CN108959363A - The method of enterprise's data creation circulation management - Google Patents

The method of enterprise's data creation circulation management Download PDF

Info

Publication number
CN108959363A
CN108959363A CN201810482125.0A CN201810482125A CN108959363A CN 108959363 A CN108959363 A CN 108959363A CN 201810482125 A CN201810482125 A CN 201810482125A CN 108959363 A CN108959363 A CN 108959363A
Authority
CN
China
Prior art keywords
data
holder
enterprise
file transfer
access side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810482125.0A
Other languages
Chinese (zh)
Inventor
杨庆海
朱字波
陆宏亮
张洪健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Big Accounting Network Polytron Technologies Inc
Original Assignee
Beijing Big Accounting Network Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Big Accounting Network Polytron Technologies Inc filed Critical Beijing Big Accounting Network Polytron Technologies Inc
Priority to CN201810482125.0A priority Critical patent/CN108959363A/en
Publication of CN108959363A publication Critical patent/CN108959363A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Abstract

The method for realizing the creation circulation management of enterprise's data of the invention, its step are as follows: being selected to enter step one or step 3 under original state according to user's own situation;Step 1, user create data into the data bank in cloud;Step 2 generates the first file transfer order and enters step four;Step 3 generates the second file transfer order and is committed in data bank and enters step four;Step 4, the first file transfer order or the second file transfer order are generated in a manner of notification message and data access side are notified to be transferred to step 6;Step 5, when carrying out receiving operation face-to-face, data holder generates pre- circulation order on the basis of step 1 and is back to data holder, is transferred to step 7;Step 6, data access side complete data with acknowledgement notification message mode and receive;Step 7, data access side complete data reception in a manner of scanning the two-dimensional code.The present invention is established beyond the clouds for account company name Xia little Wei enterprise data bank, and file transfer can carry out data transmission in multiterminal.

Description

The method of enterprise's data creation circulation management
Technical field
Join technical field the invention belongs to enterprise and for account company profile, and in particular to a kind of enterprise's data creation circulation The method of management.
Background technique
Currently, joining for the data management between account company and little Wei enterprise also in artificial treatment state, each generation account Company has required special people and has been responsible for being docked with little Wei enterprise so as to data to arrange, exists in this artificial treatment process Some inevitable problems, data information can only hand-kept on book, cannot network inquiry, and cost of labor is big;In addition, The data of handover back needs professional to go to arrange classification, takes considerable time;Money for public use is needed for the accounting of account intra-company Expect processing business, data flowing is not easy to register, and cannot explicitly show the affiliated people of Current data and the tracking mode of data.
Summary of the invention
For shortcoming in the prior art, it is an object of the invention to propose what a kind of enterprise's data creation circulation managed Method can be based on mobile device, establish the data bank for account company name Xia little Wei enterprise, beyond the clouds so as to each data stream Turn to convey by way of two dimensional code barcode scanning identification technology or message push and carry out data transmission in multiterminal, solve The difficult problem of Current data management circulation.
Technical scheme is as follows:
A method of realizing the creation circulation management of enterprise's data, the specific steps of which are as follows:
It is selected to enter step one or step 3 under original state according to the own situation of user;Step 1, user is by data Creation is into the data bank in cloud;Step 2, data required for data holder selects are committed to cloud and generate the first data Circulate order, is transferred to step 4;Step 3, within the scope of the list of data access side, after selecting data access side, user's batch Creation needs to circulate to the data of selected data access side, generates the second file transfer order, and be committed to the money in cloud Expect to enter step four in library;Step 4, by the first file transfer order in step 2 or the second file transfer in step 3 Order is generated in a manner of notification message notifies data access side, is transferred to step 6;Step 5 is operated when receive face-to-face When, data holder selects the order to circulate, generates and circulate in advance on the basis of a kind of created data of step Order, and data holder is returned it into, the pre- circulation order generates the shifting for being presented on data holder in a manner of two dimensional code Dynamic terminal, is transferred to step 7;Step 6, data access side complete data with acknowledgement notification message mode and receive;Step 7, data Data reception is completed in a manner of scanning the two-dimensional code in access side.
Specifically, the method for enterprise's data creation circulation management,
In step 1, the user includes for account company and enterprise, and the user is by mobile terminal in the data bank The data encryption post package of the data of the creation is committed to cloud by middle creation data;Cloud carries out after receiving the data Unpacking and decryption processing, the received data in cloud include two parts, are respectively to allow the part for repeating to add and need to protect The part of card data uniqueness;To the part for needing to guarantee data uniqueness, carried out according to Material Name library mark unique Property verification, the enterprise in conjunction with belonging to data verified, it is ensured that after the legitimacy of added data, legal data is added to Current holder's data bank;
In step 2, data holder chooses the money that can lend state in batches from a kind of created data bank of step Material selects data access side, by selected data encryption, encapsulates and be submitted to cloud;After cloud receives submitted data Carry out unpacking and decryption processing;And it is legal to the progress of the owned enterprise of the owned enterprise of selected data and data access side Property verification and correctness verification, verification generate the first file transfer order after passing through, while by the data of the data holder The status indication of the corresponding selected data for lending state is state to be received in library, meanwhile, the data of data access side There is the data of state to be received in library;
In step 3, duplicate removal processing is carried out to the data created, uniqueness judgement is carried out by data ID, guarantees this batch The uniqueness of secondary data;Within the scope of the list of data access side, after selecting data access side, user is directed to selected money Expect access side, batch creation needs to circulate to the data of selected data access side, generates the second file transfer order, and mention It hands over to the data bank in cloud;
In step 4, after the first file transfer order or the generation of the second file transfer order, by first file transfer Order or file transfer order return to data holder, and by the first file transfer order identification code after encryption, encapsulation or the Two file transfer order identification codes are pushed to data access side in a manner of message informing for use in delay confirmation reception;
In step 5, when face-to-face reception operation, data holder chooses the data to circulate from data bank, Cloud will be submitted to after selected data encryption, encapsulation;Cloud is unpacked after receiving data, decryption processing;And it is right The owned enterprise of selected data carries out legitimacy and correctness verification, and verification generates pre- circulation order, obtains pre- after passing through Circulate order identification code, and returns it to the mobile terminal of data holder;Data holder identifies file transfer order Code is encrypted, encapsulates generation two dimensional code to receive for confirming face-to-face;
Step 6: after step 4 is handled, data access side moves after mobile terminal confirms and receives file transfer order Data encryption, encapsulation are submitted to cloud by dynamic terminal;Cloud carries out unpacking and decryption processing after receiving data;And data is connect The side of entering and file transfer order identification code carry out legitimacy, correctness verification, verify the data bank of data holder after passing through In with data corresponding to the data access side and file transfer order identification code carry out logic deletion and correspondingly in data The data for the access that circulates is added in the data bank of access side;
Step 7: after step 5 processing, file transfer of the data access side on scanning data holder mobile terminal is ordered Single two dimensional code, whether it is file transfer order data that mobile terminal will tell scans content according to identification marking;It will identification File transfer order identification code out carries out data encryption, encapsulation is submitted to cloud;Cloud receive data after carry out unpack and Decryption processing;And legitimacy, correctness verification are carried out to data access side and file transfer order identification code, verification will after passing through Corresponding data carries out logic deletion and adds in the data bank of data access side to be accessed in the data bank of data holder Data.
Preferably, the user as described in step 1 is data holder, and the data holder includes for account corporate user With small micro- enterprise customer;The data holder selects Material Name, the affiliated people of selection data, addition standby in the mobile terminal Note, initial time, data number information construct Json object and Json array using lightweight data interaction format, wherein Json object data structure is the key-value pair structure of { key:value, key:value...... }, and Json array data structure is [" obj1 ", " obj2 ", " obj3 " ...], is encrypted constructed data to ensure Information Security, and Data are committed to cloud.
Preferably, using for protecting the symmetric encipherment algorithm of electronic data, data are encrypted.
Preferably, Information Security is ensured using Http or Https.
Preferably, generation account corporate user and small micro- enterprise customer carry out the creation of data, generation account company respectively The data that user can create includes that whole little Wei enterprises of current service possess data and possess data for account enterprise;It is described small Micro- enterprise customer is only capable of creation and belongs to this enterprise data.
Preferably, it is added timestamp in the step 2 and/or step 3 using machine code, is increased certainly by being incremented by number Mode is fixed prefix, to guarantee that the uniqueness of the first file transfer order identification code solves at order number and is easy to let out Portfolio is leaked, and by the plug-in risk utilized.
Preferably, the order that circulates in advance in step 5 is presented on the mobile terminal of data holder in a manner of two dimensional code, tool Steps are as follows for body:
(1) data holder chooses loanable data in mobile terminal in batches from its data bank, by constructing Json Object arranges current data with Json array, and data are encrypted using AES, and is ensured using Https Data are committed to cloud by Information Security;
(2) after cloud receives data, data are decrypted using AES, and to the affiliated enterprise of selected data The owned enterprise of industry and data access side carries out legitimacy, correctness verifies, and verification generates data handover information order after passing through, It is added timestamp using machine code, and combines and be incremented by number, be fixed prefix, to guarantee the uniqueness of pre- circulation order identification code;
(3) data holder will be returned to after identifying code encryption with circulation order, data holder orders the pre- circulation Single identification code generates two dimensional code after carrying out encryption and encapsulation process and is presented in the mobile terminal of data holder, the two dimension Code presets effective time, and effective time is set to 1 minute to avoid malicious operation data;
Preferably, data access side completes to receive in step 6 with acknowledgement notification message mode, the specific steps of which are as follows:
(4) after step 4 is handled, data access side confirms in mobile terminal receives the first file transfer order or the After two file transfer orders, data encryption, encapsulation are submitted to by cloud by mobile terminal;
(5) cloud carries out unpacking and decryption processing after receiving data;And to data access side and corresponding file transfer Order identification code carries out legitimacy and correctness verification;
(6) by data corresponding with the file transfer order identification code in the data bank of data holder after verification passes through It carries out logic deletion and adds the data of circulation access in the data bank of Detail Recipients;
(4) it is pushed using aurora message, notifies the state of data holder and data access side Current data, it is logical with message Know that mode completes the delay handover of data.
(5) state after confirmation receives in data access side, after the data condition display change of data holder.
Preferably, data access side completes to receive in a manner of scanning the two-dimensional code in step 7, the specific steps of which are as follows:
(1) after step 5 is handled successfully, the two dimensional code of data holder, the movement of data access side are scanned in data access side Terminal will recognise that as file transfer order data scans content according to identification marking;
(2) identification code that will identify that carries out data encryption, encapsulation is submitted to cloud;
(3) cloud is unpacked and is decrypted after receiving data;And recipient and order identification code are closed Method, correctness verification, verification delete the logic that data is carried out in the data bank of data holder after passing through;It is accessed in data The data bank of side adds the data for the access that circulates;
(4) data holder real-time update current state after circulating successfully is pushed using aurora and realizes that real-time messages are saturating It passes, avoids the generation of PUSH message packet loss, guarantee that data holder lends and/or connects with data access side real-time tracking to data The status information entered completes delivering-receiving document will pass through two dimensional code face to face;
(5) it is corresponding in data access side and the respective data bank of data holder after in data access side, confirmation is received Money
State after material display change.
Beneficial effects of the present invention are as follows:
The method of realization enterprise's data creation circulation management of the invention has the advantages that compared with prior art
The present invention is based on the status for overcoming Current data management circulation difficult, provides a set of based on mobile device App reaches technology that is quick, safe, easily joining using development of Mobile Internet technology, and it is raw to take full advantage of cloud database, two dimensional code At the technology with identification, information encryption, message push.In order to be more clearly understood that above-mentioned purpose of the invention, feature and Advantage, the present invention is further described in detail with particular content with reference to the accompanying drawing.Specifically, the present invention provides one kind It generated based on mobile phone two-dimension code with technologies such as identification, information encryption, message push and solves little Wei enterprise, handed over for account company profile Connect difficult pain spot.
Detailed description of the invention
Fig. 1 is the flow chart of step 1 in the method for realization enterprise's data creation circulation management according to the present invention.
Fig. 2 is the flow chart of step 4 in the method for realization enterprise's data creation circulation management according to the present invention.
Fig. 3 is the flow chart of step 5 in the method for realization enterprise's data creation circulation management according to the present invention.
Fig. 4 is the flow chart of step 6 in the method for realization enterprise's data creation circulation management according to the present invention.
Fig. 5 is the flow chart of step 7 in the method for realization enterprise's data creation circulation management according to the present invention.
Fig. 6 is the operating process of data holder in the method for realization enterprise's data creation circulation management according to the present invention Figure.
Fig. 7 is the operating process of data access side in the method for realization enterprise's data creation circulation management according to the present invention Figure.
Specific embodiment
Below in conjunction with attached drawing, the present invention will be described in detail.First to being directed to term be defined, it is specific in Hold as follows, wherein " data ": Zhi little Wei enterprise-like corporation is supplied to for account company for completing various generation accounts, register of company, agency The series of data of the services such as book keeping operation comprising but it is not limited to enterprise's official seal, all kinds of licenses, contract, voucher and invoice.
" data bank ": referring to whole little Wei enterprise data summations of cloud storage, wherein data and existing in Item Information library Real data is with uniformity.
" Material Name ": being reference account corporate user and the Material Name that small micro- enterprise customer can create, wherein data name Claim according to real information attribute to include uniqueness identification marking.
" Material Name library ": being the title for referring to whole data that account corporate user and small micro- enterprise customer can create.
" data holder ": refer to Current data place side;" data access side ": refer to that data will holder.
" file transfer ": refer to that data is produced from holder.
" file transfer order ": referring to the set of single or multiple data, and indicates its current belonging relation, will transfer The side of entering, the classification are nonessential attribute, alternately attribute.
" data identification code ": being data based on Material Name and the comprehensive determining unique identification of owned enterprise's mark.
" file transfer order identification code ": being the unique identifier of file transfer order for identification.
In addition, lightweight data interaction format is used in the present invention, for example, Json.Json includes Json object and Json Array, Json object data structure are the key-value pair structure of { key:value, key:value...... }, Json array data knot Structure is [" obj1 ", " obj2 ", " obj3 " ...].
Using the symmetric encipherment algorithm for protecting electronic data in the present invention, it is referred to as AES, the symmetric cryptography is calculated Method converged strong security, high-performance, high efficiency, it is easy-to-use and flexible the advantages that.
It is the once safety upgrading to Http that Https, Https are used in the present invention, therefore the use of Https is also to pacify to data A full guarantee.The present invention generates the development library with identification, such as Zxing using integrated two-dimensional code.
" push ": referring to the means that client and server-side are kept in communication, and notice heartbeat mechanism keeps long link, guarantees real When receive PUSH message.
" Material Name uniqueness ": whether it is unique existing article and the category decided in reality according to data Property, it is configured to guarantee the consistency of data and real data.For example, enterprise's business license enterprise in reality Only one enterprise business license can only be possessed, so when the data of creation, for " enterprise's business license " this data It is uniqueness.And such as data " file " is not unique as soon as " file " of enterprise is there may be more parts in reality Property.
Whether " data uniqueness ": according to data in an enterprise being unique existing article in actual life and determines The attribute to get off.For guaranteeing the consistency of data bank data and real data.Such as: enterprise's business license is one in reality Enterprise can only possess only one enterprise business license, so when the data of creation, for " enterprise's business license " this Data combination owned enterprise will carry out uniqueness verification.And such as data " file " reality in an enterprise " file " be can With there are more parts, it is not necessary to carry out uniqueness verification.
" data condition ": data includes following state, normal state, state to be received, Dai Chi according to currently used situation State.
The method for realizing the creation circulation management of enterprise's data of the invention, as shown in Figures 1 to 7 comprising following steps:
Step 1: user creates data by mobile terminal in data bank, after arranging to data, by data encryption Post package is committed to cloud;Cloud is unpacked after receiving data, decryption processing, is identified according to Material Name library and is carried out uniqueness Verification, in conjunction with data, owned enterprise is verified, it is ensured that after added article legality, legitimate articles data is added to and is worked as Preceding holder's data bank;
Preferably, as shown in Figure 1, data holder mobile terminal app select Material Name, the affiliated people of selection data, Remarks, initial time, data number information are added, using lightweight data interaction format, construct Json object and Json array, Wherein Json object data structure is the key-value pair structure of { key:value, key:value...... }, Json array data knot Structure is [" obj1 ", " obj2 ", " obj3 " ...], is arranged to Json data, and data are encrypted, really Information Security is protected, data are committed to cloud.
Further, using for protecting the symmetric encipherment algorithm of electronic data, i.e. AES, data are encrypted.
Further, Information Security is ensured using Http or Https.
After cloud receives data, data are decrypted using AES.
For the different demands of enterprise, part information allows to repeat to add in the received data in cloud, another part money Material then must assure that its data uniqueness.
Preferably, the mark of uniqueness is identified according to Material Name library, it is unique to be confirmed whether to need to carry out Material Name Property verification, and data owned enterprise is combined to carry out the verification of data uniqueness, come data legitimacy added by ensuring;Then, will Legal data is added in active user's data bank.
It is likely to be at according to real enterprise data for account company or little Wei enterprise-like corporation, so for account corporate user and enterprise Industry with can create data to data bank per family.
Wherein, creation data includes for the creation of account corporate user and enterprise customer's creation, and data ensures it once creating The uniqueness in data bank.Preferably, the range of the two creation data is different, includes working as the data that account enterprise customer can create The data that whole little Wei enterprises of preceding service possess data and possess for account enterprise;Enterprise customer, which can only create, belongs to this enterprise Data.
Step 2: data is submitted to cloud and generates circulation order by data holder;
Data holder is in mobile terminal, for example, app, can lend data and data access from data bank batch selection Side, arranges current data, is encrypted using AES to data and Https ensures Information Security, will Data are committed to cloud.
Preferably, building Json object and Json array, wherein Json object data structure be key:value, key: Value...... key-value pair structure }, Json array data structure is [" obj1 ", " obj2 ", " obj3 " ...], right Json data are arranged, and data are encrypted, it is ensured that data are committed to cloud by Information Security.
Further, using for protecting the symmetric encipherment algorithm of electronic data, i.e. AES, data are encrypted.
Further, Information Security is ensured using Http or Https.
After cloud receives data, data are decrypted using AES, and selected data owned enterprise is connect with data Ru Fang owned enterprise carries out legitimacy, correctness verification, and verification generates file transfer order after passing through;Preferably, using machine Code adds timestamp, and by being incremented by number, increases prefix, to guarantee the uniqueness of order id, is ordered in a manner of increasing certainly to generate Odd numbers solves and is easy leakage portfolio, and by the plug-in risk utilized.
Data condition will be corresponded in the data bank of data holder labeled as state to be received, accordingly to connect in data There is state information information to be received in the side's of entering data bank.
Step 3: batch creation Item Information, and generate file transfer order and be submitted to data bank;
Mobile terminal, for example, app, after selecting data access side, batch adds data, according to step 1 and step 2 After handling data, generates data and lend order.Preferably, batch addition data is mended to the function of independent addition data It fills, increases the convenience of operation, carry out needing to go the data of present lot in mobile terminal app when batch addition operation Logic is handled again, uniqueness judgement is done by data id, guarantees the uniqueness of this batch data.
Step 4: file transfer order is generated in a manner of notification message notifies data access side, as shown in Figure 2.Specifically Ground, processing result is returned to holder to step 2 by after treatment beyond the clouds;It simultaneously will encryption, encapsulation file transfer order identification Code, is pushed to data access side in a manner of message informing, can be suitable for delay confirmation and receive.
Preferably, processing result is returned to data with Json format, Https and holds step 2 by after treatment beyond the clouds Side, so as to data holder's mobile terminal app timely update Current data state be it is to be received.
Preferably, encryption, packaged articles are lent into order identification code, carries out message push, is pushed in a manner of message informing To article debtor, access side's data condition is to be confirmed at this time, can be suitable for delay confirmation and receive.
Step 5: file transfer order is generated in a manner of two dimensional code is presented on data holder mobile terminal app, such as Fig. 3 It is shown,
Specifically, holder mobile terminal app from data bank batch choose negotiable state article, by data encryption, Encapsulation is submitted to cloud.Cloud is unpacked after receiving data, decryption processing;And it is legal to the progress of the owned enterprise of selected data Property, correctness verification, verification pass through after generate article file transfer order;And processing result data is returned into holder;Hold Side will encrypt, encapsulate file transfer order identification code, mobile terminal app is presented in a manner of two dimensional code, such mode is mainly answered For confirming reception scene face-to-face.
The specific steps of which are as follows:
1. data holder mobile terminal from data bank batch selection can lend data, using Json to current data into Row arranges, and is encrypted using AES to data, and ensure Information Security using Https, data are committed to cloud End.
2. data are decrypted using AES, and owned enterprise and money to selected data after cloud receives data Expect that recipient owned enterprise carries out legitimacy, correctness verification, verification generates data handover information order after passing through, due to considering It the problem of to high concurrent, cannot be only to generate order number in a manner of increase, because being easy leakage portfolio, and by plug-in benefit Risk.So being added timestamp here using machine code, it is incremented by number adding, is adding certain algorithm etc., to guarantee order The uniqueness of id.
3. data holder will be returned to after order code encryption, data holder will be encrypted, packaged articles lending order is known Other code, is generated by two dimensional code, is realized using zxing planar bar code technology, and order code is generated as two dimensional code and is presented in shifting Dynamic terminal, this order number have timeliness, and effective time is set to 1 minute, avoid malicious operation data.
4. such mode is mainly used in confirmation face-to-face and receives scene.
Step 6: data access side completes to receive with acknowledgement notification message mode, as shown in Figure 4;Specifically, step is everywhere After reason, after mobile terminal app confirms and receives order, data encryption, encapsulation are submitted to cloud by mobile terminal app for data access side End.Cloud is unpacked after receiving data, decryption processing;And to access side and file transfer order identification code carry out legitimacy, Correctness verification, verification will correspond to the deletion of data logic in holder's data bank after passing through;Corresponding access side's data bank addition connects Enter data.
Preferably, after step 4 processing, article reciever is after mobile device confirms and receives order, and mobile terminal is by data Encryption, encapsulation are submitted to cloud.
Cloud is unpacked after receiving data, decryption processing;And legitimacy, correct is carried out to recipient and order identification code Property verification.
Verification will correspond to the deletion of Item Information logic in holder's Item Information library after passing through;Corresponding recipient's Item Information Library addition borrowing Item Information.
It in a manner of message push, is pushed using aurora message, notice data holder and the side's of being transferred to Current data state.Disappear Advice method delay delivering-receiving document is ceased to complete.
After in access side, confirmation is received, data shows that state is different.
When former holder is small micro- enterprise customer, data is " generation holds people: certain company someone " in its data bank state.
Former holder is data holder when being for account corporate user, data state in its data bank be " in generation, holds people: certain Someone "
When access side is for account corporate user, data state in its data bank is " common ".
When access side is small micro- enterprise customer, data state in its data bank is " common ".
Data condition expression is that small micro- enterprise customer facilitates tracking article for convenience, is also facilitated for the people that works in account company Member's managerial data.
Step 7: data access side completes to receive in a manner of scanning the two-dimensional code, and sees Fig. 5.
After step 5 processing, data holder scans data holder file transfer order two dimensional code in mobile terminal app, Whether it is file transfer order data that mobile terminal app will tell scans content according to identification marking.The money that will identify that Stream turns order identification code progress data encryption, encapsulation is submitted to cloud.Cloud is unpacked after receiving data, decryption processing; And people and file transfer order identification code progress legitimacy, correctness verification are accessed to data, verification provides holder after passing through The deletion of data logic is corresponded in material library;Corresponding access side's data bank adds access details.
After step 5 is handled successfully, data access side is realized, and do one to zxing by scanning technique using zxing Fixed optimization, significantly scanning recognition rate, scans data holder article order two dimensional code, mobile terminal app with mobile device Scans content will be recognised that according to identification marking as file transfer order data.
The article order identification code that will identify that carries out data encryption, encapsulation is submitted to cloud.
Cloud is unpacked after receiving data, decryption processing;And legitimacy, correct is carried out to recipient and order identification code Property verification, verification pass through after will correspond in data holder's data bank data logic deletes;Corresponding recipient's data bank addition turns Enter data.Data holder real-time update current state after circulating successfully realizes that real-time messages are saturating using aurora push here Art is taught skill, the generation of PUSH message drop probabilities is avoided, guarantees holder and access side's real-time tracking to data lending state letter Breath.Two dimensional code face to face complete by delivering-receiving document.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.Those skilled in the art should understand that: it still can be to aforementioned implementation Technical solution documented by example is modified, or is equivalently replaced to part of or all technical features;And these are repaired Change or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of method for realizing the creation circulation management of enterprise's data, it is characterised in that: the specific steps of which are as follows:
It is selected to enter step one or step 3 under original state according to the own situation of user;
Step 1, user create data into the data bank in cloud;
Step 2, data required for data holder selects are committed to cloud and generate the first file transfer order, are transferred to step Four;
Step 3, within the scope of the list of data access side, after selecting data access side, user's batch creation needs to circulate to institute The data of the data access side of selection generates the second file transfer order, and is committed in the data bank in cloud, enters step Four;
Step 4, by the first file transfer order in step 2 or the second file transfer order in step 3 with notification message Mode, which generates, notifies data access side, is transferred to step 6;
Step 5, when carrying out receiving operation face-to-face, data holder is on the basis of a kind of created data of step, choosing The order to circulate is selected, generates pre- circulation order, and return it into data holder, the pre- circulation order is with two dimension Code mode is presented on the mobile terminal of data holder, is transferred to step 7;
Step 6, data access side complete data with acknowledgement notification message mode and receive;
Step 7, data access side complete data reception in a manner of scanning the two-dimensional code.
2. the method for enterprise's data creation circulation management as described in claim 1, it is characterised in that:
In step 1, the user includes for account company and enterprise, and the user is created in the data bank by mobile terminal Data is built, the data encryption post package of the data of the creation is committed to cloud;Cloud is unpacked after receiving the data And decryption processing, the received data in cloud include two parts, are respectively that the part for allowing to repeat to add and needs guarantee money Expect the part of uniqueness;To the part for needing to guarantee data uniqueness, is identified according to Material Name library and carry out uniqueness school It tests, the enterprise in conjunction with belonging to data is verified, it is ensured that after the legitimacy of added data, legal data is added to currently Holder's data bank;
In step 2, data holder chooses the data that can lend state, choosing in batches from a kind of created data bank of step Data access side is selected, by selected data encryption, encapsulates and is submitted to cloud;Cloud is solved after receiving submitted data Packet and decryption processing;And legitimacy verifies are carried out to the owned enterprise of the owned enterprise of selected data and data access side It is verified with correctness, verification generates the first file transfer order after passing through, while will be right in the data bank of the data holder The status indication for answering the selected data for lending state is state to be received, meanwhile, the data bank of data access side occurs The data of state to be received;
In step 3, duplicate removal processing is carried out to the data created, uniqueness judgement is carried out by data ID, guarantees that this batch provides The uniqueness of material;Within the scope of the list of data access side, after selecting data access side, user connects for selected data The side of entering, batch creation need to circulate to the data of selected data access side, generate the second file transfer order, and be committed to The data bank in cloud;
In step 4, after the first file transfer order or the generation of the second file transfer order, by the first file transfer order Or second file transfer order return data holder, and by encryption, encapsulation after the first file transfer order identification code or The identification code of second file transfer order is pushed to data access side in a manner of message informing for use in delay confirmation reception;
In step 5, when face-to-face reception operation, data holder chooses the data to circulate from data bank, by institute The data encryption of selection is submitted to cloud after encapsulating;Cloud is unpacked after receiving data, decryption processing;And to selected The owned enterprise of the data taken carries out legitimacy and correctness verification, and verification generates pre- circulation order, obtains pre- circulation after passing through Order identification code, and the mobile terminal of data holder is returned it to,;Data holder by file transfer order identification code into Row encryption, encapsulation generate two dimensional code to receive for confirming face-to-face;
Step 6: after step 4 is handled, data access side is mobile whole after mobile terminal confirms and receives file transfer order Data encryption, encapsulation are submitted to cloud by end;Cloud carries out unpacking and decryption processing after receiving data;And to data access side With file transfer order identification code carry out legitimacy, correctness verification, verification pass through after by the data bank of data holder with Data corresponding to the data access side and file transfer order identification code carries out logic deletion and correspondingly accesses in data The data for the access that circulates is added in the data bank of side;
Step 7: after step 5 processing, file transfer order two of the data access side on scanning data holder mobile terminal Code is tieed up, whether it is file transfer order data that mobile terminal will tell scans content according to identification marking;It will identify that File transfer order identification code carries out data encryption, encapsulation is submitted to cloud;Cloud is unpacked and is decrypted after receiving data Processing;And legitimacy, correctness verification are carried out to data access side and file transfer order identification code, it verifies data after passing through Corresponding data carries out logic deletion and adds accessed money in the data bank of data access side in the data bank of holder Material.
3. the method for enterprise's data creation circulation management as claimed in claim 2, it is characterised in that: the use as described in step 1 Family is data holder, and the data holder includes for account corporate user and small micro- enterprise customer;The data holder exists The mobile terminal selection Material Name, the affiliated people of selection data, addition remarks, initial time, data number information, using light Magnitude data exchange format, building Json object and Json array, wherein Json object data structure be key:value, key: Value...... key-value pair structure }, Json array data structure is [" obj1 ", " obj2 ", " obj3 " ...], to institute The data of building are encrypted to ensure Information Security, and data are committed to cloud.
4. the method for enterprise's data creation circulation management as claimed in claim 3, it is characterised in that: using for protecting electronics The symmetric encipherment algorithm of data, is encrypted data.
5. the method for enterprise's data creation circulation management as claimed in claim 4, it is characterised in that: use Http or Https To ensure Information Security.
6. the method for enterprise's data creation circulation management as claimed in claim 3, it is characterised in that: generation account corporate user The creation of data is carried out with small micro- enterprise customer, the data that generation account corporate user can create includes the whole of current service Little Wei enterprise possesses data and possesses data for account enterprise;Small micro- enterprise customer is only capable of creation and belongs to this enterprise data.
7. the method for enterprise's data as described in claim 1 creation circulation management, it is characterised in that: the step 2 and/or It is added timestamp in step 3 using machine code, being incremented by number prefix is fixed, to guarantee the first data from a manner of increasing The uniqueness for the order identification code that circulates generates order number, solves and is easy leakage portfolio, and by the plug-in risk utilized.
8. the method for enterprise's data creation circulation management as described in claim 1, it is characterised in that: circulation is ordered in advance in step 5 Single mobile terminal that data holder is presented in a manner of two dimensional code, the specific steps of which are as follows:
(1) data holder chooses loanable data in mobile terminal in batches from its data bank, by constructing Json object Current data is arranged with Json array, data are encrypted using AES, and ensure data using Https Data are committed to cloud by safety;
(2) cloud receive data after, data are decrypted using AES, and to the owned enterprise of selected data with The owned enterprise of data access side carries out legitimacy, correctness verification, and verification generates data handover information order after passing through, uses Machine code adds timestamp, and combines and be incremented by number, is fixed prefix, to guarantee the uniqueness of pre- circulation order identification code;
(3) data holder will be returned to after identifying code encryption with circulation order, data holder knows the pre- circulation order Other code generates two dimensional code after carrying out encryption and encapsulation process and is presented in the mobile terminal of data holder, and the two dimensional code is pre- If effective time, effective time is set to 1 minute to avoid malicious operation data.
9. the method for enterprise's data creation circulation management as described in claim 1, it is characterised in that: data accesses in step 6 Side completes to receive with acknowledgement notification message mode, the specific steps of which are as follows:
(1) after step 4 is handled, data access side confirms in mobile terminal receives the first file transfer order or the second money After stream turns order, data encryption, encapsulation are submitted to by cloud by mobile terminal;
(2) cloud carries out unpacking and decryption processing after receiving data;And to data access side and corresponding file transfer order Identification code carries out legitimacy and correctness verification;
(3) data corresponding with the file transfer order identification code in the data bank of data holder is carried out after verification passes through The data that logic is deleted and addition circulation accesses in the data bank of Detail Recipients;
(4) it is pushed using aurora message, the state of data holder and data access side Current data is notified, with message informing side Formula completes the delay handover of data.
(5) state after confirmation receives in data access side, after the data condition display change of data holder.
10. the method for enterprise's data creation circulation management as described in claim 1, it is characterised in that: data connects in step 7 The side of entering completes to receive in a manner of scanning the two-dimensional code, the specific steps of which are as follows:
(1) after step 5 is handled successfully, the two dimensional code of data holder, the mobile terminal of data access side are scanned in data access side Scans content will be recognised that according to identification marking as file transfer order data;
(2) identification code that will identify that carries out data encryption, encapsulation is submitted to cloud;
(3) cloud is unpacked and is decrypted after receiving data;And to recipient and order identification code carry out legitimacy, Correctness verification, verification delete the logic that data is carried out in the data bank of data holder after passing through;In data access side Data bank adds the data for the access that circulates;
(4) data holder real-time update current state after circulating successfully is pushed using aurora and realizes real-time messages transparent transmission, kept away Exempt from the generation of PUSH message packet loss, guarantees what data holder and data access side real-time tracking were lent and/or accessed to data Status information completes delivering-receiving document will pass through two dimensional code face to face;
(5) the corresponding money after confirmation receives in data access side, in data access side and the respective data bank of data holder State after material display change.
CN201810482125.0A 2018-05-18 2018-05-18 The method of enterprise's data creation circulation management Pending CN108959363A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810482125.0A CN108959363A (en) 2018-05-18 2018-05-18 The method of enterprise's data creation circulation management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810482125.0A CN108959363A (en) 2018-05-18 2018-05-18 The method of enterprise's data creation circulation management

Publications (1)

Publication Number Publication Date
CN108959363A true CN108959363A (en) 2018-12-07

Family

ID=64499807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810482125.0A Pending CN108959363A (en) 2018-05-18 2018-05-18 The method of enterprise's data creation circulation management

Country Status (1)

Country Link
CN (1) CN108959363A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060004908A1 (en) * 2004-05-27 2006-01-05 Daitoku Saitou Apparatus, method, and program for transferring structured documents including plurality of document elements
CN102722794A (en) * 2012-06-05 2012-10-10 北京立思辰计算机技术有限公司 Confidential paper transfer monitoring and auditing method
CN104077655A (en) * 2014-06-27 2014-10-01 海天科技控股公司 System and method for goods delivery
CN106779633A (en) * 2016-11-18 2017-05-31 成都柚子加科技有限公司 A kind of management method of electronics receipt

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060004908A1 (en) * 2004-05-27 2006-01-05 Daitoku Saitou Apparatus, method, and program for transferring structured documents including plurality of document elements
CN102722794A (en) * 2012-06-05 2012-10-10 北京立思辰计算机技术有限公司 Confidential paper transfer monitoring and auditing method
CN104077655A (en) * 2014-06-27 2014-10-01 海天科技控股公司 System and method for goods delivery
CN106779633A (en) * 2016-11-18 2017-05-31 成都柚子加科技有限公司 A kind of management method of electronics receipt

Similar Documents

Publication Publication Date Title
US20200372503A1 (en) Transaction messaging
CN105719120B (en) A method of encryption express delivery list privacy information
Ahmed et al. Security in next generation mobile payment systems: A comprehensive survey
CN103636160B (en) secure file sharing method and system
CN106713508B (en) A kind of data access method and system based on Cloud Server
CN109034437A (en) A kind of library system based on cloud terminal
EP3701667B1 (en) Anonymity system for goods delivery
CN112183765B (en) Multi-source multi-modal data preprocessing method and system for shared learning
CN101300808A (en) Method and arrangement for secure autentication
CN109729046A (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
CN108241979A (en) More account book transfer account methods, electronic device and readable storage medium storing program for executing based on block chain
CN108540528A (en) Confirm electronic document be sent to method and system, computer storage media
CN108154351A (en) The electrical integrated seal of object and affairs examination & approval implementation method, system, platform, medium
CN106060073A (en) Channel key negotiation method
CN104281272A (en) Password input processing method and device
CN108416400A (en) A kind of method of payment and payment system based on dynamic two-dimension code
Akinyede et al. Development of a secure mobile e-banking system
CN104881781A (en) Method, system, and client based on secure transaction
Ahmad et al. Design and Implementation of a Secure QR Payment System Based on Visual Cryptography
CN109831414A (en) A kind of delivery management method and system of electronic invoice
Fernando et al. Mutual authentication protocol for networked RFID systems
CN108959363A (en) The method of enterprise's data creation circulation management
CN108805520A (en) The method that enterprise's data based on wechat platform creates handing-over management
Jawanjal et al. A Secure Protocol For End To End Security To SMS Banking
Dinparast et al. A mobile payment scheme using 2D-barcode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207