 饶四强 Taking pictures based on time, position, random number and bar code is checked card or evidence collecting method
US10356079B2 (en) * 2016-12-05 2019-07-16 Keeper Security, Inc. System and method for a single sign on connection in a zero-knowledge vault architecture
CN110084733A (en) * 2019-04-19 2019-08-02 中国科学院自动化研究所 The embedding grammar and system of text image watermark, extracting method and system
CN110263510A (en) * 2019-06-26 2019-09-20 东营瀚睿达信息科技有限责任公司 A kind of noninductive Verification System of software and hardware Unified Identity based on wechat enterprise

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572000A (en) * 2016-10-29 2017-04-19 中国十七冶集团有限公司 WeChat official account platform-based construction site quality and safety management method
CN108132943A (en) * 2016-11-30 2018-06-08 百度在线网络技术(北京)有限公司 For showing the method and device of the evaluation information of project
US10356079B2 (en) * 2016-12-05 2019-07-16 Keeper Security, Inc. System and method for a single sign on connection in a zero-knowledge vault architecture
CN106803289A (en) * 2016-12-22 2017-06-06 五邑大学 A kind of false proof method and system of registering of intelligent mobile
CN109166193A (en) * 2018-07-26 2019-01-08 饶四强 Taking pictures based on time, position, random number and bar code is checked card or evidence collecting method
CN110084733A (en) * 2019-04-19 2019-08-02 中国科学院自动化研究所 The embedding grammar and system of text image watermark, extracting method and system
CN110263510A (en) * 2019-06-26 2019-09-20 东营瀚睿达信息科技有限责任公司 A kind of noninductive Verification System of software and hardware Unified Identity based on wechat enterprise

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
毛世杰: "《Java Web服务》", 31 March 2003, 中国电力出版社 *
郑文礼: "《管理信息系统原理与应用》", 31 August 2016, 厦门大学出版社 *
黄育舜: "基于"企业微信"的现场管理系统开发与实现", 《上海煤气》 *

Similar Documents

Publication Publication Date Title
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
CN110020956B (en) Cross-block-chain interaction method and system, computer equipment and storage medium
Kumar et al. Image Transformation Technique Using Steganography Methods Using LWT Technique Image Transformation Technique Using Steganography Methods Using LWT Technique
US8144924B2 (en) Content objects with computer instructions steganographically encoded therein, and associated methods
US20190005268A1 (en) Universal original document validation platform
Wolthusen Overcast: Forensic discovery in cloud environments
CN102622545B (en) Picture file tracking method
Adam Preserving authenticity in the digital age
Gupta et al. An insight review on multimedia forensics technology
Katariya Digital watermarking
Kirovski Multimedia watermarking techniques and applications
CN111158322A (en) On-site management system based on enterprise WeChat
CN109992984B (en) File identification method and equipment based on two-dimensional code
Stanković et al. Image watermarking based on the space/spatial-frequency analysis and Hermite functions expansion
Cao et al. Research on database watermarking based on independent component analysis and multiple rolling
Gupta et al. Secret image digitization over public cloud through Cbtv based image fusion
Kamble et al. DWT-based multiple watermarking for privacy and security of digital images in e-commerce
Yao et al. A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments
Rastogi et al. Implementation of digital watermarking technique to secure IPR of web application code
Liu et al. A watermarking-based authentication and recovery scheme for encrypted audio
Chen et al. Application Research of electronic authorized steganographic seal management and control platform based on invisible watermark
Aghbabaeyan et al. Review of digital watermarking techniques
CN115795417B (en) Method and device for tracing OOXML document, electronic equipment and storage medium
Koundinya et al. Characteristic overview of digital image forensics tools
Ahmed et al. Design and Development of Cloud based QR Coded Watermarking DLP system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No.162 Weifang Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200122

Applicant after: Shanghai Energy Construction Group Co.,Ltd.

Address before: No.162 Weifang Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200122

Applicant before: SHANGHAI MUNICIPAL GAS NO.2 PIPELINES ENGINEERING Co.,Ltd.

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200515