CN106023040B - Integral management system - Google Patents
Integral management system Download PDFInfo
- Publication number
- CN106023040B CN106023040B CN201610394922.4A CN201610394922A CN106023040B CN 106023040 B CN106023040 B CN 106023040B CN 201610394922 A CN201610394922 A CN 201610394922A CN 106023040 B CN106023040 B CN 106023040B
- Authority
- CN
- China
- Prior art keywords
- user terminal
- server
- user
- module
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Abstract
The invention discloses a point management system, which comprises: the terminal is used for sending an operation request and checking return data by a user; the server is connected with the terminal, receives the operation request, and operates internal data according to the operation request or sends the return data to the terminal; and the second server is connected with the server and performs data interaction regularly. In this way, the credit management system can manage the credit and can quickly and safely transfer data between the server and the second server.
Description
Technical Field
The invention relates to the technical field of point management, in particular to a point management system.
Background
As society develops, the phenomenon of population movement becomes more frequent. The general floating population refers to an adult child-bearing age person who leaves a county, a city or a prefecture of a family residence and inhabits in a different place for the purpose of work and life.
It is a current trend to provide services for floating population in all aspects of life such as work, medical treatment, education, equity and government affairs. At present, some regions adopt a point policy for floating population, but a complete point management system is not used for managing points.
In view of the above-mentioned drawbacks, the inventors of the present invention have finally obtained the present invention through a long period of research and practice.
Disclosure of Invention
In order to solve the technical defects, the technical solution adopted by the present invention is to provide an integration management system, which includes:
the terminal is used for sending an operation request and checking return data by a user;
the server is connected with the terminal, receives the operation request, and operates internal data according to the operation request or sends the return data to the terminal;
and the second server is connected with the server and performs data interaction regularly.
Preferably, the server provides a data interaction interface, performs data interaction with the second server at regular time, and updates the stored data.
Preferably, the second server is a government intranet.
Preferably, the terminal includes: the system comprises a first user terminal, a second user terminal and a third user terminal, wherein an individual user operates through the first user terminal, and sends an operation request to the server or checks the return data of the server; the second user terminal is used for sending the operation request of an enterprise user/collective user/community user and displaying the return data of the enterprise user/collective user/community user; and the third user terminal is used for sending the operation request of the approval user and displaying the return data of the approval user.
Preferably, the server includes a server, and the server is connected to the first user terminal, the second user terminal, and the third user terminal, respectively, assigns different permissions to the first user terminal, the second user terminal, and the third user terminal, receives the operation request sent by the first user terminal, the second user terminal, and the third user terminal, responds to the operation request in the corresponding permission, and sends an operation result as the return data to the first user terminal, the second user terminal, and the third user terminal.
Preferably, the server further comprises a database; the database is connected with the server and stores the data of the first user terminal, the second user terminal and the third user terminal for the server to call.
Preferably, the server comprises a registration module and a cache module; the registration module receives registration information sent by the first user terminal and the second user terminal, determines whether the registration information is correct, stores the correct registration information in the cache module 216, and allocates corresponding rights.
Preferably, the server comprises an approval module and a cache module; the examination and approval module receives the application information of the second user terminal, distinguishes the application information, sends the application information to the corresponding examination and approval user for examination and approval, and distributes the assigning right to the user and stores the assigning right in the cache module after receiving the indication that the examination and approval is passed.
Preferably, the server comprises a assigning module and a caching module; the assigning module receives assigning information of the second user terminal or the third user terminal, extracts corresponding authority information from the cache module to judge whether the assigning information accords with corresponding authority, and updates the information of the individual user assigned in the cache module according to the assigning information which accords with the authority.
Preferably, the server further includes an encryption module to encrypt the data of the server, where the encryption formula is:
b1=a7mod 15
wherein a is plaintext, b is ciphertext, and b1Is the intermediate variable, e is the Euler number.
Compared with the prior art, the invention has the beneficial effects that: in this way, the point management system can manage the points and can quickly and safely transfer data between the server and the second server; the first user terminal is a mobile terminal such as a mobile phone and an IPAD (Internet protocol ad), so that the first user terminal is convenient to carry and can check personal information at any time; the terminal can also be a terminal fixedly arranged on a desktop computer and the like, so that the operation and the check can be carried out in a fixed place; the 7 th power of the plaintext is solved, so that the plaintext is converted into more complex data, the complexity of decryption is increased, and the possibility of being decrypted is reduced; through modular operation, the complex data is simplified into intermediate variables, so that the complexity of the intermediate variables is reduced, the complex data is limited to be an integer of 0-14, meanwhile, through a method of first complicating and then simplifying, a plaintext is prevented from being reversely deduced from the intermediate variables, and the possibility of being decrypted is reduced; by carrying out continuous addition on positive integers which are not more than the intermediate variable, and taking the continuous addition as the exponent of the natural number e, and by solving the power value of the natural number e which takes the continuous addition as the exponent, the intermediate variable is processed, so that on one hand, the complexity of a ciphertext can be improved, and meanwhile, the natural number e is taken as a base number, and the ciphertext can be conveniently decrypted after being received; taking the logarithm of the intermediate variable and multiplying the logarithm by the power value, thereby reducing the numerical value of the finally determined ciphertext on one hand, and increasing the complexity of the determined ciphertext on the other hand, and reducing the possibility of being reversely deduced by the original path; the whole encryption formula has a simple structure, is convenient to calculate and is convenient for encrypting data; and the double-layer encryption is adopted, so that the encryption degree is high, the safety is good, and the data can be rapidly and safely transmitted.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below.
FIG. 1 is a block diagram of the point management system of the present invention;
fig. 2 is a block diagram of the server according to the present invention.
Detailed Description
The above and further features and advantages of the present invention are described in more detail below with reference to the accompanying drawings.
As shown in fig. 1, it is a block diagram of the point management system of the present invention, wherein the point management system includes:
a terminal 1 through which a user sends an operation request and views return data;
the server 2 is connected with the terminal 1, receives the operation request, and operates internal data or sends return data to the terminal according to the operation request;
and the second server 3 is connected with the server 2 and performs data interaction at regular time.
In this way, the credit management system can manage the credit and can quickly and safely transfer data between the server 2 and the second server 3.
< terminal > < terminal
The terminal 1 may be a device capable of sending and receiving data, such as a mobile phone, a computer, a notebook, an IPAD, and the like, and the user performs an operation through the terminal 1 to send an operation request to the server 2 or check data returned by the server 2.
The terminal 1 includes: the system comprises a first user terminal 11, a second user terminal 12 and a third user terminal 13, wherein the first user terminal 11 is used for sending an operation request of an individual user and displaying return data of the individual user; the individual user operates through the first user terminal 11, and sends an operation request to the server 2 or checks the return data of the server 2.
The first user terminal 11 is a mobile terminal such as a mobile phone and an IPAD, so that the first user terminal is convenient to carry and can check personal information at any time; the terminal can also be a terminal fixedly arranged on a desktop computer and the like, so that the terminal can be operated and checked at a fixed place.
The second user terminal 12 is used for sending operation requests of enterprise users/collective users/community users and displaying return data of the enterprise users/collective users/community users; the enterprise user/collective user/community user operates through the second user terminal 12, and sends an operation request to the server 2 or views the return data of the server 2.
The second user terminal 12 is a terminal fixedly placed on a desktop computer or the like, so that the operation and the check can be performed only in a fixed place, and the safety of information operation is improved.
The third user terminal is used for sending an operation request of the approval user and displaying return data of the approval user; the approval user operates through the third user terminal 13, and sends an operation request to the server 2 or checks the return data of the server 2.
The third user terminal 13 is a terminal fixedly placed such as a desktop computer, so that the operation and the check can be performed only in a fixed place, and the safety of information operation is improved.
< service terminal >
As shown in fig. 2, the server 2 includes a server 21 and a database 22; the server is respectively connected with the first user terminal 11, the second user terminal 12 and the third user terminal 13, different authorities are distributed to the first user terminal 11, the second user terminal 12 and the third user terminal 13, operation requests sent by the first user terminal 11, the second user terminal 12 and the third user terminal 13 are received, the operation requests in the corresponding authorities are responded, and operation results are sent to the database 22 or sent to the first user terminal 11, the second user terminal 12 and the third user terminal 13 as return data; the database 22 is connected to the server 21 and stores data of the first user terminal 11, the second user terminal 12 and the third user terminal 13 for retrieval by the server 21.
The server 21 is connected to the second server 3, and exchanges data with the second server 3 at regular time, and updates the data in the database 22 according to the exchanged data.
The server 21 includes a registration module 211, an approval module 212, an assigning module 213, an inquiry module 214, a two-dimensional code generation module 215, and a cache module 216; wherein:
the registration module 211 receives the registration information sent by the first user terminal 11 and the second user terminal 12, determines whether the registration information is correct, stores the correct registration information in the cache module 216, and assigns corresponding rights; the registration information of the first user terminal 11 includes: identity card number, mobile phone number and identifying code; the registration information of the second user terminal 12 includes: mobile phone number, identifying code, user type.
The individual user sends the registration information to the registration module 211 through the first user terminal 11, and the registration module 211 determines the correctness of the registration information and stores the correct registration information in the cache module 216, allocates a corresponding right, and returns a user name and a password for successful registration to the first user terminal 11.
The approval module 212 receives the application information of the second user terminal 12, distinguishes the application information by the organization structure code, sends the application information to the corresponding approval user for approval, and distributes the assigning right to the user after receiving the approval passing indication and stores the assigning right in the cache module 216.
The application information includes: organization structure code, contact person, mobile phone number.
The approval user includes: the system comprises a statistical bureau, a credit bureau, a safety supervision bureau, an environmental protection bureau, a public security bureau, a judicial bureau, a human-social bureau, a health bureau and an education bureau, wherein corresponding examination and approval users can be selected to examine and approve according to an organization structure code certificate during operation.
The assigning module 213 receives the assigning information of the second user terminal 12 or the third user terminal 13, extracts the corresponding right information from the buffer module 216 to determine whether the assigning information conforms to the corresponding right, and updates the information of the assigned individual user in the buffer module 216 according to the assigning information conforming to the right.
The query module 214 receives query information of the first user terminal 11, the second user terminal 12, or the third user terminal 13, extracts corresponding right information from the buffer module 216 to determine whether the query information conforms to the corresponding right, and extracts corresponding information from the buffer module 216 as return data according to the query information conforming to the right, and sends the return data to the first user terminal 11, the second user terminal 12, or the third user terminal 13.
The two-dimensional code generation module 215 receives the generation information of the first user terminal 11, extracts the corresponding information from the buffer module 216 to generate a two-dimensional code, and sends the generated two-dimensional code to the first user terminal 11 for display. Therefore, basic information of an individual user can be quickly displayed through the two-dimensional code, or personal information can be quickly read through an external reading device; thus, identification of personal information is facilitated.
The cache module 216 is coupled to the database 22 and reads data from the database 22 and writes stored data to the database 22. Therefore, on one hand, the server can directly extract data from the buffer module, and the transmission speed of the data is improved; on the other hand, the storage space of the server 2 is also increased.
< second service terminal >
The second server 3 is a government intranet, the server 2 provides a data interaction interface, and performs data interaction with the second server 3 at regular time to update stored data; in this way, the security of data interaction can be improved.
Example 2
The point management system as described above, the difference between the embodiment and the embodiment is that the server 2 further includes an encryption module to encrypt the data of the server 2, so that the security of the data can be improved. Meanwhile, the data transmitted to the second server 3 by the server 2 can be encrypted, so that the security of data transmission is improved.
Wherein, the encryption formula is:
b1=a7mod 15
wherein a is plaintext, b is ciphertext, and b1Is the intermediate variable, e is the Euler number.
Here, x is an unknown number in the running notation, and may be regarded as the number of each value in the running notation, except that the number of each value is the same size as the corresponding value, where x is an integer.
The specific idea is as follows: solving the 7 th power of a plaintext, then carrying out modulo 15 operation, (solving the remainder after dividing by 15), and obtaining an intermediate variable; and taking the logarithm of the intermediate variable, simultaneously carrying out continuous addition on positive integers not larger than the intermediate variable, taking the continuous addition as the exponent of the natural number e, and finally obtaining the product of the power value of the natural number e taking the continuous addition as the exponent and the logarithm to be used as a ciphertext.
Some existing encryption methods are simple in encryption, but the encryption effect is poor; some encryption effects are good, but the encryption process is complex; and inconvenience is brought to safe and high-speed data transmission.
The beneficial effects are that: the 7 th power of the plaintext is solved, so that the plaintext is converted into more complex data, the complexity of decryption is increased, and the possibility of being decrypted is reduced; through modular operation, the complex data is simplified into intermediate variables, so that the complexity of the intermediate variables is reduced, the complex data is limited to be an integer of 0-14, meanwhile, through a method of first complicating and then simplifying, a plaintext is prevented from being reversely deduced from the intermediate variables, and the possibility of being decrypted is reduced; by carrying out continuous addition on positive integers which are not more than the intermediate variable, and taking the continuous addition as the exponent of the natural number e, and by solving the power value of the natural number e which takes the continuous addition as the exponent, the intermediate variable is processed, so that on one hand, the complexity of a ciphertext can be improved, and meanwhile, the natural number e is taken as a base number, and the ciphertext can be conveniently decrypted after being received; taking the logarithm of the intermediate variable and multiplying the logarithm by the power value, thereby reducing the numerical value of the finally determined ciphertext on one hand, and increasing the complexity of the determined ciphertext on the other hand, and reducing the possibility of being reversely deduced by the original path; the whole encryption formula has a simple structure, is convenient to calculate and is convenient for encrypting data; and the double-layer encryption is adopted, so that the encryption degree is high, the safety is good, and the data can be rapidly and safely transmitted.
The euler number e is typically used for the base of the natural logarithm.
The foregoing is merely a preferred embodiment of the invention, which is intended to be illustrative and not limiting. It will be understood by those skilled in the art that various changes, modifications and equivalents may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (9)
1. A points management system, comprising:
the terminal is used for sending an operation request and checking return data by a user;
the server is connected with the terminal, receives the operation request, and operates internal data according to the operation request or sends the return data to the terminal;
the second server is connected with the server and performs data interaction regularly;
wherein, the server side includes: the system comprises a registration module, an approval module, a assigning module and a cache module, wherein the registration module is used for receiving registration information sent by the terminal, storing correct registration information in the cache module and distributing corresponding authority; the examination and approval module receives the application information of the terminal, sends the application information to the corresponding examination and approval user for examination and approval, and after receiving the indication that the examination and approval is passed, allocates the assigning right to the user and stores the assigning right in the cache module; the assigning module is used for receiving assigning information of the terminal, extracting corresponding authority information from the cache module to judge whether the assigning information accords with corresponding authority, and updating the information of the assigned individual user in the cache module according to the assigning information which accords with the authority;
the server side further comprises an encryption module for encrypting the data of the server side, wherein an encryption formula is as follows:
b1=a7mod15
wherein a is plaintext, b is ciphertext, and b1Is the intermediate variable, e is the Euler number.
2. The point management system according to claim 1, wherein the server provides a data interaction interface, and performs data interaction with the second server at regular time to update the stored data.
3. The point management system according to claim 1, wherein the second server is an intranet.
4. A point management system according to any one of claims 1 to 3, wherein the terminal comprises: the system comprises a first user terminal, a second user terminal and a third user terminal, wherein an individual user operates through the first user terminal, and sends an operation request to the server or checks the return data of the server; the second user terminal is used for sending the operation request of an enterprise user/collective user/community user and displaying the return data of the enterprise user/collective user/community user; and the third user terminal is used for sending the operation request of the approval user and displaying the return data of the approval user.
5. The point management system according to claim 4, wherein the server includes a server, the server is connected to the first user terminal, the second user terminal, and the third user terminal, respectively, assigns different rights to the first user terminal, the second user terminal, and the third user terminal, receives the operation requests sent by the first user terminal, the second user terminal, and the third user terminal, responds to the operation requests in the corresponding rights, and sends operation results as the return data to the first user terminal, the second user terminal, and the third user terminal.
6. The points management system of claim 5, wherein the server further comprises a database; the database is connected with the server and stores the data of the first user terminal, the second user terminal and the third user terminal for the server to call.
7. The points management system of claim 6, wherein the server comprises the registration module and the caching module; the registration module receives registration information sent by the first user terminal and the second user terminal, judges whether the registration information is correct or not, and stores the correct registration information in the cache module.
8. The point management system according to claim 6, wherein the server comprises the approval module and the caching module; and the approval module receives the application information of the second user terminal and distinguishes the application information.
9. The point management system according to claim 6, wherein the server includes the assigning module and the caching module; and the assigning module receives assigning information of the second user terminal or the third user terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610394922.4A CN106023040B (en) | 2016-06-03 | 2016-06-03 | Integral management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610394922.4A CN106023040B (en) | 2016-06-03 | 2016-06-03 | Integral management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106023040A CN106023040A (en) | 2016-10-12 |
CN106023040B true CN106023040B (en) | 2021-09-14 |
Family
ID=57089707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610394922.4A Active CN106023040B (en) | 2016-06-03 | 2016-06-03 | Integral management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106023040B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216754A (en) * | 2007-12-27 | 2008-07-09 | 广州杰赛科技股份有限公司 | Modular multiplication processing method, data encryption and decryption processing method and device |
CN105338002A (en) * | 2015-12-04 | 2016-02-17 | 上海斐讯数据通信技术有限公司 | Security management system for third-party server |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI244610B (en) * | 2001-04-17 | 2005-12-01 | Matsushita Electric Ind Co Ltd | Information security device, prime number generation device, and prime number generation method |
-
2016
- 2016-06-03 CN CN201610394922.4A patent/CN106023040B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216754A (en) * | 2007-12-27 | 2008-07-09 | 广州杰赛科技股份有限公司 | Modular multiplication processing method, data encryption and decryption processing method and device |
CN105338002A (en) * | 2015-12-04 | 2016-02-17 | 上海斐讯数据通信技术有限公司 | Security management system for third-party server |
Non-Patent Citations (1)
Title |
---|
潍坊市高危流动人口信息管理系统的设计与实现;王育俐;《中国优秀硕士学位论文全文数据库》;20120430;第18-19、23-26、31、36页 * |
Also Published As
Publication number | Publication date |
---|---|
CN106023040A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11652608B2 (en) | System and method to protect sensitive information via distributed trust | |
CN105577368B (en) | The medical diagnosis service-seeking system and method for two-way secret protection | |
Sun et al. | Data security and privacy in cloud computing | |
KR101843340B1 (en) | Privacy-preserving collaborative filtering | |
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
CN111431936A (en) | Authorization processing method, device, equipment and system based on verifiable statement | |
CN107948146A (en) | A kind of connection keyword retrieval method based on encryption attribute in mixed cloud | |
CN109165526B (en) | Big data security and privacy protection method and device and storage medium | |
CN107689950A (en) | Data publication method, apparatus, server and storage medium | |
US20230359631A1 (en) | Updatable private set intersection | |
CN103780393A (en) | Virtual-desktop security certification system and method facing multiple security levels | |
US20090178130A1 (en) | Verifying that group membership requirements are met by users | |
US20240143795A1 (en) | Method and device for intersecting unbalanced private sets | |
CN111490995A (en) | Model training method and device for protecting privacy, data processing method and server | |
CN113434906B (en) | Data query method, device, computer equipment and storage medium | |
Dharminder | Lwedm: Learning with error based secure mobile digital rights management system | |
US20060192651A1 (en) | Data transmit system and transmit methods by using n-dimensional information | |
CN108650268A (en) | It is a kind of realize multistage access can search for encryption method and system | |
Singh et al. | Senso scale: a framework to preserve privacy over cloud using sensitivity range | |
CN115471860B (en) | Express real name checking method, system and computer readable storage medium | |
CN106023040B (en) | Integral management system | |
CN104580262A (en) | Safety method applicable to wireless internet of things | |
Liu et al. | ptwitterrec: A privacy-preserving personalized tweet recommendation framework | |
Maragathavalli et al. | Cloud data security model using modified decoy technique in fog computing for E-healthcare | |
De Montjoye | Computational privacy: towards privacy-conscientious uses of metadata |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: Room 1503, Fengting Building, Building 006 (15-1), No. 375, Jiangdong North Road, Yinzhou District, Ningbo City, Zhejiang Province, 315040 Patentee after: Zhejiang onest Information Technology Co.,Ltd. Address before: 15F, Fengting building, Hefeng creative Plaza, 375 Jiangdong North Road, Jiangdong District, Ningbo, Zhejiang 315040 Patentee before: HONEST (NINGBO) SOFTWARE TECHNOLOGY CO.,LTD. |
|
CP03 | Change of name, title or address |