CN110557361A - Method and system for dynamically managing overall process cost - Google Patents
Method and system for dynamically managing overall process cost Download PDFInfo
- Publication number
- CN110557361A CN110557361A CN201910194517.1A CN201910194517A CN110557361A CN 110557361 A CN110557361 A CN 110557361A CN 201910194517 A CN201910194517 A CN 201910194517A CN 110557361 A CN110557361 A CN 110557361A
- Authority
- CN
- China
- Prior art keywords
- network
- cost
- local
- user terminal
- price
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000015654 memory Effects 0.000 claims abstract description 32
- 238000007726 management method Methods 0.000 claims abstract description 25
- 230000005540 biological transmission Effects 0.000 claims abstract description 6
- 230000006399 behavior Effects 0.000 claims description 6
- 238000003860 storage Methods 0.000 claims description 6
- 239000002131 composite material Substances 0.000 claims description 2
- 238000010276 construction Methods 0.000 abstract description 10
- 230000010354 integration Effects 0.000 abstract description 2
- 238000000354 decomposition reaction Methods 0.000 abstract 1
- 230000002194 synthesizing effect Effects 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 8
- 230000009545 invasion Effects 0.000 description 7
- 238000005111 flow chemistry technique Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06312—Adjustment or analysis of established resource schedule, e.g. resource or task levelling, or dynamic rescheduling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/08—Construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a whole-process construction cost dynamic management method and a system, belonging to the technical field of construction cost, and the technical scheme has the key points that the dynamic management method comprises the steps of local encryption, decomposition retrieval, encryption transmission, decryption integration, data refreshing and the like; the dynamic management system comprises a user terminal, a local server and a plurality of network servers, wherein the local server comprises a local processor and a local memory, and the network servers comprise a network processor and a network memory; the local server is used for locally encrypting and decrypting the local encryption and synthesizing the cost update table and refreshing the cost list of the user terminal; the network server is used for performing dispersed retrieval on the project names and encrypting the process; the problems that in the existing method and system, information in a cloud server is easy to leak data due to network intrusion, and the information security is low are solved; the security of the cost data can be improved when updating the item prices of the cost list of the user terminal.
Description
Technical Field
The invention relates to the technical field of construction cost, in particular to a method and a system for dynamically managing the total construction cost
Background
The project cost refers to the project price, namely the price of the building installation project and the total price of the construction project which are predicted or actually formed in the markets of land, equipment, technical labor, contract and the like through the trading modes of bidding, bidding and the like. The construction cost needs to be estimated and evaluated for many times, the actual land, equipment, technical labor and the price on the contract are changed continuously, and the estimation and the evaluation of the cost engineer are influenced to a certain extent.
The Chinese patent application publication No. CN106530143A discloses a whole-process cost dynamic management method and a whole-process cost dynamic management system, wherein the whole-process cost dynamic management method comprises the following steps: the method comprises the steps that a cloud server obtains a real-time updating list and reads a cost list stored in the cloud server, wherein item names and item prices are stored in the updating list and the cost list; if the updated list and the cost list have the same item name, updating the item price of the cost list; if the item prices of the cost list are updated, the updated cost list is stored in a cloud server; the whole-process manufacturing cost dynamic management system comprises a cloud server, wherein the cloud server comprises a processor and a memory, the memory of the cloud server is used for storing instructions, and the processor of the cloud server is used for calling the instructions stored in the memory to execute the following operations: the method comprises the steps that a cloud server obtains a real-time updating list and reads a cost list stored in the cloud server, wherein item names and item prices are stored in the updating list and the cost list; if the updated list and the cost list have the same item name, updating the item price of the cost list; wherein, the item price is updated to replace the item price of the cost list with the item price of the corresponding item name of the updated list; and if the item prices of the cost list are updated, storing the updated cost list in a cloud server.
In the above dynamic management method and system for the whole process, the cloud server obtains the real-time update list and reads the cost list stored in the cloud server, wherein the update list and the cost list both store the project name and the project price, so that a large amount of information of the project cost is stored in the cloud server; the cloud service can communicate with other terminal devices through a network, and further, data leakage is easily caused by network intrusion of information in the cloud server, adverse effects are further caused to engineering projects, and the safety of the information is low.
Disclosure of Invention
One of the objects of the present invention is to provide a whole-process construction cost dynamic management method capable of improving the safety of construction cost data when updating item prices of a construction cost list of a user terminal.
The above object of the present invention is achieved by the following technical solutions: a whole-process cost dynamic management method comprises the following steps:
step S1: local encryption, wherein the local server encrypts the project names in the cost list of the user terminal to form a plurality of encrypted retrieval data packets, and randomly sends the encrypted retrieval data packets to a plurality of different network servers;
step S2: decomposing and searching, wherein the plurality of network servers respectively decrypt the received encrypted searching data packets to obtain corresponding item names, and search the item prices corresponding to the item names in the network database according to the received item names;
step S3: encrypting and transmitting, wherein the network server generates a price grid list for the item price corresponding to the retrieved item name, and encrypts the price sub-list to generate an encrypted price data packet;
Step S4: decrypting and integrating, wherein the network server sends the encrypted data packets to a local server, and the local server decrypts the encrypted data packets sent by the plurality of network servers to synthesize a cost updating table;
step S5: and data refreshing, wherein the local server compares the cost updating table with the item prices of the same item names in the cost list of the user terminal, and refreshes and covers the item prices in the cost list when the item prices in the cost updating table are different from the item prices in the cost list.
By adopting the technical scheme, the project names of the cost list are randomly distributed to the network servers, the network servers are used for retrieving the project prices of the project names received by the network servers, and the data are collected to the local server, so that the influence of the network servers when the data are leaked is reduced, and the transmitted data are encrypted in the data transmission process of the network servers and the local server, so that the data safety is further improved.
The invention is further configured to: the local server generates a password account book at regular time, sends the password account book to a plurality of network servers, and carries out coverage refreshing on the current password account book.
By adopting the technical scheme, the encryption and decryption modes are replaced by locally adopting a mode of positioning to generate the password account book, so that the security of encryption protection is improved.
The invention is further configured to: and the network server monitors illegal intrusion through a firewall, and empties the temporary data of the decrypted price sublist when intrusion behavior is detected.
By adopting the technical scheme, the illegal invasion is monitored through the firewall, and when the invasion behavior is detected, the decrypted temporary data of the price sublist is emptied, so that the phenomenon that when the network service is invaded, the unencrypted data of the network server in the process of flow processing is leaked, and the information is leaked is avoided.
The invention is further configured to: when the user terminal sends a connection request to the local server, the local server reads the item name in the cost list of the user terminal, otherwise, the user terminal and the local server are disconnected.
By adopting the technical scheme, when the user terminal sends a connection request to the local server, the local server reads the project name in the cost list of the user terminal, otherwise, the user terminal is disconnected with the local server user terminal, so that the user terminal is isolated from communication equipment such as the local server and the like when the cost list of the user terminal is not required to be refreshed, and the data security of the cost list in the user terminal is further ensured.
the invention is further configured to: the user terminal is connected and communicated with the local server through Bluetooth or NFC or a wireless network.
Through adopting above-mentioned technical scheme, user terminal passes through multiple modes such as bluetooth or NFC or wireless network and connects the communication with local server to the user can be according to the use habit and the use occasion of oneself to selecting communication connection mode, and the person of facilitating the use uses.
It is another object of the present invention to provide a full process cost dynamic management system.
The above object of the present invention is achieved by the following technical solutions: a whole-process cost dynamic management system comprises a user terminal, a local server and a plurality of network servers, wherein the local server comprises a local processor and a local memory, and the network servers comprise a network processor and a network memory;
The local processor reads the item names in the cost list of the user terminal from the local server of the user terminal, encrypts the item names in the cost list of the user terminal to form a plurality of encrypted retrieval data packets, and randomly sends the encrypted retrieval data packets to network memories of a plurality of different network servers;
The network processor decrypts the encrypted data packet in the network memory to generate item name information, and retrieves price information in a network database according to the item name information to generate a price sublist; the network processor encrypts the price grid list to generate an encrypted price data packet and sends the encrypted price data packet to a local memory;
The local processor decrypts the plurality of encrypted price data packets in the local memory to generate a synthesized cost update table; and the local processor compares the cost updating table with the item prices corresponding to the same item names in the cost list of the user terminal, and performs coverage refreshing on the item prices in the cost list.
By adopting the technical scheme, the project names are randomly distributed to the network servers through the local processor to be respectively retrieved, so that each network server receives and processes part of project name information, only local information leakage can be caused when the network server sends data leakage, the projects of the cost list cannot be analyzed, data encryption is carried out when the local server and the network servers carry out data transmission, the protection capability of the data is further improved, and the safety of the information is improved when the project prices of the cost list are inquired and updated.
the invention is further configured to: the local processor generates a password account book at regular time, stores the password in a local memory and sends the password account book to network memories of a plurality of network servers; and the new password account book carries out coverage refreshing on the current password account book.
By adopting the technical scheme, the encryption mode and the decryption mode are changed in the mode that the local processor generates the password account book at regular time, so that the possibility of encrypted data leakage caused by cracking of the encryption mode is reduced, and the data security is further improved.
The invention is further configured to: the network server also comprises a firewall, wherein the firewall monitors the reading state of the network memory, and when the firewall detects illegal invasion, the firewall empties the temporary data of the price sublist in the local memory.
by adopting the technical scheme, the illegal invasion is monitored through the firewall, and when the invasion behavior is detected, the decrypted temporary data of the price sublist is emptied, so that the phenomenon that when the network service is invaded, the unencrypted data of the network server in the process of flow processing is leaked, and the information is leaked is avoided.
in conclusion, the beneficial technical effects of the invention are as follows:
1. the project names of the cost list are randomly distributed to the network servers, the network servers are used for retrieving the project prices of the project names received by the network servers, and the data are gathered to the local server, so that the influence of the network servers when the data are leaked is reduced, and the transmitted data are encrypted in the data transmission process of the network servers and the local server, so that the safety of the data is further improved;
2. the encryption and decryption modes are changed by locally adopting a mode of positioning and generating a password account book, so that the security of encryption protection is improved, illegal invasion is monitored through a firewall, and when an invasion behavior is detected, temporary data of a decrypted price sublist is emptied, so that the leakage of information caused by leakage of unencrypted data in the process of processing the network server in the case that the network server is invaded is avoided;
3. when the user terminal sends a connection request to the local server, the local server reads the item name in the cost list of the user terminal, otherwise, the user terminal and the local server are disconnected, so that the user terminal is isolated from communication equipment such as the local server when the cost list of the user terminal does not need to be refreshed, and the data security of the cost list in the user terminal is further ensured.
Drawings
FIG. 1 is a flowchart of a dynamic management method of the total process cost in embodiment 1;
FIG. 2 is a functional block diagram showing the structure of a dynamic management system for the total-process construction cost in embodiment 2;
FIG. 3 is a block diagram of the information processing flow of the dynamic total-process cost management system in embodiment 2.
In the figure, 1, a user terminal; 2. a local server; 21. a local processor; 22. a local memory; 3. a network server; 31. a network processor; 32. a network memory; 33. a firewall.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Example 1: a dynamic management method for the whole process cost is disclosed, referring to FIG. 1, comprising the following steps:
step S1: and (4) local encryption. When the user refreshes the current cost list through the user terminal 1, the user terminal 1 is connected and communicated with the local server 2 through Bluetooth or NFC or a wireless network. When the user terminal 1 sends a connection request to the local server 2, the local server 2 reads the item name in the cost list of the user terminal 1, otherwise, the user terminal 1 and the local server 2 are disconnected with each other. The local server 2 reads the cost list of the user terminal 1, encrypts the item names in the cost list of the user terminal 1 to form a plurality of encrypted retrieval packets, and randomly transmits the encrypted retrieval packets to a plurality of different network servers 3.
Step S2: and (5) decomposing and searching. The local server 2 generates the password account book at regular time and sends the password account book to the plurality of network servers 3, and the current password account book is subjected to coverage refreshing. The plurality of network servers 3 decrypt the received encrypted retrieval data packet according to the current password account book to obtain the corresponding project name. The network server 3 retrieves the item price corresponding to the item name in the network database according to the received item name.
Step S3: and (5) encrypting transmission. The web server 3 creates a price grid list for the item price corresponding to the retrieved item name, and the created price sublist is temporarily stored in the web server 3. The network server 3 encrypts the price sublist according to the current password account book to generate an encrypted price data packet. The network server 3 monitors the illegal intrusion through the firewall 33, and when the intrusion behavior is detected, the temporary data of the decrypted price sublist is emptied, so that the possibility of data leakage of the unencrypted price sublist when the network server 3 is subjected to the illegal intrusion is reduced.
Step S4: and (6) decryption and integration. The network server 3 transmits the encrypted data packet to the local server 2, and the local server 2 decrypts the encrypted data packets transmitted from the plurality of network servers to synthesize a cost update table.
step S5: and (3) data refreshing, wherein the local server 2 compares the cost updating table with the item prices of the same item names in the cost list of the user terminal 1, and when the item prices of the cost updating table are different from the item prices in the cost list, the local server 2 refreshes and covers the corresponding item prices in the cost list by the item price data in the current cost updating table.
Example 2: a whole-process cost dynamic management system, refer to FIG. 2, includes a user terminal 1, a local server 2 and a plurality of network servers 3. The local server 2 includes a local processor 21 and a local storage 22, and the network server 3 includes a network processor 31, a network storage 32, and a firewall 33. The user terminal 1 is a smart phone, a tablet computer, a notebook computer or other intelligent equipment with a communication function. The user terminal 1 stores the cost list, and then the cost information of the cost list is read through the user terminal 1. The user terminal 1 is provided with Bluetooth, NFC and wireless network communication modules, and then makes things convenient for the staff to select the communication mode according to the actual service condition. When the user terminal 1 sends a connection request to the local server 2, the local server 2 reads the item name in the cost list of the user terminal 1, otherwise, the user terminal 1 and the local server 2 are disconnected with each other.
Referring to fig. 2 and 3, when the user refreshes the cost list of the user terminal 1, the user terminal 1 sends a connection request to the local server 2, and a communication connection is established between the local server 2 and the user terminal 1. The local server 2 now sends a connection request to the network server 3, and the local server 2 establishes a wireless network connection with the network server 3. The local processor 21 periodically generates a password book, stores the password in the local memory 22 and transmits the password book to the network memories 32 of the plurality of network servers 3; and the new password account book carries out coverage refreshing on the current password account book. The local processor 21 reads the item name in the cost list of the user terminal 1, encrypts the item name in the cost list of the user terminal 1 based on the password book to form a plurality of encrypted retrieval packets, and randomly transmits the encrypted retrieval packets to the network memories 32 of the plurality of different network servers 3.
The network processor 31 decrypts the encrypted data packet in the network memory 32 according to the current crypto-book to generate item name information, and retrieves price information in the network database according to the item name information to generate a price sublist, which is temporarily stored in the network memory 32. The network processor 31 encrypts the price grid list, generates an encrypted price packet, and sends the encrypted price packet to the local memory 22. The firewall 33 monitors the read state of the network storage 32, and when the firewall 33 detects an illegal intrusion, the firewall 33 clears the temporary data of the price sublist in the local storage 22 so as to avoid leakage of unencrypted data of the network server 3 in the process of flow processing when the network service is invaded, thereby causing leakage of information.
The local processor 21 decrypts the plurality of encrypted price data packets in the local memory 22 to generate a composite price update table. The local processor 21 compares the cost update table with the item prices corresponding to the same item names in the cost list of the user terminal 1, and when the item prices in the cost update table are different from the item prices in the cost list, the local server 2 refreshes and covers the corresponding item prices in the cost list with the item price data in the current cost update table, so that the item prices in the cost list of the user terminal 1 are updated, and engineering personnel can know the latest cost information in time.
the embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.
Claims (8)
1. A whole-process cost dynamic management method is characterized by comprising the following steps:
Step S1: local encryption, wherein the local server (2) encrypts the item names in the cost list of the user terminal (1) to form a plurality of encrypted retrieval data packets, and randomly sends the encrypted retrieval data packets to a plurality of different network servers (3);
Step S2: decomposing and searching, wherein the plurality of network servers (3) respectively decrypt the received encrypted searching data packets to obtain corresponding project names, and search the project prices corresponding to the project names in the network database according to the received project names;
Step S3: encrypting transmission, wherein the network server (3) generates a price grid list for the item price corresponding to the retrieved item name, and encrypts the price sub-list to generate an encrypted price data packet;
Step S4: decrypting and integrating, wherein the network server (3) sends the encrypted data packets to the local server (2), and the local server (2) decrypts the encrypted data packets sent by the network servers (3) to synthesize a cost updating table;
Step S5: and (3) refreshing the data, wherein the local server (2) compares the cost updating table with the item prices of the same item names in the cost list of the user terminal (1), and refreshes and covers the item prices in the cost list when the item prices in the cost updating table are different from the item prices in the cost list.
2. The overall process cost dynamic management method of claim 1, wherein: the local server (2) generates a password account book at regular time, sends the password account book to a plurality of network servers (3), and carries out coverage refreshing on the current password account book.
3. The overall process cost dynamic management method of claim 1, wherein: the network server (3) monitors illegal intrusion through a firewall (33), and empties the temporary data of the decrypted price sublist when intrusion behavior is detected.
4. The overall process cost dynamic management method of claim 1, wherein: when the user terminal (1) sends a connection request to the local server (2), the local server (2) reads the item names in the cost list of the user terminal (1), otherwise, the user terminal (1) and the local server (2) are disconnected.
5. the overall process cost dynamic management method of claim 1, wherein: the user terminal (1) is connected and communicated with the local server (2) through Bluetooth or NFC or a wireless network.
6. A whole-process cost dynamic management system is characterized in that: the system comprises a user terminal (1), a local server (2) and a plurality of network servers (3), wherein the local server (2) comprises a local processor (21) and a local memory (22), and the network servers (3) comprise a network processor (31) and a network memory (32);
The local processor (21) reads the item names in the cost list of the user terminal (1) from the local server (2) of the user terminal (1), encrypts the item names in the cost list of the user terminal (1) to form a plurality of encrypted retrieval data packets, and randomly transmits the encrypted retrieval data packets to the network memories (32) of the plurality of different network servers (3);
The network processor (31) decrypts the encrypted data packet in the network memory (32) to generate item name information, and retrieves price information in a network database according to the item name information to generate a price sublist; -said network processor (31) encrypting the price grid list, generating an encrypted price data packet, and sending the encrypted price data packet to a local memory (22);
the local processor (21) decrypts the plurality of encrypted price data packets in the local memory (22) to generate a composite price update table; and the local processor (21) compares the cost updating table with the item prices corresponding to the same item names in the cost list of the user terminal (1), and performs coverage refreshing on the item prices in the cost list.
7. the system for dynamic management of overall process cost according to claim 6, wherein: the local processor (21) generates a password book at regular time, stores the password in a local memory (22) and sends the password book to a network memory (32) of a plurality of network servers (3); and the new password account book carries out coverage refreshing on the current password account book.
8. The system for dynamic management of overall process cost according to claim 6, wherein: the network server (3) further comprises a firewall (33), the firewall (33) monitors the reading state of the network storage (32), and when the firewall (33) detects illegal intrusion, the firewall (33) empties temporary data of the price sublist in the local storage (22).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910194517.1A CN110557361B (en) | 2019-03-14 | 2019-03-14 | Method and system for dynamically managing overall process cost |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910194517.1A CN110557361B (en) | 2019-03-14 | 2019-03-14 | Method and system for dynamically managing overall process cost |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110557361A true CN110557361A (en) | 2019-12-10 |
CN110557361B CN110557361B (en) | 2022-04-26 |
Family
ID=68736316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910194517.1A Active CN110557361B (en) | 2019-03-14 | 2019-03-14 | Method and system for dynamically managing overall process cost |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110557361B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111724141A (en) * | 2020-06-29 | 2020-09-29 | 张群 | Dynamic management method for construction cost in whole process of engineering cost settlement |
CN114553499A (en) * | 2022-01-28 | 2022-05-27 | 中国银联股份有限公司 | Image encryption method, image processing method, device, equipment and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1689040A (en) * | 2003-03-31 | 2005-10-26 | 富士通株式会社 | Collator and register |
CN102667845A (en) * | 2009-08-05 | 2012-09-12 | 帕特奈株式会社 | Electronic price-proposing system, electronic price-proposing device, and electronic price-proposing method |
CN102710661A (en) * | 2012-06-25 | 2012-10-03 | 上海交通大学 | Cloud storage and aggregation architecture and data storage and aggregation method by using same |
US20130080765A1 (en) * | 2011-09-26 | 2013-03-28 | Subhashis Mohanty | Secure cloud storage and synchronization systems and methods |
CN103593476A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage |
CN105100115A (en) * | 2015-08-27 | 2015-11-25 | 中国科学院信息工程研究所 | Data storage method for privacy protection based on encryption password and data fractionation |
CN105407119A (en) * | 2014-09-12 | 2016-03-16 | 北京计算机技术及应用研究所 | Cloud computing system and method thereof |
CN106530143A (en) * | 2016-11-08 | 2017-03-22 | 河南财政税务高等专科学校 | Engineering cost list service system |
CN109064024A (en) * | 2018-08-02 | 2018-12-21 | 广东展诚工程咨询有限公司 | A kind of engineering Whole Process Cost dynamic management approach and system |
-
2019
- 2019-03-14 CN CN201910194517.1A patent/CN110557361B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1689040A (en) * | 2003-03-31 | 2005-10-26 | 富士通株式会社 | Collator and register |
CN102667845A (en) * | 2009-08-05 | 2012-09-12 | 帕特奈株式会社 | Electronic price-proposing system, electronic price-proposing device, and electronic price-proposing method |
US20130080765A1 (en) * | 2011-09-26 | 2013-03-28 | Subhashis Mohanty | Secure cloud storage and synchronization systems and methods |
US20140344572A1 (en) * | 2011-09-26 | 2014-11-20 | Subhashis Mohanty | Secure cloud storage and synchronization systems and methods |
CN102710661A (en) * | 2012-06-25 | 2012-10-03 | 上海交通大学 | Cloud storage and aggregation architecture and data storage and aggregation method by using same |
CN103593476A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage |
CN105407119A (en) * | 2014-09-12 | 2016-03-16 | 北京计算机技术及应用研究所 | Cloud computing system and method thereof |
CN105100115A (en) * | 2015-08-27 | 2015-11-25 | 中国科学院信息工程研究所 | Data storage method for privacy protection based on encryption password and data fractionation |
CN106530143A (en) * | 2016-11-08 | 2017-03-22 | 河南财政税务高等专科学校 | Engineering cost list service system |
CN109064024A (en) * | 2018-08-02 | 2018-12-21 | 广东展诚工程咨询有限公司 | A kind of engineering Whole Process Cost dynamic management approach and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111724141A (en) * | 2020-06-29 | 2020-09-29 | 张群 | Dynamic management method for construction cost in whole process of engineering cost settlement |
CN114553499A (en) * | 2022-01-28 | 2022-05-27 | 中国银联股份有限公司 | Image encryption method, image processing method, device, equipment and medium |
CN114553499B (en) * | 2022-01-28 | 2024-02-13 | 中国银联股份有限公司 | Image encryption and image processing method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN110557361B (en) | 2022-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109891424B (en) | Establishing links between identifiers without revealing specific identifying information | |
Puttaswamy et al. | Preserving privacy in location-based mobile social applications | |
CN101512525B (en) | Encrypted data search | |
CN110213036B (en) | Safe data storage and calculation method based on fog calculation-edge calculation of Internet of things | |
CN102026090B (en) | Node positioning method in IOT (Internet of things) and node | |
KR101699192B1 (en) | A privacy-preserving database system | |
CN103841099A (en) | System for encrypting content name | |
EP3087519A1 (en) | Techniques and architecture for anonymizing user data | |
CN104601325A (en) | Data encryption method, device, equipment and system and data decryption method, device, equipment and system | |
CN108632030A (en) | A kind of fine-grained access control method efficient and safe based on CP-ABE | |
CN110557361B (en) | Method and system for dynamically managing overall process cost | |
CN104365127B (en) | Method for following the trail of mobile device in remote display unit | |
JP2010198349A (en) | Data encryption system, communication device and data encryption method | |
CN108021677A (en) | The control method of cloud computing distributed search engine | |
US10567511B2 (en) | Method and system for managing encrypted data of devices | |
KR102535322B1 (en) | System for providing privacy protection service and method thereof | |
US20170006313A1 (en) | System and Method for Distributed Video Storage Across Enterprises | |
Ashouri-Talouki et al. | Homomorphic encryption to preserve location privacy | |
Elkhodr et al. | Managing the internet of things | |
CN104539575A (en) | Smart phone secrecy tracing method and system based on cloud storage | |
Li et al. | A Dynamic Location Privacy Protection Scheme Based on Cloud Storage. | |
JP7060463B2 (en) | Data management system and node equipment | |
CN106230856A (en) | A kind of System of Industrial Device Controls based on Internet of Things | |
Xin et al. | Privacy-preserving spectrum query with location proofs in database-driven CRNs | |
Čapek | Cybersecurity and internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |