CN108509580A - A kind of project supervision data management method and system - Google Patents
A kind of project supervision data management method and system Download PDFInfo
- Publication number
- CN108509580A CN108509580A CN201810267191.6A CN201810267191A CN108509580A CN 108509580 A CN108509580 A CN 108509580A CN 201810267191 A CN201810267191 A CN 201810267191A CN 108509580 A CN108509580 A CN 108509580A
- Authority
- CN
- China
- Prior art keywords
- data
- memory block
- data memory
- critical
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to project supervision technical field, a kind of project supervision data management method and system are disclosed, includes the following steps, S1, establishes database, wherein database includes general data memory block and critical data memory block;S2, inquiry request is obtained, wherein identifier corresponding with general data or critical data is carried in inquiry request;S3, it is obtained in general data memory block or critical data memory block based on inquiry request and issues data;User judges that data are stored in general data memory block or critical data memory block by sending inquiry request by the identifier in inquiry request;If what user obtained is general data, then data is obtained in general data memory block;If what user obtained is critical data, then data is obtained in critical data memory block;To reduce staff's stand-by period.
Description
Technical field
The present invention relates to project supervision technical fields, and in particular to a kind of project supervision data management method and system.
Background technology
Unit for engineering supervision refers to nomocracy and obtains and build the project management enterprises qualification certificates issued of authorities,
It is engaged in Project Supervision and the movable service organization of related service.Project Supervision unit is entrusted by construction unit, according to
Laws and regulations, engineering construction standard, prospective design file and contract, the construction stage to project delivery method, cost, progress into
Row control, is managed contract, information, coordinates to the relationship of engineering construction related side, and fulfils construction project safety
The service activity of production management statutory obligation.
During practice of construction, the region that the personnel of different responsibilities are responsible in unit for engineering supervision is different, and work people
Member browses the file in database by mobile terminal, and to realize the transmission of information, and the information stored in the database is divided into
General information and key message in the prior art, obtain the information in database, if directly by the order of mobile terminal
It is searched in the database, then seeking scope is big, causes the lookup time long, staff is waiting for a long time.
Invention content
For the staff of the existing technology problem waiting for a long time when obtaining data, the purpose of the present invention exists
In providing a kind of project supervision data management method, have the effect of reducing staff's stand-by period.
To achieve the above object, the present invention provides following technical solutions:
A kind of project supervision data management method, includes the following steps,
S1, database is established, wherein database includes general data memory block and critical data memory block;
S2, inquiry request is obtained, wherein identifier corresponding with general data or critical data is carried in inquiry request;
S3, it is obtained in general data memory block or critical data memory block based on inquiry request and issues data.
By using above-mentioned technical proposal, general data memory block stores general data information, and critical data memory block is deposited
Store up critical data.User judges that data are stored in commonly by sending inquiry request by the identifier in inquiry request
Data storage area or critical data memory block.If what user obtained is general data, then obtained in general data memory block
Data;If what user obtained is critical data, then data is obtained in critical data memory block;To reduce
Staff's stand-by period.
The further setting of the present invention is:Critical data memory block includes the encrypted area stored to encryption key data, right
The unencryption area that critical data is stored;Authority information is also carried in inquiry request, wherein authority information is divided into the first power
Limit and the second permission;Step S3 specifically includes following steps,
Judge whether data corresponding with inquiry request is stored in critical data memory block,
If it is not, then obtaining the general data being stored in general data memory block and issuing data;
If so, being obtained according to authority information and issuing the data for being stored in encrypted area or unencryption area.
By using above-mentioned technical proposal, critical data needs to encrypt, and prevents critical data from losing, by by all passes
Key data is stored encrypted in encrypted area, and all critical datas are not stored encrypted in unencryption area.If authority information is the first power
Limit, then obtain the data in unencryption area.If authority information is not the first permission, the data of encrypted area is obtained, is reached
To the effect of secrecy.Since the user with the first authority information directly acquires the data of unencryption, reduce decryption
Process, reduce staff inquire data stand-by period.
The further setting of the present invention is:After whether step S3 is stored in critical data memory block in judging inquiry request
It is further comprising the steps of,
If data corresponding with inquiry request is stored in critical data memory block, judge whether authority information is the first power
Limit,
If authority information is the first permission, the data in unencryption area is obtained;
If authority information is not the first permission, the data of encrypted area is obtained.
By using above-mentioned technical proposal, if authority information is the first permission, the data in unencryption area is obtained.It is logical
The data for directly acquiring unencryption area is crossed, to reduce the process of decryption, reduces the time of staff's waiting.
If authority information is not the first permission, the data of encrypted area is obtained.If the personnel of the second permission obtain
The information of information, acquisition is encrypted information, to achieve the effect that personnel's secrecy of the second permission of information pair.Second permission
Personnel can download the data of encrypted area in advance, the personnel of the first permission are by being decrypted data, to obtain
Data is obtained, it is easy to use.
The further setting of the present invention is:It is further comprising the steps of,
The memory capacity surplus of Q1, timing acquisition general data memory block and critical data memory block;
Q2, judge whether the capacity surplus in general data memory block and critical data memory block is more than predetermined amount,
If so, stopping operation;
If it is not, then output adjustment information.
By using above-mentioned technical proposal, database further includes an idle area, if general data memory block and crucial number
It is less than preset value according to the capacity surplus of memory block, zoning enters general data memory block or critical data stores by would sit idle for
Area, to alleviate storage pressure.
For the staff of the existing technology problem waiting for a long time when obtaining data, the purpose of the present invention exists
In providing a kind of project supervision data supervision system, have the effect of reducing staff's stand-by period.
A kind of project supervision data supervision system, comprises the following modules,
Module is established, for establishing database, wherein database includes general data memory block and critical data memory block;
Acquisition module is inquired, for obtaining inquiry request, wherein carried in inquiry request and general data or critical data pair
The identifier answered;
Inquiry issues module, is obtained in general data memory block or critical data memory block based on inquiry request and issues data
Data.
By using above-mentioned technical proposal, general data memory block stores general data information, and critical data memory block is deposited
Store up critical data.User judges that data are stored in commonly by sending inquiry request by the identifier in inquiry request
Data storage area or critical data memory block.If what user obtained is general data, then obtained in general data memory block
Data;If what user obtained is critical data, then data is obtained in critical data memory block;To reduce
Staff's stand-by period.
The further setting of the present invention is:Critical data memory block includes the encrypted area stored to encryption key data, right
The unencryption area that critical data is stored;Authority information is also carried in inquiry request, wherein authority information is divided into the first power
Limit and the second permission;Inquiry, which issues, to be specifically included with lower module,
First judgment module, for judging whether data corresponding with inquiry request is stored in critical data memory block,
If it is not, then obtaining the general data being stored in general data memory block and issuing data;
If so, being obtained according to authority information and issuing the data for being stored in encrypted area or unencryption area.
By using above-mentioned technical proposal, critical data needs to encrypt, and prevents critical data from losing, by by all passes
Key data is stored encrypted in encrypted area, and all critical datas are not stored encrypted in unencryption area.If authority information is the first power
Limit, then obtain the data in unencryption area.If authority information is not the first permission, the data of encrypted area is obtained.It reaches
Reduce decryption since the user with the first authority information directly acquires the data of unencryption to the effect of secrecy
Process, reduce staff inquire data stand-by period.
The further setting of the present invention is:Whether the first judgment module further includes for being stored in judging inquiry request
The second judgment module executed behind critical data memory block,
Second judgment module judges that permission is believed if data corresponding with inquiry request is stored in critical data memory block
Whether breath is the first permission,
If authority information is the first permission, the data in unencryption area is obtained;
If authority information is not the first permission, the data of encrypted area is obtained.
By using above-mentioned technical proposal, if authority information is the first permission, the data in unencryption area is obtained.It is logical
The data for directly acquiring unencryption area is crossed, to reduce the process of decryption, reduces the time of staff's waiting.
If authority information is not the first permission, the data of encrypted area is obtained.If the personnel of the second permission obtain
The information of information, acquisition is encrypted information, to achieve the effect that personnel's secrecy of the second permission of information pair.Second permission
Personnel can download the data of encrypted area in advance, the personnel of the first permission are by being decrypted data, to obtain
Data is obtained, it is easy to use.
The further setting of the present invention is:Further include with lower module,
Residual capacity acquisition module, it is remaining for the memory capacity of timing acquisition general data memory block and critical data memory block
Amount;
Residual capacity judgment module, for whether judging the capacity surplus in general data memory block and critical data memory block
More than predetermined amount,
If so, stopping operation;
If it is not, then output adjustment information.
By using above-mentioned technical proposal, database further includes an idle area, if general data memory block and crucial number
It is less than preset value according to the capacity surplus of memory block, zoning enters general data memory block or critical data stores by would sit idle for
Area, to alleviate storage pressure.
The present invention has the following advantages:
1, user is deposited by the identifier in inquiry request to judge that data are stored in general data by sending inquiry request
Storage area or critical data memory block;If what user obtained is general data, then data number is obtained in general data memory block
According to;If what user obtained is critical data, then data is obtained in critical data memory block;To reduce work people
Member's stand-by period.
If 2, authority information is not the first permission, the data of encrypted area is obtained, achievees the effect that secrecy.
3, since the user with the first authority information directly acquires the data of unencryption, reduce the mistake of decryption
Journey reduces the stand-by period that staff inquires data.
4, the personnel of the second permission can download the data of encrypted area in advance, and the personnel of the first permission pass through to data number
It is easy to use to obtain data according to being decrypted.
Description of the drawings
Fig. 1 is the flow chart of project supervision data management method;
Fig. 2 is the structure chart of project supervision data supervision system.
Specific implementation mode
With reference to attached drawing, the present invention will be further described.
A kind of embodiment 1, project supervision data management method, includes the following steps,
S1, database is established, wherein database includes general data memory block, critical data memory block and idle area.Passing through will
Database is divided into three memory blocks, and idle area does not store data, and general data memory block stores general data information, critical data
Memory block stores critical data.
Critical data memory block include the encrypted area that encryption key data is stored, to critical data stored not plus
Mi Qu.Critical data needs to encrypt, and prevents critical data from losing, by the way that all encryption key datas are stored in encrypted area,
All critical datas are not stored encrypted in unencryption area.
S2, inquiry request is obtained, wherein mark corresponding with general data or critical data is carried in inquiry request
It accords with, also carries authority information in inquiry request, wherein authority information is divided into the first permission and the second permission.
S3, it is obtained in general data memory block or critical data memory block based on inquiry request and issues data.
Step S3 specifically includes following steps,
Judge whether data corresponding with inquiry request is stored in critical data memory block.
If it is not, then obtaining the general data being stored in general data memory block and issuing data.
If so, being obtained according to authority information and issuing the data for being stored in encrypted area or unencryption area.According to power
Limit information is obtained and is issued and is stored in the data of encrypted area or unencryption area and specifically includes,
Judge whether authority information is the first permission.
If authority information is the first permission, the data in unencryption area is obtained.By directly acquiring unencryption area
Data reduces the time of staff's waiting to reduce the process of decryption.
If authority information is not the first permission, the data of encrypted area is obtained.If the personnel of the second permission obtain
The information of information, acquisition is encrypted information, to achieve the effect that personnel's secrecy of the second permission of information pair.Second permission
Personnel can download the data of encrypted area in advance, the personnel of the first permission are by being decrypted data, to obtain
Data is obtained, it is easy to use.
This method is further comprising the steps of,
The memory capacity surplus of Q1, timing acquisition general data memory block and critical data memory block.
Q2, judge whether the capacity surplus in general data memory block and critical data memory block is more than predetermined amount.
If so, stopping operation.
If it is not, then output adjustment information.If the capacity surplus of general data memory block and critical data memory block is small
In preset value, enter general data memory block or critical data memory block by would sit idle for zoning, to alleviate storage pressure.
Embodiment 2, a kind of project supervision data supervision system, including management module, inquiry acquisition module, inquiry issue mould
Block.
Module is established, for establishing database, wherein database includes general data memory block, critical data memory block
With idle area.By the way that database is divided into three memory blocks, idle area does not store data, the common number of general data memory block storage
It is believed that breath, critical data memory block stores critical data.
Critical data memory block include the encrypted area that encryption key data is stored, to critical data stored not plus
Mi Qu.Critical data needs to encrypt, and prevents critical data from losing, by the way that all encryption key datas are stored in encrypted area,
All critical datas are not stored encrypted in unencryption area.
Acquisition module is inquired, for obtaining inquiry request, wherein carried in inquiry request and general data or crucial number
According to corresponding identifier, authority information is also carried in inquiry request, wherein authority information is divided into the first permission and the second power
Limit.
Inquiry issues module, is obtained and is issued in general data memory block or critical data memory block based on inquiry request
Data.It includes the first judgment module that inquiry, which issues module,.First judgment module includes the second judgment module.
First judgment module, for judging whether data corresponding with inquiry request is stored in critical data storage
Area,
If it is not, then obtaining the general data being stored in general data memory block and issuing data.
If so, being obtained according to authority information and issuing the data for being stored in encrypted area or unencryption area.
Second judgment module judges to weigh if data corresponding with inquiry request is stored in critical data memory block
Whether limit information is the first permission.
If authority information is the first permission, the data in unencryption area is obtained.By directly acquiring unencryption area
Data reduces the time of staff's waiting to reduce the process of decryption.
If authority information is not the first permission, the data of encrypted area is obtained.Then obtain the data of encrypted area.
If the personnel of the second permission obtain information, the information of acquisition is encrypted information, to reach the second permission of information pair
The effect of personnel's secrecy.The personnel of second permission can download the data of encrypted area in advance, and it is right that the personnel of the first permission pass through
Data is decrypted, easy to use to obtain data.
The system further includes residual capacity acquisition module, residual capacity judgment module.
Residual capacity acquisition module is used for the memory capacity of timing acquisition general data memory block and critical data memory block
Surplus.
Residual capacity judgment module, for judging the capacity surplus in general data memory block and critical data memory block
Whether predetermined amount is more than.
If so, stopping operation.
If it is not, then output adjustment information.If the capacity surplus of general data memory block and critical data memory block is small
In preset value, enter general data memory block or critical data memory block by would sit idle for zoning, to alleviate storage pressure.
The above is only a preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-mentioned implementation
Example, all technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art
Those of ordinary skill for, several improvements and modifications without departing from the principles of the present invention, these improvements and modifications
It should be regarded as protection scope of the present invention.
Claims (8)
1. a kind of project supervision data management method, it is characterized in that:Include the following steps,
S1, database is established, wherein database includes general data memory block and critical data memory block;
S2, inquiry request is obtained, wherein identifier corresponding with general data or critical data is carried in inquiry request;
S3, it is obtained in general data memory block or critical data memory block based on inquiry request and issues data.
2. a kind of project supervision data management method according to claim 1, it is characterized in that:Critical data memory block includes
The encrypted area that encryption key data is stored, the unencryption area that critical data is stored;It also carries and has the right in inquiry request
Limit information, wherein authority information is divided into the first permission and the second permission;Step S3 specifically includes following steps,
Judge whether data corresponding with inquiry request is stored in critical data memory block,
If it is not, then obtaining the general data being stored in general data memory block and issuing data;
If so, being obtained according to authority information and issuing the data for being stored in encrypted area or unencryption area.
3. a kind of project supervision data management method according to claim 2, it is characterized in that:Step S3 is asked in judgement inquiry
Ask further comprising the steps of after whether being stored in critical data memory block,
If data corresponding with inquiry request is stored in critical data memory block, judge whether authority information is the first power
Limit,
If authority information is the first permission, the data in unencryption area is obtained;
If authority information is not the first permission, the data of encrypted area is obtained.
4. a kind of project supervision data management method according to claim 1, it is characterized in that:It is further comprising the steps of,
The memory capacity surplus of Q1, timing acquisition general data memory block and critical data memory block;
Q2, judge whether the capacity surplus in general data memory block and critical data memory block is more than predetermined amount,
If so, stopping operation;
If it is not, then output adjustment information.
5. a kind of project supervision data supervision system, it is characterized in that:It comprises the following modules,
Module is established, for establishing database, wherein database includes general data memory block and critical data memory block;
Acquisition module is inquired, for obtaining inquiry request, wherein carried in inquiry request and general data or critical data pair
The identifier answered;
Inquiry issues module, is obtained in general data memory block or critical data memory block based on inquiry request and issues data
Data.
6. a kind of project supervision data supervision system according to claim 5, it is characterized in that:Critical data memory block includes
The encrypted area that encryption key data is stored, the unencryption area that critical data is stored;It also carries and has the right in inquiry request
Limit information, wherein authority information is divided into the first permission and the second permission;Inquiry, which issues, to be specifically included with lower module,
First judgment module, for judging whether data corresponding with inquiry request is stored in critical data memory block,
If it is not, then obtaining the general data being stored in general data memory block and issuing data;
If so, being obtained according to authority information and issuing the data for being stored in encrypted area or unencryption area.
7. a kind of project supervision data supervision system according to claim 6, it is characterized in that:
First judgment module further includes for whether being stored in executed behind critical data memory block in judging inquiry request
Two judgment modules,
Second judgment module judges that permission is believed if data corresponding with inquiry request is stored in critical data memory block
Whether breath is the first permission,
If authority information is the first permission, the data in unencryption area is obtained;
If authority information is not the first permission, the data of encrypted area is obtained.
8. a kind of project supervision data supervision system according to claim 5, it is characterized in that:Further include with lower module,
Residual capacity acquisition module, it is remaining for the memory capacity of timing acquisition general data memory block and critical data memory block
Amount;
Residual capacity judgment module, for whether judging the capacity surplus in general data memory block and critical data memory block
More than predetermined amount,
If so, stopping operation;
If it is not, then output adjustment information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810267191.6A CN108509580B (en) | 2018-03-28 | 2018-03-28 | Project supervision data management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810267191.6A CN108509580B (en) | 2018-03-28 | 2018-03-28 | Project supervision data management method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108509580A true CN108509580A (en) | 2018-09-07 |
CN108509580B CN108509580B (en) | 2021-06-18 |
Family
ID=63378917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810267191.6A Active CN108509580B (en) | 2018-03-28 | 2018-03-28 | Project supervision data management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108509580B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112395476A (en) * | 2020-11-04 | 2021-02-23 | 广州理工学院 | Engineering data management method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101349998A (en) * | 2008-07-25 | 2009-01-21 | 杜桦葳 | USB memory apparatus |
US20090210945A1 (en) * | 2006-06-26 | 2009-08-20 | Hisao Kato | Personal Information/Confidential Information Managing System And Personal Information/Confidential Information Managing Method |
US20110271353A1 (en) * | 2010-04-29 | 2011-11-03 | International Business Machines Corporation | Performing authorization control in a cloud storage system |
US20130239229A1 (en) * | 2011-07-26 | 2013-09-12 | Huawei Technologies Co., Ltd. | Method, apparatus and system for managing document rights |
CN104346290A (en) * | 2013-08-08 | 2015-02-11 | 三星电子株式会社 | Storage device, computer system and methods of operating same |
CN106874316A (en) * | 2015-12-14 | 2017-06-20 | 广州爱九游信息技术有限公司 | A kind of methods of exhibiting of user's combined data, device and server |
CN107770191A (en) * | 2017-11-03 | 2018-03-06 | 黑龙江工业学院 | A kind of finicial administration of enterprise system with security protection |
-
2018
- 2018-03-28 CN CN201810267191.6A patent/CN108509580B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090210945A1 (en) * | 2006-06-26 | 2009-08-20 | Hisao Kato | Personal Information/Confidential Information Managing System And Personal Information/Confidential Information Managing Method |
CN101349998A (en) * | 2008-07-25 | 2009-01-21 | 杜桦葳 | USB memory apparatus |
US20110271353A1 (en) * | 2010-04-29 | 2011-11-03 | International Business Machines Corporation | Performing authorization control in a cloud storage system |
US20130239229A1 (en) * | 2011-07-26 | 2013-09-12 | Huawei Technologies Co., Ltd. | Method, apparatus and system for managing document rights |
CN104346290A (en) * | 2013-08-08 | 2015-02-11 | 三星电子株式会社 | Storage device, computer system and methods of operating same |
CN106874316A (en) * | 2015-12-14 | 2017-06-20 | 广州爱九游信息技术有限公司 | A kind of methods of exhibiting of user's combined data, device and server |
CN107770191A (en) * | 2017-11-03 | 2018-03-06 | 黑龙江工业学院 | A kind of finicial administration of enterprise system with security protection |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112395476A (en) * | 2020-11-04 | 2021-02-23 | 广州理工学院 | Engineering data management method |
Also Published As
Publication number | Publication date |
---|---|
CN108509580B (en) | 2021-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104182821B (en) | Work order distributes system and method automatically | |
CN102611694B (en) | Handheld terminal, system and battery information processing method thereof | |
CN107886446A (en) | A kind of distribution network failure rushes to repair workform management system | |
CN105023334A (en) | Unlocking and locking control method based on cloud platform and mobile phone APP | |
CN109493443A (en) | A kind of intelligent polling method and system based on two dimensional code | |
CN102523206B (en) | Information system associated sharing and interoperation platform | |
CN104092757A (en) | Transportation facility real-time monitoring method and system based on two-dimension codes | |
CN205750946U (en) | Intelligent electric controlled lock managing and control system | |
CN107610280A (en) | Refueling control method and system | |
KR101952012B1 (en) | Facility management method and system using beacon | |
CN104158655A (en) | POS master key generation and distribution management system and control method | |
CN109361715A (en) | The generation and authorization method and system of virtual cloud key | |
US20170346798A1 (en) | Key negotiation method and system, network entity and computer storage medium | |
CN108509580A (en) | A kind of project supervision data management method and system | |
CN103699586B (en) | A kind of mobile intelligent secondary circuit calibration system | |
CN103679966A (en) | Financial terminal monitoring system and method based on smart device hybrid positioning technology | |
CN105718602B (en) | Standard cloud system for safe production of rural hydropower station | |
CN114154965A (en) | Collaborative law enforcement and case handling management method and system based on block chain | |
WO2001065497A1 (en) | A method and a system for generating and handling documents | |
CN101527013A (en) | Method, terminal and system of data cooperation | |
CN108875405A (en) | A kind of project supervision approaches to IM | |
CN102855445A (en) | Method for security management of cloud computing network invoice system | |
CN109840999B (en) | Antenna controller and refueling equipment | |
CN103259655B (en) | A kind of Subscriber Management System based on satellite communications services | |
CN109472718A (en) | A kind of energy shared system and its implementation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 310011 100 Moganshan Road, Gongshu District, Hangzhou, Zhejiang Applicant after: Zhejiang pan China Engineering Consulting Co., Ltd. Address before: 310011 100 Moganshan Road, Gongshu District, Hangzhou, Zhejiang Applicant before: ZHEJIANG FANHUA ENGINEERING SUPERVISION CO., LTD. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |