CN108805520A - The method that enterprise's data based on wechat platform creates handing-over management - Google Patents
The method that enterprise's data based on wechat platform creates handing-over management Download PDFInfo
- Publication number
- CN108805520A CN108805520A CN201810483409.1A CN201810483409A CN108805520A CN 108805520 A CN108805520 A CN 108805520A CN 201810483409 A CN201810483409 A CN 201810483409A CN 108805520 A CN108805520 A CN 108805520A
- Authority
- CN
- China
- Prior art keywords
- data
- access side
- holder
- file transfer
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Abstract
The method that enterprise's data based on wechat platform of the present invention creates handing-over management, is as follows:Step 1, user create data into data bank;Step 2, data holder select data to be committed to high in the clouds and generate the first file transfer order, enter step four;Step 3, after selecting data access side, batch creates Item Information, and generates the second file transfer order, enters step four;Step 4, the first file transfer order in step 2 or the second file transfer order in step 3 are generated in a manner of notification message and notify data access side, are transferred to step 6;Step 5, data holder select the data to circulate, generate pre- circulation order, and the pre- circulation order is generated the wechat platform for being presented on data holder in a manner of Quick Response Code, is transferred to step 7;Step 6, data access side complete data with acknowledgement notification message mode and receive;Step 7, data access side complete data reception in a manner of scanning the two-dimensional code.
Description
Technical field
Join technical field the invention belongs to enterprise and for account company profile, and in particular to a kind of enterprise based on wechat platform
The method that industry data creates handing-over management.
Background technology
Currently, joining also in artificial treatment state, each for account for the data management between account company and little Wei enterprises
Company is required for special people to be responsible for being docked so as to data to arrange with little Wei enterprises, exists in this artificial treatment flow
Some inevitable problems, data information can only hand-kept on book, cannot network inquiry, and cost of labor is big;In addition,
The data of handing-over back needs professional to go to arrange classification, takes considerable time;Money for public use is needed for the accounting of account intra-company
Expect that processing business, data flowing are not easy to register, cannot explicitly show the affiliated people of Current data and the tracking mode of data.
Invention content
For shortcoming in the prior art, it is an object of the invention to propose a kind of enterprise's data based on wechat platform
The method for creating handing-over management can be based on mobile device, establish the data bank for account company name Xia little Wei enterprises beyond the clouds,
So that each file transfer can be conveyed by way of Quick Response Code barcode scanning identification technology or message push and be carried out in multiterminal
Data transmission, which solve the problems that Current data management circulation is difficult.
Technical scheme is as follows:
A method of it realizing that enterprise's data based on wechat platform creates handing-over management, is as follows:
It is selected to enter step one or step 3 under original state according to the own situation of user;Step 1, user is by data
It creates into the data bank in high in the clouds;Step 2, data holder select required data to be committed to high in the clouds and generate the first data
Circulate order, is transferred to step 4;Step 3, within the scope of the list of data access side, after selecting data access side, user's batch
It creates and needs to circulate to the data of selected data access side, generate the second file transfer order, and be committed to the money in high in the clouds
Expect in library, enters step four;Step 4, by the first file transfer order in step 2 or the second file transfer in step 3
Order is generated in a manner of notification message notifies data access side, is transferred to step 6;Step 5 is operated when receive face-to-face
When, data holder selects the order to circulate, generates and circulate in advance on the basis of a kind of created data of step
Order, and data holder is returned it into, the pre- circulation order is generated in a manner of Quick Response Code is presented on the micro- of data holder
Believe platform, is transferred to step 7;Step 6, data access side complete data with acknowledgement notification message mode and receive;Step 7, data
Data reception is completed in a manner of scanning the two-dimensional code in access side.
Specifically, the method that enterprise's data based on wechat platform creates handing-over management,
In step 1, the user includes for account company and enterprise, and the user is by wechat platform in the data bank
The data encryption post package of the data of the establishment is committed to high in the clouds by middle establishment data;High in the clouds carries out after receiving the data
Unpacking and decryption processing, the data that high in the clouds receives include two parts, are respectively to allow the part for repeating to add and need to protect
The part of card data uniqueness;To the part for needing guarantee data uniqueness, carried out according to Material Name library mark unique
Property verification, the enterprise in conjunction with belonging to data verified, it is ensured that after the legitimacy of added data, legal data is added to
Current holder's data bank;
In step 2, data holder chooses the money that can lend state in batches from a kind of created data bank of step
Material selects data access side, by selected data encryption, encapsulates and be submitted to high in the clouds;After high in the clouds receives submitted data
Carry out unpacking and decryption processing;And it is legal to the progress of the owned enterprise of the owned enterprise of selected data and data access side
Property verification and correctness verification, verification generate the first file transfer order after passing through, while by the data of the data holder
The status indication of the corresponding selected data for lending state is state to be received in library, meanwhile, the data of data access side
There is the data of state to be received in library;
In step 3, duplicate removal processing is carried out to the data created, uniqueness judgement is carried out by data ID, ensures this batch
The uniqueness of secondary data;Within the scope of the list of data access side, behind selection data access side, user is directed to selected money
Expect access side, batch, which creates, to be needed to circulate to the data of selected data access side, generates the second file transfer order, and carry
It hands over to the data bank in high in the clouds;
In step 4, after the first file transfer order or the generation of the second file transfer order, by first file transfer
Order or file transfer order return to data holder, and by the first file transfer order identification code after encryption, encapsulation or the
Two file transfer order identification codes are pushed to data access side in a manner of message informing and are received for use in delay confirmation;
In step 5, when face-to-face reception operation, data holder selects from data bank
The data to circulate is taken, high in the clouds will be submitted to after selected data encryption, encapsulation;High in the clouds receives
It is unpacked after data, decryption processing;And legitimacy and correctness verification, verification are carried out to the owned enterprise of selected data
By the pre- circulation order of rear generation, pre- circulation order identification code is obtained, and return it to the wechat platform of data holder;Money
File transfer order identification code is encrypted, encapsulates generation Quick Response Code for confirming reception face-to-face by material holder;
Step 6:After step 4 is handled, data access side is micro- after wechat platform confirms and receives file transfer order
Data encryption, encapsulation are submitted to high in the clouds by letter platform;High in the clouds carries out unpacking and decryption processing after receiving data;And data is connect
The side of entering and file transfer order identification code carry out legitimacy, correctness verification, verify the data bank of data holder after passing through
In with the data corresponding to the data access side and file transfer order identification code carry out logic deletion and correspondingly in data
The data for the access that circulates is added in the data bank of access side;
Step 7:After step 5 processing, file transfer of the data access side in scanning data holder's wechat platform is ordered
Single Quick Response Code, whether it is file transfer order data that wechat platform will tell scans content according to identification marking;It will identification
The file transfer order identification code gone out carries out data encryption, encapsulation is submitted to high in the clouds;High in the clouds receive data after carry out unpack and
Decryption processing;And legitimacy, correctness verification are carried out to data access side and file transfer order identification code, verification will after passing through
Corresponding data carries out logic deletion and adds in the data bank of data access side to be accessed in the data bank of data holder
Data.
Preferably, the user as described in step 1 is data holder, and the data holder includes for account corporate user
With small micro- enterprise customer;The data holder selects Material Name, the affiliated people of selection data, addition standby in the wechat platform
Note, initial time, data number information, using lightweight data interaction format, structure Json object and Json arrays, wherein
Json object data structures are { key:value,key:Value...... key-value pair structure }, Json array data structures are
[" obj1 ", " obj2 ", " obj3 " ...], is encrypted constructed data to ensure Information Security, and
Data are committed to high in the clouds.
Preferably, using the symmetric encipherment algorithm for protecting electronic data, data are encrypted.
Preferably, Information Security is ensured using Http or Https.
Preferably, data, generation account corporate user energy is respectively created in generation account corporate user and small micro- enterprise customer
The data enough created includes that whole little Wei enterprises of current service possess data and possess data for account enterprise;The little Wei enterprises
User, which is only capable of creating, belongs to this enterprise data.
Preferably, it is added timestamp using machine code in the step 2 and/or step 3, by incremental number with increasing certainly
Mode is fixed prefix, to ensure that the uniqueness of the first file transfer order identification code solves at order number and is easy to let out
Portfolio is leaked, and by the plug-in risk utilized.
Preferably, the order that circulates in advance in step 5 is presented on the wechat platform of data holder in a manner of Quick Response Code, tool
Steps are as follows for body:
(1) data holder chooses loanable data in batches in wechat platform from its data bank, by building Json
Object arranges current data with Json arrays, and data are encrypted using AES, and is ensured using Https
Data are committed to high in the clouds by Information Security;
(2) after high in the clouds receives data, data are decrypted using AES, and to the affiliated enterprise of selected data
The owned enterprise of industry and data access side carries out legitimacy, correctness verification, and verification generates data handover information order after passing through,
It is added timestamp using machine code, and combines and be incremented by number, be fixed prefix, to ensure the uniqueness of pre- circulation order identification code;
(3) data holder will be returned to after identifying code encryption with circulation order, data holder orders the pre- circulation
Single identification code be encrypted and encapsulation process after generate Quick Response Code and be presented in the wechat platform of data holder, the two dimension
Code presets effective time, and effective time is set to 1 minute to avoid malicious operation data;
Preferably, data access side completes to receive with acknowledgement notification message mode in step 6, is as follows:
(4) after step 4 is handled, data access side confirms in wechat platform receives the first file transfer order or the
After two file transfer orders, data encryption, encapsulation are submitted to by high in the clouds by wechat platform;
(5) high in the clouds carries out unpacking and decryption processing after receiving data;And to data access side and corresponding file transfer
Order identification code carries out legitimacy and correctness verification;
(6) by data corresponding with the file transfer order identification code in the data bank of data holder after verification passes through
It carries out logic deletion and adds the data of circulation access in the data bank of Detail Recipients;
(4) it uses wechat template message interface to push, notifies the state of data holder and data access side Current data,
The delay handing-over of data is completed in a manner of message informing.
(5) after data access side confirms and receives, the state after the data condition display change of data holder.
Preferably, data access side completes to receive in a manner of scanning the two-dimensional code in step 7, is as follows:
(1) after step 5 is handled successfully, the Quick Response Code of data holder, the wechat of data access side are scanned in data access side
Platform will recognise that as file transfer order data scans content according to identification marking;
(2) identification code that will identify that carries out data encryption, encapsulation is submitted to high in the clouds;
(3) high in the clouds is unpacked and is decrypted after receiving data;And recipient and order identification code are closed
Method, correctness verification, verification delete the logic that data is carried out in the data bank of data holder after passing through;It is accessed in data
The data bank of side adds the data for the access that circulates;
(4) data holder real-time update current state after circulating successfully is pushed real using wechat template message interface
Existing real-time messages transparent transmission, avoids the generation of PUSH message packet loss, ensures data holder and data access side real-time tracking to money
The status information of material lending and/or access, delivering-receiving document is completed will pass through Quick Response Code face to face;
(5) corresponding in data access side and the respective data bank of data holder after data access side confirms and receives
Money
State after material display change.
Beneficial effects of the present invention are as follows:
The method that enterprise data of the realization of the present invention based on wechat platform creates handing-over management, with prior art phase
Than having the following advantages that:
The present invention is based on the present situation for overcoming Current data management circulation difficult, provides a set of based on mobile device
App reaches technology that is quick, safe, easily joining using development of Mobile Internet technology, takes full advantage of cloud database, Quick Response Code life
At the technology with identification, information encryption, message push.In order to be more clearly understood that the present invention above-mentioned purpose, feature and
Advantage is below in conjunction with the accompanying drawings further described in detail the present invention with particular content.Specifically, the present invention provides one kind
Based on mobile phone two-dimension code generate with identify, information encryption, message push etc. technologies come solve little Wei enterprises, for account company profile hand over
Connect difficult pain spot.
Description of the drawings
Fig. 1 is that data is held in the method that enterprise's data establishment handing-over of the realization according to the present invention based on wechat platform manages
The step flow chart for the side of having.
Fig. 2 is that data connects in the method that enterprise's data establishment handing-over of the realization according to the present invention based on wechat platform manages
The step flow chart for the side of entering.
Specific implementation mode
Below in conjunction with attached drawing, the present invention will be described in detail.It is specific interior first to being directed to term be defined
Hold as follows, wherein " data ":Zhi little Wei enterprise-like corporations are supplied to for account company for completing various generation accounts, register of company, agency
The series of data of the services such as book keeping operation comprising but it is not limited to enterprise's official seal, all kinds of licenses, contract, voucher and invoice.
" data bank ":Refer to whole little Wei enterprises data summations of high in the clouds storage, wherein in Item Information library data with it is existing
Real data is with uniformity.
" Material Name ":Refer to account corporate user and Material Name that small micro- enterprise customer can create, wherein data name
Claim according to real information attribute to include uniqueness identification marking.
" Material Name library ":Refer to account corporate user and the title of whole data that small micro- enterprise customer can create.
" data holder ":It refer to Current data place side;" data access side ":Refer to that data will holder.
" file transfer ":Refer to that data is produced from holder.
" file transfer order ":Refer to the set of single or multiple data, and indicate its current belonging relation, will transfer
The side of entering, the classification are nonessential attribute, alternately attribute.
" data identification code ":It is unique mark of the data based on Material Name and the comprehensive determination of owned enterprise's mark.
" file transfer order identification code ":It is the unique identifier of file transfer order for identification.
In addition, lightweight data interaction format is used in the present invention, for example, Json.Json includes Json object and Json
Array, Json object data structure are { key:value,key:Value...... key-value pair structure }, Json array data knots
Structure is [" obj1 ", " obj2 ", " obj3 " ...].
Using the symmetric encipherment algorithm for protecting electronic data in the present invention, it is referred to as AES, the symmetric cryptography is calculated
Method converged strong security, high-performance, high efficiency, it is easy-to-use and flexible the advantages that.
It is the once safety upgrading to Http that Https, Https are used in the present invention, therefore the use of Https is also to pacify to data
A full guarantee.The present invention sweeps to sweep with wechat and be identified using the generation of Qrcode Quick Response Codes
" push ":Refer to the means that client is kept in communication with server-side, notice heartbeat mechanism keeps long link, ensures real
When receive PUSH message.
" Material Name uniqueness ":Whether it is unique existing article and the category decided in reality according to data
Property, it is configured to ensure the consistency of data and real data.For example, enterprise's business license enterprise in reality
Only one enterprise business license can only be possessed, so when the data of establishment, for " enterprise's business license " this data
It is uniqueness.And such as data " file " is not unique as soon as " file " of enterprise is that may exist more parts in reality
Property.
" data uniqueness ":According to data in actual life in an enterprise whether it is unique existing article and determines
The attribute to get off.Consistency for ensureing data bank data and real data.Such as:Enterprise's business license is one in reality
Enterprise can only possess only one enterprise business license, so when the data of establishment, for " enterprise's business license " this
Data combination owned enterprise will carry out uniqueness verification.And such as data " file " reality in an enterprise " file " be can
With there are more parts, it is not necessary to carry out uniqueness verification.
" data condition ":Data includes following state, normal state, state to be received, Dai Chi according to currently used situation
State.
The method that enterprise data of the realization of the present invention based on wechat platform creates handing-over management, as depicted in figs. 1 and 2,
It includes the following steps:
Step 1:User creates data by wechat platform in data bank, after being arranged to data, by data encryption
Post package is committed to high in the clouds;High in the clouds is unpacked after receiving data, decryption processing, is identified according to Material Name library and is carried out uniqueness
Verification, in conjunction with data, owned enterprise is verified, it is ensured that after the article legality added, legitimate articles data is added to and is worked as
Preceding holder's data bank;
Preferably, as shown in Figure 1, data holder wechat platform app selection Material Name, the affiliated people of selection data,
Remarks, initial time, data number information are added, using lightweight data interaction format, structure Json object and Json arrays,
Wherein Json object data structure is { key:value,key:Value...... key-value pair structure }, Json array data knots
Structure is [" obj1 ", " obj2 ", " obj3 " ...], is arranged to Json data, and data are encrypted, really
Information Security is protected, data are committed to high in the clouds.
Further, using the symmetric encipherment algorithm for protecting electronic data, i.e. AES, data are encrypted.
Further, Information Security is ensured using Http or Https.
After high in the clouds receives data, data are decrypted using AES.
For the different demands of enterprise, part information allows to repeat to add in the data that high in the clouds receives, another part money
Material then must assure that its data uniqueness.
Preferably, the mark that uniqueness is identified according to Material Name library, to be confirmed whether to need progress Material Name unique
Property verification, and data owned enterprise is combined to carry out data uniqueness verification, to ensure added data legitimacy;Then, will
Legal data is added in active user's data bank.
It is likely to be at for account company or little Wei enterprise-like corporations according to real enterprise data, so for account corporate user and enterprise
Industry with can create data to data bank per family.
Wherein, establishment data includes creating to create with enterprise customer for account corporate user, and data ensures it once creating
The uniqueness in data bank.Preferably, the two creates the range difference of data, includes working as the data that account enterprise customer can create
The data that whole little Wei enterprises of preceding service possess data and possess for account enterprise;Enterprise customer, which can only create, belongs to this enterprise
Data.
Step 2:Data is submitted to high in the clouds and generates circulation order by data holder;
Data holder is in wechat platform, for example, app, data and data access can be lent from data bank batch selection
Side, arranges current data, is encrypted to data using AES and Https ensures Information Security, will
Data are committed to high in the clouds.
Preferably, structure Json object and Json arrays, wherein Json object data structure are { key:value,key:
Value...... key-value pair structure }, Json array data structures are [" obj1 ", " obj2 ", " obj3 " ...], right
Json data are arranged, and data are encrypted, it is ensured that data are committed to high in the clouds by Information Security.
Further, using the symmetric encipherment algorithm for protecting electronic data, i.e. AES, data are encrypted.
Further, Information Security is ensured using Http or Https.
After high in the clouds receives data, data are decrypted using AES, and selected data owned enterprise is connect with data
Ru Fang owned enterprises carry out legitimacy, correctness verification, and verification generates file transfer order after passing through;Preferably, using machine
Code adds timestamp, and by incremental number, increases prefix, to ensure the uniqueness of order id, is ordered in a manner of from increasing to generate
Odd numbers solves and is easy leakage portfolio, and by the plug-in risk utilized.
Data condition will be corresponded in the data bank of data holder and is labeled as state to be received, accordingly to be connect in data
There is state information information to be received in the side's of entering data bank.
Step 3:Batch creates Item Information, and generates file transfer order and be submitted to data bank;
Wechat platform, for example, app, behind selection data access side, batch adds data, according to step 1 and step 2
After handling data, generates data and lend order.Preferably, batch addition data is mended to individually adding the function of data
It fills, increases the convenience of operation, carry out needing to go the data of present lot in wechat platform app when batch addition operation
Logic is handled again, and uniqueness judgement is done by data id, ensures the uniqueness of this batch data.
Step 4:File transfer order is generated in a manner of notification message notifies data access side.Specifically, step 2 exists
Handling result is returned to holder by high in the clouds after treatment;It will encrypt simultaneously, encapsulation file transfer order identification code, it is logical with message
Know that mode is pushed to data access side, delay confirmation can be suitable for and received.
Preferably, handling result is returned to data with Json formats, Https and holds step 2 by after treatment beyond the clouds
Side, so as to data holder's wechat platform app timely update Current data state be it is to be received.
Preferably, encryption, packaged articles are lent into order identification code, carries out message push, is pushed in a manner of message informing
To article debtor, access side's data condition is to be confirmed at this time, can be suitable for delay confirmation and receive.
Step 5:File transfer order is generated in a manner of Quick Response Code is presented on data holder's wechat platform app.
Specifically, holder wechat platform app from data bank batch choose negotiable state article, by data encryption,
Encapsulation is submitted to high in the clouds.High in the clouds is unpacked after receiving data, decryption processing;And it is legal to the progress of the owned enterprise of selected data
Property, correctness verification, verification pass through after generate article file transfer order;And processing result data is returned into holder;Hold
Side will encrypt, encapsulate file transfer order identification code, wechat platform app is presented in a manner of Quick Response Code, such mode is mainly answered
For confirming reception scene face-to-face.
It is as follows:
1. data holder wechat platform from data bank batch selection can lend data, using Json to current data into
Row arranges, and is encrypted to data using AES, and ensure Information Security using Https, data are committed to cloud
End.
After 2. high in the clouds receives data, data are decrypted using AES, and the owned enterprise to selected data and money
Expect that recipient owned enterprise carries out legitimacy, correctness verification, verification generates data handover information order after passing through, due to considering
The problem of to high concurrent, only cannot generate order number in a manner of from increasing, because it is easy leakage portfolio, and by plug-in profit
Risk.So being added timestamp here using machine code, add incremental number, adds certain algorithm etc., to ensure order
The uniqueness of id.
3. data holder will be returned to after order code encryption, data holder will encrypt, packaged articles lending order is known
Other code, is generated by Quick Response Code, is realized using Qrcode planar bar code technologies, and order code is generated as Quick Response Code and is presented in micro-
Believe that there is timeliness, effective time to be set to 1 minute, avoid malicious operation data for platform, this order number.
4. such mode is mainly used in confirms reception scene face-to-face.
Step 6:It completes to receive with acknowledgement notification message mode in data access side;Specifically, after step 4 processing, data
After wechat platform app confirms and receives order, data encryption, encapsulation are submitted to high in the clouds by wechat platform app for access side.High in the clouds connects
It is unpacked after receiving data, decryption processing;And legitimacy, correctness school are carried out to access side and file transfer order identification code
It tests, verification will correspond to the deletion of data logic in holder's data bank after passing through;Corresponding access side's data bank adds access details.
Preferably, after step 4 processing, article reciever is after mobile device confirms and receives order, and wechat platform is by data
Encryption, encapsulation are submitted to high in the clouds.
High in the clouds is unpacked after receiving data, decryption processing;And legitimacy, correct is carried out to recipient and order identification code
Property verification.
Verification will correspond to the deletion of Item Information logic in holder's Item Information library after passing through;Corresponding recipient's Item Information
Library addition borrowing Item Information.
It in a manner of message push, is pushed using wechat template message interface, notice data holder currently provides with the side of being transferred to
Material state.Message informing mode postpones delivering-receiving document completion.
After access side confirms and receives, data dispaly state is different.
When former holder is small micro- enterprise customer, data is that " generation holds people in its data bank state:Certain company someone ".
Former holder is data holder when being for account corporate user, and data state in its data bank is that " generation holds people:Certain
Someone "
When access side is for account corporate user, data state in its data bank is " common ".
When access side is small micro- enterprise customer, data state in its data bank is " common ".
Data condition expression is that small micro- enterprise customer facilitates tracking article for convenience, is also convenient for for the people that works in account company
Member's managerial data.
Step 7:It completes to receive in a manner of scanning the two-dimensional code in data access side.
After step 5 processing, data holder scans data holder's file transfer order Quick Response Code in wechat platform app,
Whether it is file transfer order data that wechat platform app will tell scans content according to identification marking.The money that will identify that
Stream turns order identification code progress data encryption, encapsulation is submitted to high in the clouds.High in the clouds is unpacked after receiving data, decryption processing;
And people and file transfer order identification code progress legitimacy, correctness verification are accessed to data, verification provides holder after passing through
The deletion of data logic is corresponded in material library;Corresponding access side's data bank adds access details.
After step 5 is handled successfully, data access side sweeps function being swept by wechat, is held with mobile device scanning data
There are square object product order Quick Response Code, wechat platform app that will be recognised that according to identification marking to scans content and be ordered for file transfer
Forms data.
The article order identification code that will identify that carries out data encryption, encapsulation is submitted to high in the clouds.
High in the clouds is unpacked after receiving data, decryption processing;And legitimacy, correct is carried out to recipient and order identification code
Property verification, verification pass through after will correspond in data holder's data bank data logic deletes;Corresponding recipient's data bank addition turns
Enter data.Data holder real-time update current state after circulating successfully uses the push of wechat template message interface real here
Existing real-time messages Signal Transparent Transmission Technology, avoids the generation of PUSH message drop probabilities, ensures holder and access side's real-time tracking to money
Material lending status information.Quick Response Code face to face complete by delivering-receiving document.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses
Mode, however the present invention is not limited thereto.It will be understood by those of ordinary skill in the art that:It still can be to aforementioned implementation
Technical solution recorded in example is modified, or carries out equivalent replacement to which part or all technical features;And these are repaiied
Change or replaces, the range for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of method that enterprise's data based on wechat platform creates handing-over management, it is characterised in that:It is as follows:
It is selected to enter step one or step 3 under original state according to the own situation of user;
Step 1, user create data into the data bank in high in the clouds;
Step 2, data holder select required data to be committed to high in the clouds and generate the first file transfer order, are transferred to step
Four;
Step 3, within the scope of the list of data access side, after selecting data access side, user's batch, which creates, to be needed to circulate to institute
The data of the data access side of selection generates the second file transfer order, and is committed in the data bank in high in the clouds, enters step
Four;
Step 4, by the first file transfer order in step 2 or the second file transfer order in step 3 with notification message
Mode, which generates, notifies data access side, is transferred to step 6;
Step 5, when carrying out receiving operation face-to-face, on the basis of the data that data holder is created in step 1, choosing
The order to circulate is selected, generates pre- circulation order, and return it into data holder, the pre- circulation order is with two dimension
Code mode is presented on the wechat platform of data holder, is transferred to step 7;
Step 6, data access side complete data with acknowledgement notification message mode and receive;
Step 7, data access side complete data reception in a manner of scanning the two-dimensional code.
2. the method that enterprise's data based on wechat platform creates handing-over management as described in claim 1, it is characterised in that:
In step 1, the user includes for account company and enterprise, and the user is created by wechat platform in the data bank
Data is built, the data encryption post package of the data of the establishment is committed to high in the clouds;High in the clouds is unpacked after receiving the data
And decryption processing, the data that high in the clouds receives include two parts, are respectively to allow the part for repeating addition and need to ensure money
Expect the part of uniqueness;To the part for needing guarantee data uniqueness, is identified according to Material Name library and carry out uniqueness school
It tests, the enterprise in conjunction with belonging to data is verified, it is ensured that after the legitimacy of added data, legal data is added to currently
Holder's data bank;
In step 2, data holder chooses the data that can lend state, choosing in batches from a kind of created data bank of step
Data access side is selected, by selected data encryption, encapsulates and is submitted to high in the clouds;High in the clouds is solved after receiving submitted data
Packet and decryption processing;And legitimacy verifies are carried out to the owned enterprise of the owned enterprise of selected data and data access side
It is verified with correctness, verification generates the first file transfer order after passing through, while will be right in the data bank of the data holder
It is state to be received to answer the status indication of the selected data for lending state, meanwhile, the data bank of data access side occurs
The data of state to be received;
In step 3, duplicate removal processing is carried out to the data created, uniqueness judgement is carried out by data ID, ensures that this batch provides
The uniqueness of material;Within the scope of the list of data access side, behind selection data access side, user connects for selected data
The side of entering, batch, which creates, to be needed to circulate to the data of selected data access side, generates the second file transfer order, and be committed to
The data bank in high in the clouds;
In step 4, after the first file transfer order or the generation of the second file transfer order, by the first file transfer order
Or second file transfer order return to data holder, and by the first file transfer order identification code or the after encryption, encapsulation
Two file transfer order identification codes are pushed to data access side in a manner of message informing and are received for use in delay confirmation;
In step 5, when face-to-face reception operation, data holder chooses the data to circulate from data bank, by institute
The data encryption of selection is submitted to high in the clouds after encapsulating;High in the clouds is unpacked after receiving data, decryption processing;And to selected
The owned enterprise of the data taken carries out legitimacy and correctness verification, and verification generates pre- circulation order, obtains pre- circulation after passing through
Order identification code, and the wechat platform of data holder is returned it to,;Data holder by file transfer order identification code into
Row encryption, encapsulation generate Quick Response Code for confirming reception face-to-face;
Step 6:After step 4 is handled, after wechat platform confirms and receives file transfer order, wechat is flat for data access side
Data encryption, encapsulation are submitted to high in the clouds by platform;High in the clouds carries out unpacking and decryption processing after receiving data;And to data access side
With file transfer order identification code carry out legitimacy, correctness verification, verification pass through after by the data bank of data holder with
Data corresponding to the data access side and file transfer order identification code carries out logic deletion and is correspondingly accessed in data
The data for the access that circulates is added in the data bank of side;
Step 7:After step 5 processing, file transfer order two of the data access side in scanning data holder's wechat platform
Code is tieed up, whether it is file transfer order data that wechat platform will tell scans content according to identification marking;It will identify that
File transfer order identification code carries out data encryption, encapsulation is submitted to high in the clouds;High in the clouds is unpacked and is decrypted after receiving data
Processing;And legitimacy, correctness verification are carried out to data access side and file transfer order identification code, it verifies data after passing through
Corresponding data carries out logic deletion and adds accessed money in the data bank of data access side in the data bank of holder
Material.
3. the method that enterprise's data based on wechat platform creates handing-over management as claimed in claim 2, it is characterised in that:Such as
User described in step 1 is data holder, and the data holder includes for account corporate user and small micro- enterprise customer;Institute
It states data holder and selects Material Name, the affiliated people of selection data, addition remarks, initial time, data in the wechat platform
Number information, using lightweight data interaction format, structure Json object and Json arrays, wherein Json object data structure are
{key:value,key:Value...... key-value pair structure }, Json array data structures be [" obj1 ", " obj2 ",
" obj3 " ...], constructed data are encrypted to ensure Information Security, and data are committed to cloud
End.
4. the method that enterprise's data based on wechat platform creates handing-over management as claimed in claim 3, it is characterised in that:It adopts
With the symmetric encipherment algorithm for protecting electronic data, data are encrypted.
5. the method that enterprise's data based on wechat platform creates handing-over management as claimed in claim 4, it is characterised in that:It adopts
Ensure Information Security with Http or Https.
6. the method that enterprise's data based on wechat platform creates handing-over management as claimed in claim 3, it is characterised in that:Institute
It states and data is respectively created for account corporate user and small micro- enterprise customer, the data that generation account corporate user can create includes working as
Whole little Wei enterprises of preceding service possess data and possess data for account enterprise;Small micro- enterprise customer, which is only capable of creating, belongs to this
Enterprise's data.
7. the method that enterprise's data based on wechat platform creates handing-over management as described in claim 1, it is characterised in that:Institute
It states and is added timestamp using machine code in step 2 and/or step 3, incremental number from a manner of increasing, to be fixed prefix,
Ensure the uniqueness of the first file transfer order identification code, at order number, solves and be easy leakage portfolio, and is outer
Hang the risk utilized.
8. the method that enterprise's data based on wechat platform creates handing-over management as described in claim 1, it is characterised in that:Step
The order that circulates in advance in rapid five is presented on the wechat platform of data holder in a manner of Quick Response Code, is as follows:
(1) data holder chooses loanable data in batches in wechat platform from its data bank, by building Json object
Current data is arranged with Json arrays, data are encrypted using AES, and ensure data using Https
Data are committed to high in the clouds by safety;
(2) high in the clouds receive data after, data are decrypted using AES, and to the owned enterprise of selected data with
The owned enterprise of data access side carries out legitimacy, correctness verification, and verification generates data handover information order after passing through, uses
Machine code adds timestamp, and combines and be incremented by number, is fixed prefix, to ensure the uniqueness of pre- circulation order identification code;
(3) data holder will be returned to after identifying code encryption with circulation order, data holder knows the pre- circulation order
Other code be encrypted and encapsulation process after generate Quick Response Code and be presented in the wechat platform of data holder, the Quick Response Code is pre-
If effective time, effective time is set to 1 minute to avoid malicious operation data.
9. the method that enterprise's data based on wechat platform creates handing-over management as described in claim 1, it is characterised in that:Step
Data access side completes to receive with acknowledgement notification message mode in rapid six, is as follows:
(1) after step 4 is handled, data access side confirms in wechat platform receives the first file transfer order or the second money
After stream turns order, data encryption, encapsulation are submitted to by high in the clouds by wechat platform;
(2) high in the clouds carries out unpacking and decryption processing after receiving data;And to data access side and corresponding file transfer order
Identification code carries out legitimacy and correctness verification;
(3) data corresponding with the file transfer order identification code in the data bank of data holder is carried out after verification passes through
The data that logic is deleted and addition circulation accesses in the data bank of Detail Recipients;
(4) wechat template message interface PUSH message is used, notifies the state of data holder and data access side Current data,
The delay handing-over of data is completed in a manner of message informing.
(5) after data access side confirms and receives, the state after the data condition display change of data holder.
10. the method that enterprise's data based on wechat platform creates handing-over management as described in claim 1, it is characterised in that:
Data access side completes to receive in a manner of scanning the two-dimensional code in step 7, is as follows:
(1) after step 5 is handled successfully, the Quick Response Code of data holder, the wechat platform of data access side are scanned in data access side
Scans content will be recognised that according to identification marking as file transfer order data;
(2) identification code that will identify that carries out data encryption, encapsulation is submitted to high in the clouds;
(3) high in the clouds is unpacked and is decrypted after receiving data;And to recipient and order identification code carry out legitimacy,
Correctness verifies, and verification deletes the logic that data is carried out in the data bank of data holder after passing through;In data access side
Data bank adds the data for the access that circulates;
(4) data holder real-time update current state after circulating successfully is pushed using wechat template message interface and is realized in fact
When message transparent transmission, avoid the generation of PUSH message packet loss, ensure that data holder borrows with data access side real-time tracking to data
The status information for going out and/or accessing completes delivering-receiving document face to face will pass through Quick Response Code;
(5) after data access side confirms and receives, the corresponding money in data access side and the respective data bank of data holder
State after material display change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810483409.1A CN108805520A (en) | 2018-05-18 | 2018-05-18 | The method that enterprise's data based on wechat platform creates handing-over management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810483409.1A CN108805520A (en) | 2018-05-18 | 2018-05-18 | The method that enterprise's data based on wechat platform creates handing-over management |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108805520A true CN108805520A (en) | 2018-11-13 |
Family
ID=64091357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810483409.1A Pending CN108805520A (en) | 2018-05-18 | 2018-05-18 | The method that enterprise's data based on wechat platform creates handing-over management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108805520A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104077655A (en) * | 2014-06-27 | 2014-10-01 | 海天科技控股公司 | System and method for goods delivery |
CN106779633A (en) * | 2016-11-18 | 2017-05-31 | 成都柚子加科技有限公司 | A kind of management method of electronics receipt |
CN106921717A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of information push method and system based on mobile terminal |
CN107403298A (en) * | 2017-07-28 | 2017-11-28 | 深圳市丰巢科技有限公司 | A kind of barcode scanning based on wechat posts part method and system |
-
2018
- 2018-05-18 CN CN201810483409.1A patent/CN108805520A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104077655A (en) * | 2014-06-27 | 2014-10-01 | 海天科技控股公司 | System and method for goods delivery |
CN106921717A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of information push method and system based on mobile terminal |
CN106779633A (en) * | 2016-11-18 | 2017-05-31 | 成都柚子加科技有限公司 | A kind of management method of electronics receipt |
CN107403298A (en) * | 2017-07-28 | 2017-11-28 | 深圳市丰巢科技有限公司 | A kind of barcode scanning based on wechat posts part method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693632B1 (en) | Autonomous devices | |
CN106357644B (en) | Identity identifying method, system and server based on block chain network | |
US9167428B2 (en) | Method and system for authenticating entities by means of terminals | |
CN105719120B (en) | A method of encryption express delivery list privacy information | |
CN107798531B (en) | Electronic payment method and system | |
CN106713508B (en) | A kind of data access method and system based on Cloud Server | |
CN107077670A (en) | Transaction message is sent | |
CN106100850B (en) | Intelligent and safe chip signing messages transmission method and system based on two dimensional code | |
CN107171794A (en) | A kind of electronic document based on block chain and intelligent contract signs method | |
CN109034437A (en) | A kind of library system based on cloud terminal | |
CN103401844B (en) | The processing method of operation requests and system | |
CN107844946A (en) | A kind of method, apparatus and server of electronic contract signature | |
CN109729046A (en) | Two-dimensional code scanning method and terminal, authentication method and server and service system | |
CN104767735A (en) | Information safety processing method, processing server and processing client side | |
CN103854170A (en) | Payment system and payment method based on two-dimension code | |
CN202424771U (en) | Security service system for electronic contracts | |
CN109102270A (en) | Transaction verification method, computer equipment and the storage medium of block chain number Token | |
CN109919579A (en) | Electronic document contracting method, device, storage medium and equipment | |
CN102819809B (en) | A kind of acquisition method of tax-control data and system | |
TW201135619A (en) | Electronic transaction method and system utilizing QR code | |
CN106097167A (en) | A kind of finance escort information service system | |
CN108416400A (en) | A kind of method of payment and payment system based on dynamic two-dimension code | |
WO2018210097A1 (en) | Method and device for execution transaction mode by classification | |
Ahmad et al. | Design and Implementation of a Secure QR Payment System Based on Visual Cryptography | |
CN114462944A (en) | Logistics safety management method and system based on big data environment application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181113 |