CN106023040B - Integral management system - Google Patents

Integral management system Download PDF

Info

Publication number
CN106023040B
CN106023040B CN201610394922.4A CN201610394922A CN106023040B CN 106023040 B CN106023040 B CN 106023040B CN 201610394922 A CN201610394922 A CN 201610394922A CN 106023040 B CN106023040 B CN 106023040B
Authority
CN
China
Prior art keywords
user terminal
server
user
module
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610394922.4A
Other languages
Chinese (zh)
Other versions
CN106023040A (en
Inventor
李达
徐杰
孙艺
姜秋华
王静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang onest Information Technology Co.,Ltd.
Original Assignee
Honest Ningbo Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honest Ningbo Software Technology Co ltd filed Critical Honest Ningbo Software Technology Co ltd
Priority to CN201610394922.4A priority Critical patent/CN106023040B/en
Publication of CN106023040A publication Critical patent/CN106023040A/en
Application granted granted Critical
Publication of CN106023040B publication Critical patent/CN106023040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

The invention discloses a point management system, which comprises: the terminal is used for sending an operation request and checking return data by a user; the server is connected with the terminal, receives the operation request, and operates internal data according to the operation request or sends the return data to the terminal; and the second server is connected with the server and performs data interaction regularly. In this way, the credit management system can manage the credit and can quickly and safely transfer data between the server and the second server.

Description

Integral management system
Technical Field
The invention relates to the technical field of point management, in particular to a point management system.
Background
As society develops, the phenomenon of population movement becomes more frequent. The general floating population refers to an adult child-bearing age person who leaves a county, a city or a prefecture of a family residence and inhabits in a different place for the purpose of work and life.
It is a current trend to provide services for floating population in all aspects of life such as work, medical treatment, education, equity and government affairs. At present, some regions adopt a point policy for floating population, but a complete point management system is not used for managing points.
In view of the above-mentioned drawbacks, the inventors of the present invention have finally obtained the present invention through a long period of research and practice.
Disclosure of Invention
In order to solve the technical defects, the technical solution adopted by the present invention is to provide an integration management system, which includes:
the terminal is used for sending an operation request and checking return data by a user;
the server is connected with the terminal, receives the operation request, and operates internal data according to the operation request or sends the return data to the terminal;
and the second server is connected with the server and performs data interaction regularly.
Preferably, the server provides a data interaction interface, performs data interaction with the second server at regular time, and updates the stored data.
Preferably, the second server is a government intranet.
Preferably, the terminal includes: the system comprises a first user terminal, a second user terminal and a third user terminal, wherein an individual user operates through the first user terminal, and sends an operation request to the server or checks the return data of the server; the second user terminal is used for sending the operation request of an enterprise user/collective user/community user and displaying the return data of the enterprise user/collective user/community user; and the third user terminal is used for sending the operation request of the approval user and displaying the return data of the approval user.
Preferably, the server includes a server, and the server is connected to the first user terminal, the second user terminal, and the third user terminal, respectively, assigns different permissions to the first user terminal, the second user terminal, and the third user terminal, receives the operation request sent by the first user terminal, the second user terminal, and the third user terminal, responds to the operation request in the corresponding permission, and sends an operation result as the return data to the first user terminal, the second user terminal, and the third user terminal.
Preferably, the server further comprises a database; the database is connected with the server and stores the data of the first user terminal, the second user terminal and the third user terminal for the server to call.
Preferably, the server comprises a registration module and a cache module; the registration module receives registration information sent by the first user terminal and the second user terminal, determines whether the registration information is correct, stores the correct registration information in the cache module 216, and allocates corresponding rights.
Preferably, the server comprises an approval module and a cache module; the examination and approval module receives the application information of the second user terminal, distinguishes the application information, sends the application information to the corresponding examination and approval user for examination and approval, and distributes the assigning right to the user and stores the assigning right in the cache module after receiving the indication that the examination and approval is passed.
Preferably, the server comprises a assigning module and a caching module; the assigning module receives assigning information of the second user terminal or the third user terminal, extracts corresponding authority information from the cache module to judge whether the assigning information accords with corresponding authority, and updates the information of the individual user assigned in the cache module according to the assigning information which accords with the authority.
Preferably, the server further includes an encryption module to encrypt the data of the server, where the encryption formula is:
b1=a7mod 15
Figure BDA0001008960140000031
wherein a is plaintext, b is ciphertext, and b1Is the intermediate variable, e is the Euler number.
Compared with the prior art, the invention has the beneficial effects that: in this way, the point management system can manage the points and can quickly and safely transfer data between the server and the second server; the first user terminal is a mobile terminal such as a mobile phone and an IPAD (Internet protocol ad), so that the first user terminal is convenient to carry and can check personal information at any time; the terminal can also be a terminal fixedly arranged on a desktop computer and the like, so that the operation and the check can be carried out in a fixed place; the 7 th power of the plaintext is solved, so that the plaintext is converted into more complex data, the complexity of decryption is increased, and the possibility of being decrypted is reduced; through modular operation, the complex data is simplified into intermediate variables, so that the complexity of the intermediate variables is reduced, the complex data is limited to be an integer of 0-14, meanwhile, through a method of first complicating and then simplifying, a plaintext is prevented from being reversely deduced from the intermediate variables, and the possibility of being decrypted is reduced; by carrying out continuous addition on positive integers which are not more than the intermediate variable, and taking the continuous addition as the exponent of the natural number e, and by solving the power value of the natural number e which takes the continuous addition as the exponent, the intermediate variable is processed, so that on one hand, the complexity of a ciphertext can be improved, and meanwhile, the natural number e is taken as a base number, and the ciphertext can be conveniently decrypted after being received; taking the logarithm of the intermediate variable and multiplying the logarithm by the power value, thereby reducing the numerical value of the finally determined ciphertext on one hand, and increasing the complexity of the determined ciphertext on the other hand, and reducing the possibility of being reversely deduced by the original path; the whole encryption formula has a simple structure, is convenient to calculate and is convenient for encrypting data; and the double-layer encryption is adopted, so that the encryption degree is high, the safety is good, and the data can be rapidly and safely transmitted.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below.
FIG. 1 is a block diagram of the point management system of the present invention;
fig. 2 is a block diagram of the server according to the present invention.
Detailed Description
The above and further features and advantages of the present invention are described in more detail below with reference to the accompanying drawings.
As shown in fig. 1, it is a block diagram of the point management system of the present invention, wherein the point management system includes:
a terminal 1 through which a user sends an operation request and views return data;
the server 2 is connected with the terminal 1, receives the operation request, and operates internal data or sends return data to the terminal according to the operation request;
and the second server 3 is connected with the server 2 and performs data interaction at regular time.
In this way, the credit management system can manage the credit and can quickly and safely transfer data between the server 2 and the second server 3.
< terminal > < terminal
The terminal 1 may be a device capable of sending and receiving data, such as a mobile phone, a computer, a notebook, an IPAD, and the like, and the user performs an operation through the terminal 1 to send an operation request to the server 2 or check data returned by the server 2.
The terminal 1 includes: the system comprises a first user terminal 11, a second user terminal 12 and a third user terminal 13, wherein the first user terminal 11 is used for sending an operation request of an individual user and displaying return data of the individual user; the individual user operates through the first user terminal 11, and sends an operation request to the server 2 or checks the return data of the server 2.
The first user terminal 11 is a mobile terminal such as a mobile phone and an IPAD, so that the first user terminal is convenient to carry and can check personal information at any time; the terminal can also be a terminal fixedly arranged on a desktop computer and the like, so that the terminal can be operated and checked at a fixed place.
The second user terminal 12 is used for sending operation requests of enterprise users/collective users/community users and displaying return data of the enterprise users/collective users/community users; the enterprise user/collective user/community user operates through the second user terminal 12, and sends an operation request to the server 2 or views the return data of the server 2.
The second user terminal 12 is a terminal fixedly placed on a desktop computer or the like, so that the operation and the check can be performed only in a fixed place, and the safety of information operation is improved.
The third user terminal is used for sending an operation request of the approval user and displaying return data of the approval user; the approval user operates through the third user terminal 13, and sends an operation request to the server 2 or checks the return data of the server 2.
The third user terminal 13 is a terminal fixedly placed such as a desktop computer, so that the operation and the check can be performed only in a fixed place, and the safety of information operation is improved.
< service terminal >
As shown in fig. 2, the server 2 includes a server 21 and a database 22; the server is respectively connected with the first user terminal 11, the second user terminal 12 and the third user terminal 13, different authorities are distributed to the first user terminal 11, the second user terminal 12 and the third user terminal 13, operation requests sent by the first user terminal 11, the second user terminal 12 and the third user terminal 13 are received, the operation requests in the corresponding authorities are responded, and operation results are sent to the database 22 or sent to the first user terminal 11, the second user terminal 12 and the third user terminal 13 as return data; the database 22 is connected to the server 21 and stores data of the first user terminal 11, the second user terminal 12 and the third user terminal 13 for retrieval by the server 21.
The server 21 is connected to the second server 3, and exchanges data with the second server 3 at regular time, and updates the data in the database 22 according to the exchanged data.
The server 21 includes a registration module 211, an approval module 212, an assigning module 213, an inquiry module 214, a two-dimensional code generation module 215, and a cache module 216; wherein:
the registration module 211 receives the registration information sent by the first user terminal 11 and the second user terminal 12, determines whether the registration information is correct, stores the correct registration information in the cache module 216, and assigns corresponding rights; the registration information of the first user terminal 11 includes: identity card number, mobile phone number and identifying code; the registration information of the second user terminal 12 includes: mobile phone number, identifying code, user type.
The individual user sends the registration information to the registration module 211 through the first user terminal 11, and the registration module 211 determines the correctness of the registration information and stores the correct registration information in the cache module 216, allocates a corresponding right, and returns a user name and a password for successful registration to the first user terminal 11.
The approval module 212 receives the application information of the second user terminal 12, distinguishes the application information by the organization structure code, sends the application information to the corresponding approval user for approval, and distributes the assigning right to the user after receiving the approval passing indication and stores the assigning right in the cache module 216.
The application information includes: organization structure code, contact person, mobile phone number.
The approval user includes: the system comprises a statistical bureau, a credit bureau, a safety supervision bureau, an environmental protection bureau, a public security bureau, a judicial bureau, a human-social bureau, a health bureau and an education bureau, wherein corresponding examination and approval users can be selected to examine and approve according to an organization structure code certificate during operation.
The assigning module 213 receives the assigning information of the second user terminal 12 or the third user terminal 13, extracts the corresponding right information from the buffer module 216 to determine whether the assigning information conforms to the corresponding right, and updates the information of the assigned individual user in the buffer module 216 according to the assigning information conforming to the right.
The query module 214 receives query information of the first user terminal 11, the second user terminal 12, or the third user terminal 13, extracts corresponding right information from the buffer module 216 to determine whether the query information conforms to the corresponding right, and extracts corresponding information from the buffer module 216 as return data according to the query information conforming to the right, and sends the return data to the first user terminal 11, the second user terminal 12, or the third user terminal 13.
The two-dimensional code generation module 215 receives the generation information of the first user terminal 11, extracts the corresponding information from the buffer module 216 to generate a two-dimensional code, and sends the generated two-dimensional code to the first user terminal 11 for display. Therefore, basic information of an individual user can be quickly displayed through the two-dimensional code, or personal information can be quickly read through an external reading device; thus, identification of personal information is facilitated.
The cache module 216 is coupled to the database 22 and reads data from the database 22 and writes stored data to the database 22. Therefore, on one hand, the server can directly extract data from the buffer module, and the transmission speed of the data is improved; on the other hand, the storage space of the server 2 is also increased.
< second service terminal >
The second server 3 is a government intranet, the server 2 provides a data interaction interface, and performs data interaction with the second server 3 at regular time to update stored data; in this way, the security of data interaction can be improved.
Example 2
The point management system as described above, the difference between the embodiment and the embodiment is that the server 2 further includes an encryption module to encrypt the data of the server 2, so that the security of the data can be improved. Meanwhile, the data transmitted to the second server 3 by the server 2 can be encrypted, so that the security of data transmission is improved.
Wherein, the encryption formula is:
b1=a7mod 15
Figure BDA0001008960140000071
wherein a is plaintext, b is ciphertext, and b1Is the intermediate variable, e is the Euler number.
Here, x is an unknown number in the running notation, and may be regarded as the number of each value in the running notation, except that the number of each value is the same size as the corresponding value, where x is an integer.
The specific idea is as follows: solving the 7 th power of a plaintext, then carrying out modulo 15 operation, (solving the remainder after dividing by 15), and obtaining an intermediate variable; and taking the logarithm of the intermediate variable, simultaneously carrying out continuous addition on positive integers not larger than the intermediate variable, taking the continuous addition as the exponent of the natural number e, and finally obtaining the product of the power value of the natural number e taking the continuous addition as the exponent and the logarithm to be used as a ciphertext.
Some existing encryption methods are simple in encryption, but the encryption effect is poor; some encryption effects are good, but the encryption process is complex; and inconvenience is brought to safe and high-speed data transmission.
The beneficial effects are that: the 7 th power of the plaintext is solved, so that the plaintext is converted into more complex data, the complexity of decryption is increased, and the possibility of being decrypted is reduced; through modular operation, the complex data is simplified into intermediate variables, so that the complexity of the intermediate variables is reduced, the complex data is limited to be an integer of 0-14, meanwhile, through a method of first complicating and then simplifying, a plaintext is prevented from being reversely deduced from the intermediate variables, and the possibility of being decrypted is reduced; by carrying out continuous addition on positive integers which are not more than the intermediate variable, and taking the continuous addition as the exponent of the natural number e, and by solving the power value of the natural number e which takes the continuous addition as the exponent, the intermediate variable is processed, so that on one hand, the complexity of a ciphertext can be improved, and meanwhile, the natural number e is taken as a base number, and the ciphertext can be conveniently decrypted after being received; taking the logarithm of the intermediate variable and multiplying the logarithm by the power value, thereby reducing the numerical value of the finally determined ciphertext on one hand, and increasing the complexity of the determined ciphertext on the other hand, and reducing the possibility of being reversely deduced by the original path; the whole encryption formula has a simple structure, is convenient to calculate and is convenient for encrypting data; and the double-layer encryption is adopted, so that the encryption degree is high, the safety is good, and the data can be rapidly and safely transmitted.
The euler number e is typically used for the base of the natural logarithm.
The foregoing is merely a preferred embodiment of the invention, which is intended to be illustrative and not limiting. It will be understood by those skilled in the art that various changes, modifications and equivalents may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A points management system, comprising:
the terminal is used for sending an operation request and checking return data by a user;
the server is connected with the terminal, receives the operation request, and operates internal data according to the operation request or sends the return data to the terminal;
the second server is connected with the server and performs data interaction regularly;
wherein, the server side includes: the system comprises a registration module, an approval module, a assigning module and a cache module, wherein the registration module is used for receiving registration information sent by the terminal, storing correct registration information in the cache module and distributing corresponding authority; the examination and approval module receives the application information of the terminal, sends the application information to the corresponding examination and approval user for examination and approval, and after receiving the indication that the examination and approval is passed, allocates the assigning right to the user and stores the assigning right in the cache module; the assigning module is used for receiving assigning information of the terminal, extracting corresponding authority information from the cache module to judge whether the assigning information accords with corresponding authority, and updating the information of the assigned individual user in the cache module according to the assigning information which accords with the authority;
the server side further comprises an encryption module for encrypting the data of the server side, wherein an encryption formula is as follows:
b1=a7mod15
Figure FDF0000011520380000011
wherein a is plaintext, b is ciphertext, and b1Is the intermediate variable, e is the Euler number.
2. The point management system according to claim 1, wherein the server provides a data interaction interface, and performs data interaction with the second server at regular time to update the stored data.
3. The point management system according to claim 1, wherein the second server is an intranet.
4. A point management system according to any one of claims 1 to 3, wherein the terminal comprises: the system comprises a first user terminal, a second user terminal and a third user terminal, wherein an individual user operates through the first user terminal, and sends an operation request to the server or checks the return data of the server; the second user terminal is used for sending the operation request of an enterprise user/collective user/community user and displaying the return data of the enterprise user/collective user/community user; and the third user terminal is used for sending the operation request of the approval user and displaying the return data of the approval user.
5. The point management system according to claim 4, wherein the server includes a server, the server is connected to the first user terminal, the second user terminal, and the third user terminal, respectively, assigns different rights to the first user terminal, the second user terminal, and the third user terminal, receives the operation requests sent by the first user terminal, the second user terminal, and the third user terminal, responds to the operation requests in the corresponding rights, and sends operation results as the return data to the first user terminal, the second user terminal, and the third user terminal.
6. The points management system of claim 5, wherein the server further comprises a database; the database is connected with the server and stores the data of the first user terminal, the second user terminal and the third user terminal for the server to call.
7. The points management system of claim 6, wherein the server comprises the registration module and the caching module; the registration module receives registration information sent by the first user terminal and the second user terminal, judges whether the registration information is correct or not, and stores the correct registration information in the cache module.
8. The point management system according to claim 6, wherein the server comprises the approval module and the caching module; and the approval module receives the application information of the second user terminal and distinguishes the application information.
9. The point management system according to claim 6, wherein the server includes the assigning module and the caching module; and the assigning module receives assigning information of the second user terminal or the third user terminal.
CN201610394922.4A 2016-06-03 2016-06-03 Integral management system Active CN106023040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610394922.4A CN106023040B (en) 2016-06-03 2016-06-03 Integral management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610394922.4A CN106023040B (en) 2016-06-03 2016-06-03 Integral management system

Publications (2)

Publication Number Publication Date
CN106023040A CN106023040A (en) 2016-10-12
CN106023040B true CN106023040B (en) 2021-09-14

Family

ID=57089707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610394922.4A Active CN106023040B (en) 2016-06-03 2016-06-03 Integral management system

Country Status (1)

Country Link
CN (1) CN106023040B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216754A (en) * 2007-12-27 2008-07-09 广州杰赛科技股份有限公司 Modular multiplication processing method, data encryption and decryption processing method and device
CN105338002A (en) * 2015-12-04 2016-02-17 上海斐讯数据通信技术有限公司 Security management system for third-party server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI244610B (en) * 2001-04-17 2005-12-01 Matsushita Electric Ind Co Ltd Information security device, prime number generation device, and prime number generation method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216754A (en) * 2007-12-27 2008-07-09 广州杰赛科技股份有限公司 Modular multiplication processing method, data encryption and decryption processing method and device
CN105338002A (en) * 2015-12-04 2016-02-17 上海斐讯数据通信技术有限公司 Security management system for third-party server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
潍坊市高危流动人口信息管理系统的设计与实现;王育俐;《中国优秀硕士学位论文全文数据库》;20120430;第18-19、23-26、31、36页 *

Also Published As

Publication number Publication date
CN106023040A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
US11652608B2 (en) System and method to protect sensitive information via distributed trust
CN105577368B (en) The medical diagnosis service-seeking system and method for two-way secret protection
Sun et al. Data security and privacy in cloud computing
KR101843340B1 (en) Privacy-preserving collaborative filtering
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
CN111431936A (en) Authorization processing method, device, equipment and system based on verifiable statement
CN107948146A (en) A kind of connection keyword retrieval method based on encryption attribute in mixed cloud
CN109165526B (en) Big data security and privacy protection method and device and storage medium
CN107689950A (en) Data publication method, apparatus, server and storage medium
US20230359631A1 (en) Updatable private set intersection
CN103780393A (en) Virtual-desktop security certification system and method facing multiple security levels
US20090178130A1 (en) Verifying that group membership requirements are met by users
US20240143795A1 (en) Method and device for intersecting unbalanced private sets
CN111490995A (en) Model training method and device for protecting privacy, data processing method and server
CN113434906B (en) Data query method, device, computer equipment and storage medium
Dharminder Lwedm: Learning with error based secure mobile digital rights management system
US20060192651A1 (en) Data transmit system and transmit methods by using n-dimensional information
CN108650268A (en) It is a kind of realize multistage access can search for encryption method and system
Singh et al. Senso scale: a framework to preserve privacy over cloud using sensitivity range
CN115471860B (en) Express real name checking method, system and computer readable storage medium
CN106023040B (en) Integral management system
CN104580262A (en) Safety method applicable to wireless internet of things
Liu et al. ptwitterrec: A privacy-preserving personalized tweet recommendation framework
Maragathavalli et al. Cloud data security model using modified decoy technique in fog computing for E-healthcare
De Montjoye Computational privacy: towards privacy-conscientious uses of metadata

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Room 1503, Fengting Building, Building 006 (15-1), No. 375, Jiangdong North Road, Yinzhou District, Ningbo City, Zhejiang Province, 315040

Patentee after: Zhejiang onest Information Technology Co.,Ltd.

Address before: 15F, Fengting building, Hefeng creative Plaza, 375 Jiangdong North Road, Jiangdong District, Ningbo, Zhejiang 315040

Patentee before: HONEST (NINGBO) SOFTWARE TECHNOLOGY CO.,LTD.

CP03 Change of name, title or address