CN110430250B - Computer system integrated push project management method, storage medium and device - Google Patents

Computer system integrated push project management method, storage medium and device Download PDF

Info

Publication number
CN110430250B
CN110430250B CN201910675525.8A CN201910675525A CN110430250B CN 110430250 B CN110430250 B CN 110430250B CN 201910675525 A CN201910675525 A CN 201910675525A CN 110430250 B CN110430250 B CN 110430250B
Authority
CN
China
Prior art keywords
management
data
key
risk
cost
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910675525.8A
Other languages
Chinese (zh)
Other versions
CN110430250A (en
Inventor
李伟清
张亚革
李兵强
刘春阳
李建超
李正茂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Ict Network Information Technology Co ltd
Original Assignee
Hebei Ict Network Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Ict Network Information Technology Co ltd filed Critical Hebei Ict Network Information Technology Co ltd
Priority to CN201910675525.8A priority Critical patent/CN110430250B/en
Publication of CN110430250A publication Critical patent/CN110430250A/en
Application granted granted Critical
Publication of CN110430250B publication Critical patent/CN110430250B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention belongs to the technical field of computers, and particularly relates to a computer system integrated push project management method, a storage medium and a device. The method performs the steps of: step 1: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a block chain network; step 2: a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes node addition, key management and read-write permission distribution; the method has the advantages of high management efficiency and high safety.

Description

Computer system integrated push project management method, storage medium and device
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a computer system integrated push project management method, a storage medium and a device.
Background
Computer system integration technology is a gate-oriented and challenging and creative industry, and system integration projects are generally required to provide information products and technical services with high personalization degree according to customer requirements under the condition of limited resources and within a shorter and shorter time range. The project implementation progress in the computer system integration is a bottleneck for restricting enterprise development, and how to effectively promote project management has important significance for improving project management efficiency.
Project management in computer information system integration is a high-efficiency project management mode based on information technology, according to the characteristics of project and project management, through the interrelation of various elements in the project management and the dynamic influence relationship among various participants in the project execution process, by using modern management technology and means, various project elements are optimized, combined and reasonably configured, and on the basis of the production of the project manager, the high-efficiency project target is realized. In the computer information system integration, in consideration of the necessity and comprehensiveness of project management implementation, all participants, particularly various suppliers, subcontractors and the like are definitely brought into an information system integration project management system, and a dynamic and efficient project organization is formed through a perfect information technology so as to realize project objectives and enable enterprises to obtain good and maximized comprehensive benefits. As is known, the object of integrating project management with an information system is a project, and since the implementation of the project usually has a one-time feature, a "control, management, coordination" mechanism, i.e., schedule control, quality control, cost control, contract management, information management, and organization coordination, needs to be followed when defining project management tasks for the project management. The complete project management system needs all functional departments, all participation units and all stage progresses to form an organic whole, and therefore, to realize comprehensive project management, at least the following aspects need to be embodied: 1) systematic, i.e. composed of sub-items, sub-items; 2) procedural, i.e. including forecasting, decision making, planning, control, feedback, etc.; 3) the mission property is project construction period, project organization, project cost, project resource and the like.
Disclosure of Invention
The invention provides a computer system integrated push project management method, a storage medium and a device, which have the advantages of high management efficiency and high safety.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a computer system integrated push project management method, the method performing the steps of:
step 1: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a block chain network;
step 2: a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes node addition, key management and read-write permission distribution; the method for managing the key comprises the following steps:
step 2.1: using the following formula, mapping the continuous data key into a discrete data key, storing the discrete data key into a subunit for individual storage, and taking out the key by adopting the inverse process of the following formula when calling is needed:
Figure GDA0003487306170000021
wherein N is a discrete dimension; x is the number ofnThe first dimension data key in the multidimensional data key; y isnThe data key of the second dimension in the multidimensional data key;
step 2.2: the key distribution management is performed in real time.
Further, the cost management terminal is configured to provide cost management for a manager, and includes: the cost budget management unit and the cost monitoring management unit; the cost budget management unit is used for providing management personnel with cost budget management; and the cost monitoring management unit is used for providing cost monitoring for managers.
Further, the time management terminal is used for providing management personnel with time management, and includes: the time budget management unit and the time monitoring management unit; the time budget management unit is used for providing management personnel with time budget management; and the time monitoring management unit is used for providing time monitoring management for managers.
Further, the risk management terminal is configured to provide a manager with risk management, and includes: a risk compliance management unit and a risk early warning management unit; the risk compliance management unit is used for providing management personnel with risk compliance management; and the risk early warning management unit is used for providing risk compliance management for managers.
Further, the construction management terminal is used for providing management personnel for construction management, and includes: a constructor management unit and a construction progress management unit; the constructor management unit is used for providing the constructor for the manager to manage the constructor; and the construction progress management unit is used for providing management personnel for construction progress management.
A computer system integrated push project management storage medium, said storage medium having stored thereon a computer program; the program includes: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a code segment of a block chain network; and a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes code segments of node addition, key management and read-write permission distribution.
Further, the apparatus comprises: the system comprises a cost management end, a time management end, a construction management end, a data security management end, a management database, a risk management end and a VPN network; the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end are used as end nodes, data communication is realized through a VPN network, and meanwhile, a block chain network is formed; the cost management terminal is used for providing cost management for managers and comprises: cost budget management and cost monitoring management; the time management terminal is used for providing time management for management personnel, and comprises: time budget management and time monitoring management; the risk management terminal is used for providing management personnel for risk management, and comprises: risk compliance management and risk early warning management; the construction management end is used for providing managers for construction management, and comprises the following components: constructor management and construction progress management; the data security management terminal comprises: data encryption management and data backup management; the management database is used for storing data of the whole device and comprises: a main database and a plurality of sub-databases.
Furthermore, the block chain network also comprises a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end which are respectively connected with a block chain system function module; the block chain system function module comprises a node adding module, a key module and a read-write authority distribution module; the key module is an asymmetric key system, and a public key exists in each node and is used for identifying the node identity; the private key exists in the USB-key and is used for encrypting data and signing; the node adding module is used for realizing the addition of the new interest related party node; and the read-write permission distribution module is used for realizing the distribution of the write permission.
Further, the read-write permission assignment module assigns the read-write permission, including the following steps:
step 1: performing the distribution of the read authority, comprising:
step 1.1: when data needs to be written in by a cost management end, a time management end, a construction management end, a data security library management end, a management database and a risk management end, a block chain system function module sends a random number to an end node needing to write in the data, the random number is encrypted by adopting a public key of the end node, the end node generates a new block, and a verification hash value h is generated through a hash value of the previous block, the subject of the block, the random number and a timestamp;
step 1.2: the end node sends the newly generated block and a verification hash value h to a block chain system function module, the h is encrypted by a public key of the block chain system function module, the block chain system function module verifies the verification hash value h, and broadcasts a new block chain and a data signature to a block chain network;
step 1.3: when the end node breaks rules and autonomously generates a new block, the verification hash value h1 is different because the random number and the timestamp are different, and the block chain system function module is responsible for verifying the validity of the verification hash value; if the hash value is verified to be an invalid hash value, judging that the newly generated block chain is invalid;
step 2: performing the distribution of the write authority, comprising:
step 2.1: the content written into the block by each end node in the block chain is encrypted by adopting an exclusive symmetric key held by the end node, the exclusive symmetric key is stored in a USB-key, and the content of the block is retrieved by adopting the subject of the block; when other interest-related party end nodes need to access the contents of the block, the USB-key storing the exclusive symmetric key needs to be held, and the contents of the block can be decrypted;
step 2.2: the central end node analyzes the content of the block chain which the end node should see, namely the read authority of the end node according to the engineering implementation flow, and distributes the USB-key containing the exclusive symmetric key to the end node according to the read authority to realize the distribution of the read authority.
Further, the method for data security management end to perform data encryption management includes the following steps:
step 1: acquiring data in a management database in real time, processing the data in the management database as image data in a binary state, performing smooth filtering on the data to obtain class image data g (x), setting an impact response function of a smoothing filter as h (x), setting original data as f (x), and then filtering the filtered data g (x) (f (x)) h (x);
step 2: carrying out edge detection on the filtered data;
and step 3: the binarization processing is performed according to the following formula:
Figure GDA0003487306170000051
wherein b (x, y) is binary data, and i (x, y) is data after edge detection;
and 4, step 4: and storing the data after the binarization processing.
The invention discloses a computer system integrated push project management method, a storage medium and a device, which have the following beneficial effects: communication among all units is realized through a block chain network, and the management efficiency is improved; meanwhile, on the aspect of data management, multiple data encryption and key encryption management are carried out, and the method has high safety. Therefore, the management efficiency is high and the safety is high.
Drawings
FIG. 1 is a schematic flow chart of a method for a computer system integrated push project management method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus of a computer system integrated push project management apparatus according to an embodiment of the present invention.
Fig. 3 is a schematic diagram illustrating an experimental result of a method, a storage medium, and an apparatus for managing a computer system integrated push project according to an embodiment of the present invention.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
A computer system integrated push project management method, the method performing the steps of:
step 1: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a block chain network;
step 2: a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes node addition, key management and read-write permission distribution; the method for managing the key comprises the following steps:
step 2.1: using the following formula, mapping the continuous data key into discrete data key, and storing the discrete data key into a subunit for separate storageStoring, when calling is needed, taking out the key by adopting the inverse process of the following formula:
Figure GDA0003487306170000071
wherein N is a discrete dimension; x is the number ofnThe first dimension data key in the multidimensional data key; y isnA data key of a second dimension of the multidimensional data keys; step 2.2: the key distribution management is performed in real time.
Specifically, deployment is implemented according to a project management cost comprehensive control scheme, a cost control target needs to be formulated, for example, a single control target is formulated according to materials, manpower, mechanical equipment and the like, dynamic management control is performed on uncertain factors such as weather, market environment and the like in a link with large complex changes, and timely guidance, supervision, adjustment and limitation are performed on human resources, material resources and expense expenditure consumed in project implementation, so that the purpose of reducing cost is achieved.
Example 2
On the basis of the above embodiment, the cost management terminal is configured to provide a manager with cost management, and includes: the cost budget management unit and the cost monitoring management unit; the cost budget management unit is used for providing management personnel with cost budget management; and the cost monitoring management unit is used for providing cost monitoring for managers.
Example 3
On the basis of the previous embodiment, the time management terminal is configured to provide time management for a manager, and includes: the time budget management unit and the time monitoring management unit; the time budget management unit is used for providing management personnel with time budget management; and the time monitoring management unit is used for providing time monitoring management for managers.
Specifically, analysis time management is to ensure the management benefit brought by completing a certain work in a limited time, in the management of computer information system integrated projects, the reasonable arrangement of time by project managers is related to the progress speed of the whole project, so how to integrate independent and dispersed systems, databases and the like in the whole system integrated project into a comprehensive information system, and the adjustment of reasonable work sequencing and work period is the premise and guarantee that each project manager can complete the project on time. The project scheduling is a key content in project management, and comprises the steps of estimating the reasonable construction period of each activity, performing overall allocation on resources according to the sequence of the activity and the task, monitoring the progress of the project constantly, and adjusting a project completion schedule in real time.
The computer information system integration has wide project coverage, highly centralized related subject and complex cooperation relation of all parts, and can accurately predict project cycles according to a certain scientific method and a progress plan programmed by a program on project time planning work.
Example 4
On the basis of the above embodiment, the risk management terminal is configured to provide a manager with risk management, and includes: a risk compliance management unit and a risk early warning management unit; the risk compliance management unit is used for providing management personnel with risk compliance management; and the risk early warning management unit is used for providing risk compliance management for managers.
Example 5
On the basis of the above embodiment, the construction management terminal is configured to provide a manager with construction management, and includes: a constructor management unit and a construction progress management unit; the constructor management unit is used for providing the constructor for the manager to manage the constructor; and the construction progress management unit is used for providing management personnel for construction progress management.
In the intelligent construction process of the building, as multiple parties such as civil engineering, decoration and installation participate in sharing time and space resources, the information system integration project should be strengthened in relevant management in actual construction to avoid mutual impoverishment and mismatching in construction. In the stage of carrying out overall planning and design on an intelligent building, the primary task is to carry out deep analysis and discussion as much as possible according to the use requirement, use function, service function and the like of the building, to comprehensively provide reasonable overall planning for class factors including applicability, economy, advancement and the like, to cooperate with a construction party and a design party to carry out system structure and layout on each subsystem, to organize and demonstrate, and to coordinate the arrangement of monitoring objects, equipment quantity and orientation characteristics, such as wire pipes and wire slots in construction and wire pipes, wire slots and pipelines in water, electricity and wind systems.
The project manager is the first person responsible in the whole project implementation process, not only needs to actively adopt new technology on implementation methods, implementation machine selection and implementation sequence arrangement to improve efficiency, but also needs to analyze profit-loss balance in time in the whole project management, such as supervising and prompting implementation and management of contracts, supervising and managing reporting and payment urging work of project progress, reasonably scheduling capital to carefully organize work progress of project members according to analysis of financial collection and payment conditions, and actively fulfilling responsibility requirements. On the management of the cooperation of a reinforced weak current system and civil engineering and decoration, underground, wall-penetrating and wire pipe and wire groove projects embedded along the wall surface of a column need to be communicated and cooperated timely and effectively, and enough time and space are reserved for weak current construction.
Example 6
A computer system integrated push project management storage medium, said storage medium having stored thereon a computer program; the program includes: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a code segment of a block chain network; and a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes code segments of node addition, key management and read-write permission distribution.
Example 7
On the basis of the above embodiment, the apparatus includes: the system comprises a cost management end, a time management end, a construction management end, a data security management end, a management database, a risk management end and a VPN network; the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end are used as end nodes, data communication is realized through a VPN network, and meanwhile, a block chain network is formed; the cost management terminal is used for providing cost management for managers and comprises: cost budget management and cost monitoring management; the time management terminal is used for providing time management for management personnel, and comprises: time budget management and time monitoring management; the risk management terminal is used for providing management personnel for risk management, and comprises: risk compliance management and risk early warning management; the construction management end is used for providing managers for construction management, and comprises the following components: constructor management and construction progress management; the data security management terminal comprises: data encryption management and data backup management; the management database is used for storing data of the whole device and comprises: a main database and a plurality of sub-databases.
Specifically, to systematically solve the problems encountered in the project management process, it is necessary to establish a development circuit diagram of a project operation system, which has both a long-term target and a short-term target, and has both a key target and a temporary auxiliary target, and even for the same business problems, it is possible to use different tools or methods to solve the problems. In general, some of the problems in management are related to each other, and only some items have delightful and urgent implementation.
Given that organizational changes are limited, project management practices can only change in a certain amount of time within their own, which places a great deal on the primary elements of each project task that needs to be timely implemented in the project management process. The scientific promotion of project management depends on the correct decision of managers, the concept is continuously updated, the era pace is followed, the philosophy of project management is established, the evaluation of high-looking far-paying attention to the tactical objective is realized, the self recognition is tightly combined with the market, and the problems of project organization, planning, coordination and the like are grasped from the management height.
Example 8
On the basis of the previous embodiment, the blockchain network further comprises a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end which are respectively connected with a blockchain system function module; the block chain system function module comprises a node adding module, a key module and a read-write authority distribution module; the key module is an asymmetric key system, and a public key exists in each node and is used for identifying the node identity; the private key exists in the USB-key and is used for encrypting data and signing; the node adding module is used for realizing the addition of the new interest related party node; and the read-write permission distribution module is used for realizing the distribution of the write permission.
Example 9
In particular, risks are ubiquitous, especially in the highly creative and challenging system integration industry, and risks remain highly valued by managers during project implementation. Compared with the traditional industry, the system integration project has the characteristics of multidisciplinary intersection, financial resources and intelligence intensity, so that more uncertain factors are brought, and the failure of the expected target is likely to be caused if a manager lacks a cool plan. Therefore, the risk awareness of system integration project management is kept all the time, and the risk existing in the project progress is researched by using tools such as probability, mathematical statistics and the like, so that the good strategy for controlling the risk is searched.
The method combines the project risk characteristics in information system integration, and is refined into the following categories: namely scheme design risk, equipment model selection risk, new and old system switching risk, data loss risk, network security risk, project progress risk, organizational structure risk and the like. Aiming at the risk characteristics, a risk response plan is actively compiled to change or reduce the probability of risk occurrence or the harm consequences, the identified risk is monitored in an enhanced mode, and the risk damage in project management is gradually reduced in a staged mode.
On the basis of the previous embodiment, the read-write permission allocation module for allocating the read-write permission comprises the following steps:
step 1: performing the distribution of the read authority, comprising:
step 1.1: when data needs to be written in by a cost management end, a time management end, a construction management end, a data security library management end, a management database and a risk management end, a block chain system function module sends a random number to an end node needing to write in the data, the random number is encrypted by adopting a public key of the end node, the end node generates a new block, and a verification hash value h is generated through a hash value of the previous block, the subject of the block, the random number and a timestamp;
step 1.2: the end node sends the newly generated block and a verification hash value h to a block chain system function module, the h is encrypted by a public key of the block chain system function module, the block chain system function module verifies the verification hash value h, and broadcasts a new block chain and a data signature to a block chain network;
step 1.3: when the end node breaks rules and autonomously generates a new block, the verification hash value h1 is different because the random number and the timestamp are different, and the block chain system function module is responsible for verifying the validity of the verification hash value; if the hash value is verified to be an invalid hash value, judging that the newly generated block chain is invalid;
step 2: performing the distribution of the write authority, comprising:
step 2.1: the content written into the block by each end node in the block chain is encrypted by adopting an exclusive symmetric key held by the end node, the exclusive symmetric key is stored in a USB-key, and the content of the block is retrieved by adopting the subject of the block; when other interest-related party end nodes need to access the contents of the block, the USB-key storing the exclusive symmetric key needs to be held, and the contents of the block can be decrypted;
step 2.2: the central end node analyzes the content of the block chain which the end node should see, namely the read authority of the end node according to the engineering implementation flow, and distributes the USB-key containing the exclusive symmetric key to the end node according to the read authority to realize the distribution of the read authority.
Example 10
On the basis of the above embodiment, the method for data encryption management by the data security management end includes the following steps:
step 1: acquiring data in a management database in real time, processing the data in the management database as image data in a binary state, performing smooth filtering on the data to obtain class image data g (x), setting an impact response function of a smoothing filter as h (x), setting original data as f (x), and then filtering the filtered data g (x) (f (x)) h (x);
step 2: carrying out edge detection on the filtered data;
and step 3: the binarization processing is performed according to the following formula:
Figure GDA0003487306170000131
wherein b (x, y) is binary data, and i (x, y) is data after edge detection;
and 4, step 4: and storing the data after the binarization processing.
The above description is only an embodiment of the present invention, but not intended to limit the scope of the present invention, and any structural changes made according to the present invention should be considered as being limited within the scope of the present invention without departing from the spirit of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. A computer system integrated push project management method, characterized in that the method performs the steps of:
step 1: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a block chain network;
step 2: a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes node addition, key management and read-write permission distribution; the method for managing the key comprises the following steps:
step 2.1: using the following formula, mapping the continuous data key into a discrete data key, storing the discrete data key into a subunit for individual storage, and taking out the key by adopting the inverse process of the following formula when calling is needed:
Figure FDA0003487306160000011
wherein N is a discrete dimension; x is the number ofnThe first dimension data key in the multidimensional data key; y isnThe data key of the second dimension in the multidimensional data key;
step 2.2: the key distribution management is performed in real time.
2. The method of claim 1, wherein the cost management terminal is configured to provide cost management to a manager, and comprises: the cost budget management unit and the cost monitoring management unit; the cost budget management unit is used for providing management personnel with cost budget management; and the cost monitoring management unit is used for providing cost monitoring for managers.
3. The method of claim 1, wherein the time management terminal is configured to provide time management for a manager, and the method comprises: the time budget management unit and the time monitoring management unit; the time budget management unit is used for providing management personnel with time budget management; and the time monitoring management unit is used for providing time monitoring management for managers.
4. The method of claim 1, wherein the risk management terminal is configured to provide a manager with risk management, and comprises: a risk compliance management unit and a risk early warning management unit; the risk compliance management unit is used for providing management personnel with risk compliance management; and the risk early warning management unit is used for providing risk compliance management for managers.
5. The method of claim 1, wherein the construction management terminal, configured to provide a manager with construction management, comprises: a constructor management unit and a construction progress management unit; the constructor management unit is used for providing the constructor for the manager to manage the constructor; and the construction progress management unit is used for providing management personnel for construction progress management.
6. A computer-system-integrated push project management storage medium, characterized in that the storage medium has stored thereon a computer program for implementing the computer-system-integrated push project management method according to claim 1; the program when executed by a processor is capable of implementing the steps of: connecting a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end by using a VPN network, and establishing a code segment of a block chain network; and a block chain system function module is respectively connected with the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end, and the module realizes code segments of node addition, key management and read-write permission distribution.
7. A computer system integrated push project management apparatus for implementing the computer system integrated push project management method of claim 1, comprising: the system comprises a cost management end, a time management end, a construction management end, a data security management end, a management database, a risk management end and a VPN network; the cost management end, the time management end, the construction management end, the data security management end, the management database and the risk management end are used as end nodes, data communication is realized through a VPN network, and meanwhile, a block chain network is formed; the cost management terminal is used for providing cost management for managers and comprises: cost budget management and cost monitoring management; the time management terminal is used for providing time management for management personnel, and comprises: time budget management and time monitoring management; the risk management terminal is used for providing management personnel for risk management, and comprises: risk compliance management and risk early warning management; the construction management end is used for providing managers for construction management, and comprises the following components: constructor management and construction progress management; the data security management terminal comprises: data encryption management and data backup management; the management database is used for storing data of the whole device and comprises: a main database and a plurality of sub-databases.
8. The apparatus of claim 7, wherein the blockchain network further comprises a cost management end, a time management end, a construction management end, a data security management end, a management database and a risk management end, each of which is connected with a blockchain system function module; the block chain system function module comprises a node adding module, a key module and a read-write authority distribution module; the key module is an asymmetric key system, and a public key exists in each node and is used for identifying the node identity; the private key exists in the USB-key and is used for encrypting data and signing; the node adding module is used for realizing the addition of the new interest related party node; and the read-write permission distribution module is used for distributing the read-write permission.
9. The apparatus of claim 8, wherein the read-write permission assignment module assigns the read-write permission, comprising:
step 1: performing the distribution of the read authority, comprising:
step 1.1: when data needs to be written in by a cost management end, a time management end, a construction management end, a data security library management end, a management database and a risk management end, a block chain system function module sends a random number to an end node needing to write in the data, the random number is encrypted by adopting a public key of the end node, the end node generates a new block, and a verification hash value h is generated through a hash value of the previous block, the subject of the block, the random number and a timestamp;
step 1.2: the end node sends the newly generated block and a verification hash value h to a block chain system function module, the h is encrypted by a public key of the block chain system function module, the block chain system function module verifies the verification hash value h, and broadcasts a new block chain and a data signature to a block chain network;
step 1.3: when the end node breaks rules and autonomously generates a new block, the verification hash value h1 is different because the random number and the timestamp are different, and the block chain system function module is responsible for verifying the validity of the verification hash value; if the hash value is verified to be an invalid hash value, judging that the newly generated block chain is invalid;
step 2: performing the distribution of the write authority, comprising:
step 2.1: the content written into the block by each end node in the block chain is encrypted by adopting an exclusive symmetric key held by the end node, the exclusive symmetric key is stored in a USB-key, and the content of the block is retrieved by adopting the subject of the block; when other interest-related party end nodes need to access the contents of the block, the USB-key storing the exclusive symmetric key needs to be held, and the contents of the block can be decrypted;
step 2.2: the central end node analyzes the content of the block chain which the end node should see, namely the read authority of the end node according to the engineering implementation flow, and distributes the USB-key containing the exclusive symmetric key to the end node according to the read authority to realize the distribution of the write authority.
10. The apparatus of claim 9, wherein the data security management end performs the following steps in a method for performing data encryption management:
step 1: acquiring data in a management database in real time, processing the data in the management database as image data in a binary state, performing smooth filtering on the data to obtain class image data g (x), setting an impact response function of a smoothing filter as h (x), setting original data as f (x), and then filtering the filtered data g (x) (f (x)) h (x);
step 2: carrying out edge detection on the filtered data;
and step 3: the binarization processing is performed according to the following formula:
Figure FDA0003487306160000041
wherein b (x, y) is binary data, and i (x, y) is data after edge detection;
and 4, step 4: and storing the data after the binarization processing.
CN201910675525.8A 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device Active CN110430250B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910675525.8A CN110430250B (en) 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910675525.8A CN110430250B (en) 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device

Publications (2)

Publication Number Publication Date
CN110430250A CN110430250A (en) 2019-11-08
CN110430250B true CN110430250B (en) 2022-04-05

Family

ID=68412377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910675525.8A Active CN110430250B (en) 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device

Country Status (1)

Country Link
CN (1) CN110430250B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110880069A (en) * 2019-11-12 2020-03-13 深圳市建筑科学研究院股份有限公司 Engineering settlement traceability method and device based on block chain technology
CN112884264A (en) * 2019-11-30 2021-06-01 南京苏德创新科技有限公司 Process management method based on information system integration
CN111159769B (en) * 2019-12-31 2023-06-09 杭州产链数字科技有限公司 Building engineering cost supervision system and method based on block chain
CN112907077A (en) * 2021-02-20 2021-06-04 一智科技(成都)有限公司 Construction task order dispatching method and system
CN115222241B (en) * 2022-07-15 2023-02-24 实链检测(浙江)有限公司 Engineering quality detection method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503875A (en) * 2015-09-05 2017-03-15 哈尔滨卓晋科技有限公司 A kind of propulsion project management method of Computer systems
CN108629564A (en) * 2018-04-28 2018-10-09 中国船舶重工集团公司第七〇九研究所 A kind of Management in Large Scale Project system and method based on block chain technology
CN109039606A (en) * 2018-08-22 2018-12-18 上海循态信息科技有限公司 Same frequency sampling method and circuit in continuous variable quantum key distribution system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10713654B2 (en) * 2016-01-21 2020-07-14 International Business Machines Corporation Enterprise blockchains and transactional systems
US11095432B2 (en) * 2017-04-05 2021-08-17 Samsung Sds Co., Ltd. System for processing data based on blockchain and operating method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503875A (en) * 2015-09-05 2017-03-15 哈尔滨卓晋科技有限公司 A kind of propulsion project management method of Computer systems
CN108629564A (en) * 2018-04-28 2018-10-09 中国船舶重工集团公司第七〇九研究所 A kind of Management in Large Scale Project system and method based on block chain technology
CN109039606A (en) * 2018-08-22 2018-12-18 上海循态信息科技有限公司 Same frequency sampling method and circuit in continuous variable quantum key distribution system

Also Published As

Publication number Publication date
CN110430250A (en) 2019-11-08

Similar Documents

Publication Publication Date Title
CN110430250B (en) Computer system integrated push project management method, storage medium and device
Aoun et al. A review of Industry 4.0 characteristics and challenges, with potential improvements using blockchain technology
Harrison et al. Foundations for smarter cities
Kisi et al. Optimal productivity in labor-intensive construction operations: Pilot study
US20070288275A1 (en) It services architecture planning and management
Gan et al. Formulation and analysis of dynamic supply chain of backfill in construction waste management using agent-based modeling
Molero et al. Total safety by design: Increased safety and operability of supply chain of inland terminals for containers with dangerous goods
Cantner et al. Network position, absorptive capacity and firm success
Chen et al. Applying robust optimization to MISO look-ahead commitment
Micheli et al. A two-stage stochastic MILP model for generation and transmission expansion planning with high shares of renewables
Solomon et al. A knowledge based approach for handling supply chain risk management
Banciu et al. Digital Transformation Impact on Organization Management and Several Necessary Protective Actions
Nenashev et al. The economics of introducing the peer-to-peer system of storage and processing of protected information at an enterprise
Akbar et al. Toward effective and efficient DevOps using blockchain
Niavis et al. Trusted dbl: A blockchain-based digital twin for sustainable and interoperable building performance evaluation
CN112085378B (en) Resource allocation method, device, computer equipment and storage medium
CA2936447C (en) Method and system for managing geospatial deployment
Jean-Baptiste et al. Model risk management systems-back-end, middleware, front-end and analytics
US20210097454A1 (en) Systems and methods for artificial intelligence (ai) damage triage and dynamic resource allocation, routing, and scheduling
Muzi et al. Digital Information Management in the Built Environment: Data-Driven Approaches for Building Process Optimization
CN103034930A (en) Automation software life cycle model deployment system
CN113541959A (en) Construction project management system and method
Winter et al. Organization of Data Warehousing in Large Service Companies: A Matrix Approach Based on Data Ownership and Competence Centers
CN111274323A (en) Intelligent automatic monitoring method based on periodicity
Rosenberg et al. A systems-based approach to creating value from infrastructure interdependencies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant