CN111667226A - Office process automation robot control system and method - Google Patents

Office process automation robot control system and method Download PDF

Info

Publication number
CN111667226A
CN111667226A CN201910164784.4A CN201910164784A CN111667226A CN 111667226 A CN111667226 A CN 111667226A CN 201910164784 A CN201910164784 A CN 201910164784A CN 111667226 A CN111667226 A CN 111667226A
Authority
CN
China
Prior art keywords
layer
character
mapping table
information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910164784.4A
Other languages
Chinese (zh)
Inventor
胡鸣
苏靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wujing Information Technology Co ltd
Original Assignee
Shanghai Wujing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wujing Information Technology Co ltd filed Critical Shanghai Wujing Information Technology Co ltd
Priority to CN201910164784.4A priority Critical patent/CN111667226A/en
Publication of CN111667226A publication Critical patent/CN111667226A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design

Abstract

The embodiment of the invention provides an office process automation robot control system and method, and relates to the technical field of automation control. The system comprises a basic layer, a data processing layer and a data processing layer, wherein the basic layer comprises a server and basic software, and the basic software comprises an operating system, a database and middleware; the data layer is used for supporting an information resource library of the office automation management system, and signal transmission is carried out between the data layer and the basic layer; an application support layer, an application layer and an information security layer; the upper layer of the application support layer receives signals from the data layer; the application support layer signal is output to the application layer and used for providing a service component for the application layer, the service component comprises a workflow engine and a data exchange platform, the workflow engine is used for realizing the electronic flow of a system process, and the data exchange platform is used for realizing the data transmission of the application support layer and the application layer.

Description

Office process automation robot control system and method
Technical Field
The invention relates to the technical field of automation control, in particular to an office process automation robot control system and method.
Background
With the change of global information-based construction and development, the demand of development construction and daily management of enterprises for informatization is continuously increased, various reimbursement systems, daily reporting systems and financial systems are widely used in enterprises, the dependence of enterprises on informatization is more serious, and most of enterprises cannot operate if the support of the informatization systems is suddenly lacked. In the current market, the business systems in the enterprise are clearly divided into work and have no intersection with each other. For example, the daily report management system mainly focuses on the intelligent management of daily work reports of enterprise employees, and the category of the reimbursement system is the expense reimbursement report and the approval of reimbursement processes of the enterprise employees. The mode of the division operation of each system can bring the problems of non-smooth traffic among the systems, increase of workload of staff and finance and the like, and indirectly increase the operation cost of enterprises.
Based on the above-mentioned serious reasons and problems, it is necessary to design a daily report and expense reimbursement management system with strong business relevance, convenient management of reimbursement and daily office business, and office time saving.
The patent document of Chinese patent publication No. CN108108956A, published as 2018-06-01 discloses an enterprise WeChat platform office system and an office method, the office system comprises a mobile WeChat terminal, an enterprise WeChat platform and a company office system, wherein the company office system is connected with the enterprise WeChat platform through a firewall network port of a company network, the mobile WeChat terminal is connected with the enterprise WeChat platform through paying attention to enterprise WeChats, the invention can realize mobile office, access the internal network of the company through a specific port, remove the limitation of VPN, realize timely communication and message reminding, ensure the normal use of outsiders and outworkers to the office system of the enterprise, meanwhile, the office efficiency is improved, but the invention only realizes the mobility of the office, but does not integrate data and realize data sharing, thereby having room for improvement on the problem of improving the office efficiency.
Disclosure of Invention
The invention aims to provide a data synchronization system and a data synchronization method, and provides a method for enabling a sender system to carry out data synchronization with different receiver systems adopting different data synchronization modes, and meanwhile, different encryption modes are adopted when different data synchronization modes are adopted, so that the data security is ensured.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect, an embodiment of the present invention provides an office process automation robot control system, including: the system comprises a basic layer, a data processing layer and a data processing layer, wherein the basic layer comprises a server and basic software, and the basic software comprises an operating system, a database and middleware; the data layer is used for supporting an information resource library of the office automation management system, and signal transmission is carried out between the data layer and the basic layer; an application support layer, an application layer and an information security layer; the upper layer of the application support layer receives signals from the data layer; the application supporting layer signal is output to the application layer and used for providing a service component for the application layer, the service component comprises a workflow engine and a data exchange platform, the workflow engine is used for realizing the electronic flow of a system process, and the data exchange platform is used for realizing the data transmission of the application supporting layer and the application layer; the information security layer encrypts information output by the whole system, and the information security layer comprises the following steps: the system comprises an information security encryption module, an information security key generation module and an information security decryption module.
Furthermore, the application layer comprises a daily report management subsystem, and the daily report management subsystem comprises a flow management module, a system management module, a daily report management module, an reimbursement management module and a parameter management module; the flow management module is used for managing all service flow files in the daily report management subsystem; the system management module is used for performing system management on the users and the roles of the daily report management subsystem and providing basic data of the users, the roles, the data dictionary and the organization structure for other modules of the daily report management subsystem; the daily report management module comprises a personal daily report unit and a daily report reading and amending unit which are in signal connection, the daily report management module is also connected with a task management module, and the task management module is used for arranging work tasks at the personal daily report unit; the reimbursement management module comprises an reimbursement sheet generation unit and an reimbursement sheet examination and approval unit which are connected through signals, and the reimbursement sheet generation unit is connected with the personal daily reporting unit and is used for displaying reimbursement details input by the personal daily reporting unit; the reimbursement bill approval unit is used for displaying reimbursement bills of all reimbursement processes transferred to the current user, and the reimbursement management module is also internally provided with a reimbursement charge statistics submodule and a reimbursement limit statistics submodule; the parameter management module configures operation parameters for each module in the daily report management subsystem, and comprises a daily report time setting unit, a cost category setting unit, a personnel parameter setting unit, a process node personnel configuration unit and a working day configuration unit.
Further, the method for the information security layer to encrypt the data information comprises the following steps: randomly constructing a character mapping table, wherein the character mapping table comprises a plurality of pages, each page of character mapping table comprises all ASCII code characters, and each ASCII code character appears at least once in each page of character mapping table; for each character m in the information to be transmitted, arbitrarily taking a random number r, (r < the page number of the character mapping table), searching the position of the character m in the r-th page character mapping table, and taking the random number r and the obtained position information as an encrypted ciphertext of the character m; and taking the encrypted ciphertext of all characters in the information as the encrypted ciphertext of the information.
Furthermore, the operating system supports windows, Unix, Linux or Solari systems; the database adopts any one of DB2, Oracle, Sqlserver, mysql and sybase databases to store, operate and analyze data; the middleware supports a Jboss, Weblogic, Websphere or Tomcat server.
In a second aspect, an embodiment of the present invention further provides an office automation control method, where the method includes: a method of encrypting data for transmission, characterized in that the method comprises: randomly constructing a character mapping table, wherein the character mapping table comprises a plurality of pages, each page of character mapping table comprises all ASCII code characters, and each ASCII code character appears at least once in each page of character mapping table; for each character m in the information to be transmitted, arbitrarily taking a random number r, (r < the page number of the character mapping table), searching the position of the character m in the r-th page character mapping table, and taking the random number r and the obtained position information as an encrypted ciphertext of the character m; and taking the encrypted ciphertext of all characters in the information as the encrypted ciphertext of the information.
Further, the step of randomly constructing the character mapping table includes: for the initial content of each page of the character mapping table, random numbers Rl and R2 are arbitrarily selected, 0< Rl < L, 0< R2< L, and L is the number of ASCII code characters contained in each page of the character mapping table, and the Rl-th character in the character mapping table is exchanged with the R2-th character; the steps are repeatedly performed a predetermined number of times.
Further, in the decryption process, the encrypted ciphertext of the information is sequentially read, the random number r of each character m and the position of the character m in the r page character mapping table are obtained, and the original text of each character m is searched in the r page character mapping table according to the read position information.
The data synchronization system and method provided by the embodiment of the invention have the following effects: the daily report management module and the reimbursement management module are connected in the application layer, so that the expense reimbursement data in the daily report can be shared, a user can think that reimbursement details are filled simultaneously when writing the daily report, the manpower and time of reimbursement links are saved, and the working efficiency is obviously improved; moreover, the traceability and the transparentization of the information in the daily newspaper management subsystem are increased in the mode, and all the information can be used for checking the work content by checking the daily newspaper; meanwhile, a parameter management module is also arranged in the daily report management subsystem, and the parameter management module can configure operation parameters for other modules, prescribe daily report time, configure process personnel and the like, so that the management of the whole office system is more standardized; and the safety is high.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic system structure diagram of an office process automation robot control system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Example 1:
as shown in fig. 1, an office process automation robot control system includes: the system comprises a basic layer, a data processing layer and a data processing layer, wherein the basic layer comprises a server and basic software, and the basic software comprises an operating system, a database and middleware; the data layer is used for supporting an information resource library of the office automation management system, and signal transmission is carried out between the data layer and the basic layer; an application support layer, an application layer and an information security layer; the upper layer of the application support layer receives signals from the data layer; the application supporting layer signal is output to the application layer and used for providing a service component for the application layer, the service component comprises a workflow engine and a data exchange platform, the workflow engine is used for realizing the electronic flow of a system process, and the data exchange platform is used for realizing the data transmission of the application supporting layer and the application layer; the information security layer encrypts information output by the whole system, and the information security layer comprises the following steps: the system comprises an information security encryption module, an information security key generation module and an information security decryption module.
Furthermore, the application layer comprises a daily report management subsystem, and the daily report management subsystem comprises a flow management module, a system management module, a daily report management module, an reimbursement management module and a parameter management module; the flow management module is used for managing all service flow files in the daily report management subsystem; the system management module is used for performing system management on the users and the roles of the daily report management subsystem and providing basic data of the users, the roles, the data dictionary and the organization structure for other modules of the daily report management subsystem; the daily report management module comprises a personal daily report unit and a daily report reading and amending unit which are in signal connection, the daily report management module is also connected with a task management module, and the task management module is used for arranging work tasks at the personal daily report unit; the reimbursement management module comprises an reimbursement sheet generation unit and an reimbursement sheet examination and approval unit which are connected through signals, and the reimbursement sheet generation unit is connected with the personal daily reporting unit and is used for displaying reimbursement details input by the personal daily reporting unit; the reimbursement bill approval unit is used for displaying reimbursement bills of all reimbursement processes transferred to the current user, and the reimbursement management module is also internally provided with a reimbursement charge statistics submodule and a reimbursement limit statistics submodule; the parameter management module configures operation parameters for each module in the daily report management subsystem, and comprises a daily report time setting unit, a cost category setting unit, a personnel parameter setting unit, a process node personnel configuration unit and a working day configuration unit.
Further, the method for the information security layer to encrypt the data information comprises the following steps: randomly constructing a character mapping table, wherein the character mapping table comprises a plurality of pages, each page of character mapping table comprises all ASCII code characters, and each ASCII code character appears at least once in each page of character mapping table; for each character m in the information to be transmitted, arbitrarily taking a random number r, (r < the page number of the character mapping table), searching the position of the character m in the r-th page character mapping table, and taking the random number r and the obtained position information as an encrypted ciphertext of the character m; and taking the encrypted ciphertext of all characters in the information as the encrypted ciphertext of the information.
Furthermore, the operating system supports windows, Unix, Linux or Solari systems; the database adopts any one of DB2, Oracle, Sqlserver, mysql and sybase databases to store, operate and analyze data; the middleware supports a Jboss, Weblogic, Websphere or Tomcat server.
Example 2: a method of office automation control, the method comprising: a method of encrypting data for transmission, characterized in that the method comprises: randomly constructing a character mapping table, wherein the character mapping table comprises a plurality of pages, each page of character mapping table comprises all ASCII code characters, and each ASCII code character appears at least once in each page of character mapping table; for each character m in the information to be transmitted, arbitrarily taking a random number r, (r < the page number of the character mapping table), searching the position of the character m in the r-th page character mapping table, and taking the random number r and the obtained position information as an encrypted ciphertext of the character m; and taking the encrypted ciphertext of all characters in the information as the encrypted ciphertext of the information.
Further, the step of randomly constructing the character mapping table includes: for the initial content of each page of the character mapping table, random numbers Rl and R2 are arbitrarily selected, 0< Rl < L, 0< R2< L, and L is the number of ASCII code characters contained in each page of the character mapping table, and the Rl-th character in the character mapping table is exchanged with the R2-th character; the steps are repeatedly performed a predetermined number of times.
Further, in the decryption process, the encrypted ciphertext of the information is sequentially read, the random number r of each character m and the position of the character m in the r page character mapping table are obtained, and the original text of each character m is searched in the r page character mapping table according to the read position information.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a unit, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional unit in the embodiments of the present invention may be integrated together to form an independent part, or each unit may exist separately, or two or more units may be integrated to form an independent part.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-only memory (ROM, Read-Onl8 memory 8), a random access memory (RAM, random access memory 8), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Randomly constructing a character mapping table comprises, for the initial content of the character mapping table, arbitrarily taking random numbers Rl and R2, 0^ Rl ^255 and O ^ R2^255, and exchanging the Rl-th character with the R2-th character in the character mapping table; the steps are repeatedly performed a predetermined number of times.
Data encryption methods are generally classified into two types, a symmetric key encryption method and an asymmetric key (public key) encryption method. With the increasing amount of modern communication information, people have higher and higher awareness and requirements on data security. In order to ensure that communication contents cannot be divulged during transmission, a plurality of data encryption transmission methods are available. The known asymmetric key methods (such as RSA, ECC, etc.) are too computationally intensive to be suitable for large data volume communication, and are relatively suitable for symmetric key encryption methods. Common symmetric key encryption methods include algorithms disclosed by standards such as DES and AES, but the calculation amount of the disclosed algorithms is very large, the time cost of encryption and decryption is very high, and the encryption of large-data-volume communication is not facilitated. In order to increase the computing speed, various DES encryption chips based on hardware are presented, so that the system increases the economic cost of the system while increasing the encryption operation speed.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.

Claims (7)

1. An office process automation robot control system is characterized by comprising a basic layer, wherein the basic layer comprises a server and basic software, and the basic software comprises an operating system, a database and middleware; the data layer is used for supporting an information resource library of the office automation management system, and signal transmission is carried out between the data layer and the basic layer; an application support layer, an application layer and an information security layer; the upper layer of the application support layer receives signals from the data layer; the application supporting layer signal is output to the application layer and used for providing a service component for the application layer, the service component comprises a workflow engine and a data exchange platform, the workflow engine is used for realizing the electronic flow of a system process, and the data exchange platform is used for realizing the data transmission of the application supporting layer and the application layer; the information security layer encrypts information output by the whole system, and the information security layer comprises the following steps: the system comprises an information security encryption module, an information security key generation module and an information security decryption module.
2. The office process automation robot control system of claim 1, the application layer including a daily management subsystem including a process management module, a system management module, a daily management module, a reimbursement management module, and a parameter management module; the flow management module is used for managing all service flow files in the daily report management subsystem; the system management module is used for performing system management on the users and the roles of the daily report management subsystem and providing basic data of the users, the roles, the data dictionary and the organization structure for other modules of the daily report management subsystem; the daily report management module comprises a personal daily report unit and a daily report reading and amending unit which are in signal connection, the daily report management module is also connected with a task management module, and the task management module is used for arranging work tasks at the personal daily report unit; the reimbursement management module comprises an reimbursement sheet generation unit and an reimbursement sheet examination and approval unit which are connected through signals, and the reimbursement sheet generation unit is connected with the personal daily reporting unit and is used for displaying reimbursement details input by the personal daily reporting unit; the reimbursement bill approval unit is used for displaying reimbursement bills of all reimbursement processes transferred to the current user, and the reimbursement management module is also internally provided with a reimbursement charge statistics submodule and a reimbursement limit statistics submodule; the parameter management module configures operation parameters for each module in the daily report management subsystem, and comprises a daily report time setting unit, a cost category setting unit, a personnel parameter setting unit, a process node personnel configuration unit and a working day configuration unit.
3. The office process automation robot control system of claim 2, the method of the information security layer novel encryption of data information comprising: randomly constructing a character mapping table, wherein the character mapping table comprises a plurality of pages, each page of character mapping table comprises all ASCII code characters, and each ASCII code character appears at least once in each page of character mapping table; for each character m in the information to be transmitted, arbitrarily taking a random number r, (r < the page number of the character mapping table), searching the position of the character m in the r-th page character mapping table, and taking the random number r and the obtained position information as an encrypted ciphertext of the character m; and taking the encrypted ciphertext of all characters in the information as the encrypted ciphertext of the information.
4. The office process automation robot control system of claim 3, wherein the operating system supports windows, Unix, Linux, or Solari systems; the database adopts any one of DB2, Oracle, Sqlserver, mysql and sybase databases to store, operate and analyze data; the middleware supports a Jboss, Weblogic, Websphere or Tomcat server.
5. A method based on the office process automation robot control system of one of claims 1 to 4, the method comprising: a method of encrypting data for transmission, characterized in that the method comprises: randomly constructing a character mapping table, wherein the character mapping table comprises a plurality of pages, each page of character mapping table comprises all ASCII code characters, and each ASCII code character appears at least once in each page of character mapping table; for each character m in the information to be transmitted, arbitrarily taking a random number r, (r < the page number of the character mapping table), searching the position of the character m in the r-th page character mapping table, and taking the random number r and the obtained position information as an encrypted ciphertext of the character m; and taking the encrypted ciphertext of all characters in the information as the encrypted ciphertext of the information.
6. The method of an office process automation robot control system of claim 5, the step of randomly constructing a character map table includes: for the initial content of each page of the character mapping table, random numbers Rl and R2 are arbitrarily selected, 0< Rl < L, 0< R2< L, and L is the number of ASCII code characters contained in each page of the character mapping table, and the Rl-th character in the character mapping table is exchanged with the R2-th character; the steps are repeatedly performed a predetermined number of times.
7. The method of an office process automation robot control system of claim 6, characterized in that in the decryption process, the encrypted ciphertext of the information is read in turn, the random number r for each character m and the position of the character m in the r-th page character mapping table are obtained, and the original text of each character m is searched in the r-th page character mapping table according to the read position information.
CN201910164784.4A 2019-03-05 2019-03-05 Office process automation robot control system and method Pending CN111667226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910164784.4A CN111667226A (en) 2019-03-05 2019-03-05 Office process automation robot control system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910164784.4A CN111667226A (en) 2019-03-05 2019-03-05 Office process automation robot control system and method

Publications (1)

Publication Number Publication Date
CN111667226A true CN111667226A (en) 2020-09-15

Family

ID=72381527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910164784.4A Pending CN111667226A (en) 2019-03-05 2019-03-05 Office process automation robot control system and method

Country Status (1)

Country Link
CN (1) CN111667226A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN105913230A (en) * 2016-05-05 2016-08-31 柴永朋 Office automation system based on workflow
CN109214788A (en) * 2018-11-23 2019-01-15 合肥智圣新创信息技术有限公司 A kind of OA management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN105913230A (en) * 2016-05-05 2016-08-31 柴永朋 Office automation system based on workflow
CN109214788A (en) * 2018-11-23 2019-01-15 合肥智圣新创信息技术有限公司 A kind of OA management system

Similar Documents

Publication Publication Date Title
Kościelniak et al. BIG DATA in decision making processes of enterprises
Oguntimilehin et al. A review of big data management, benefits and challenges
Padgavankar et al. Big data storage and challenges
CN102054022B (en) Systems and methods for processing and managing object-related data for use by a plurality of applications
US20170024482A1 (en) Systems and methods for integrating personal social networking within an organization
US9063960B2 (en) Systems and methods for performing customized large-scale data analytics
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
US9317711B2 (en) Privacy restrictions for columnar storage
US9189648B2 (en) Data mapping using trust services
EP3561636A1 (en) Record level data security
US8886791B2 (en) Generating alerts based on managed and unmanaged data
Thuraisingham et al. Big data analytics with applications in insider threat detection
Grillenberger et al. Teaching data management: key competencies and opportunities
CN111667226A (en) Office process automation robot control system and method
Khurshid et al. Big data-9vs, challenges and solutions
Veglis Interactive Data Visualization
Pal et al. A study of current state of work and challenges in mining big data
Schmidt et al. A semi-automated display for geotagged text
JP6845344B2 (en) Data leakage risk assessment
CN103164491A (en) Method and device for processing and retrieving data
Hung et al. The implementation of IoT for cloud system in industries-educational IoT case
Dokic et al. Portal for the management of digitally signed electronic documents
Satpathy et al. A decision-driven computer forensic classification using id3 algorithm
US20210142252A1 (en) Electronic knowledge creation and management visual transformation tool
Arora et al. Analysis of big data paradigms: Constraints, solutions and challenges

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination