CN111708996B - Enterprise internal management consultation information sharing system based on Internet - Google Patents

Enterprise internal management consultation information sharing system based on Internet Download PDF

Info

Publication number
CN111708996B
CN111708996B CN202010541410.2A CN202010541410A CN111708996B CN 111708996 B CN111708996 B CN 111708996B CN 202010541410 A CN202010541410 A CN 202010541410A CN 111708996 B CN111708996 B CN 111708996B
Authority
CN
China
Prior art keywords
information
identity
sharing
unit
consultation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010541410.2A
Other languages
Chinese (zh)
Other versions
CN111708996A (en
Inventor
汪红兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Beishijia Information Technology Co ltd
Original Assignee
Nanjing Beishijia Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Beishijia Information Technology Co ltd filed Critical Nanjing Beishijia Information Technology Co ltd
Priority to CN202010541410.2A priority Critical patent/CN111708996B/en
Publication of CN111708996A publication Critical patent/CN111708996A/en
Application granted granted Critical
Publication of CN111708996B publication Critical patent/CN111708996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention discloses an enterprise internal management consultation information sharing system based on the Internet, and relates to the technical field of management consultation information sharing. The invention comprises a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit. The invention carries out identity verification on the received identity information through the verification unit; the processor acquires the sharing correction grade, finally selects an information sharing channel corresponding to the sharing correction grade through a node selection unit according to the sharing correction grade, acquires shared information details corresponding to the consultation information in the consultation information grade corresponding to the information sharing channel from the information sharing library, and reduces the risk of information leakage in the enterprise through identity verification and setting of the consultation information grade and the information sharing channel, so that the safety of the information in the enterprise is ensured.

Description

Enterprise internal management consultation information sharing system based on Internet
Technical Field
The invention belongs to the technical field of management consultation information sharing, and particularly relates to an enterprise internal management consultation information sharing system based on the Internet.
Background
With the development of mobile internet and smart phones, in order to improve office efficiency and save office cost, more and more enterprises choose to share management information on an enterprise platform. The efficiency of information sharing depends on the technical development of information systems and the improvement of transmission technologies, and the information sharing must be realized under the conditions of information security and confidentiality, especially the sharing of intra-enterprise management consultation information.
The information sharing is necessary in enterprise management consultation, which is beneficial to improving the utilization rate of enterprise information resources. The existing management platform is not good enough in anti-disclosure aspect, information leakage is easy to cause, and an enterprise internal management consultation information sharing system based on the Internet is provided at present, so that the problems are solved.
Disclosure of Invention
The invention aims to provide an enterprise internal management consultation information sharing system based on the Internet, which performs identity verification on received identity information according to the identity information in an identity library through a verification unit, and after the identity verification is passed, the identity information, the consultation information and a corresponding sharing grade Q k Transmitting to a processor; the processor obtains the access times F of the user c And grade repairing is carried outPositive step, obtaining a shared correction level Q kx Finally, according to the sharing correction level Q kx Selecting and sharing correction level Q by node selection unit kx Corresponding information sharing channel G k And obtain the information sharing channel G in the information sharing library k Corresponding advisory information level A k The shared information details corresponding to the consultation information are shared, and the problems that the existing management platform is not good enough in anti-disclosure aspect and information leakage is easy to cause are solved.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention relates to an enterprise internal management consultation information sharing system based on the Internet, which comprises a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit; the request unit is used for a user to log in the enterprise internal management consultation information sharing system, the request unit is used for inputting identity information and consultation information during logging in and generating an anti-theft symbol according to the identity information and the logging in time, and the request unit transmits the identity information, the consultation information and the anti-theft symbol to the verification unit; the identity information comprises a user name and a corresponding password; the identity library stores the identity information of personnel in the enterprise and the corresponding sharing grade Q k The method comprises the steps of carrying out a first treatment on the surface of the The information sharing library stores various sharing consultation information, and the sharing consultation information is classified by a classification unit, namely the consultation information is classified into X1 classes, and the classes are respectively and sequentially marked as A k And each level of consultation information corresponds to one information sharing channel G k Wherein k=1, 2, 3, …, X1 is a preset value, a k 、Q k 、G k One-to-one correspondence; the verification unit performs identity verification on the received identity information according to the identity information in the identity library, and after the identity verification is passed, the identity information, the consultation information and the corresponding sharing grade Q k Transmitting to a processor; the processor acquires the access times F of the user c And performing a level correction step to obtain a shared correction level Q kx The grade correction step is as follows:
step S001: calculation F c and/X2, rounding the calculation result, and marking the obtained integer as a correction value Z x Wherein X2 is a preset adjustment value;
step S002: when correction value Z x If ∈X3, then take the correction value Z x =x3; otherwise correct value Z x Not adjusting, wherein X3 is a preset correction upper limit value;
step S003: shared correction level Q kx =Q k +Z x
The processor will consult information and share correction level Q kx Transmitting to information acquisition unit, and according to shared correction level Q kx Selecting and sharing correction level Q by node selection unit kx Corresponding information sharing channel G k And obtain the information sharing channel G in the information sharing library k Corresponding advisory information level A k Sharing information details corresponding to the advisory information.
Further, the verification unit performs identity verification on the received identity information according to the identity information in the identity library in the following manner:
step SS01: comparing the received identity information with the identity information in the identity library;
step SS02: if the identity information in the identity library has the identity information consistent with the received identity information, the comparison result is consistent, the identity authentication step is completed, and the anti-theft verification step is carried out;
the anti-theft verification steps are as follows:
step SS1: ordering the received identity information according to the form of user name and password to obtain a character string Di, wherein i=1, 2, 3, … and n are integers;
step SS2: obtaining time nodes which are required to log in by a user, and sequencing the time nodes in a form of year, month, day, time and group to obtain character strings Mj, j=1, 2, 3, … and m, wherein m is an integer;
step SS3: calculating the eigenvalues according to the formulaRounding the characteristic value, and defining the integer as a key sequence number;
step SS4: circularly arranging character strings Di, and marking the characters corresponding to the key serial numbers as keys;
step SS5: when the secret key is consistent with the anti-theft symbol, the anti-theft verification is passed, namely the identity verification is passed;
otherwise, the authentication fails.
Further, the anti-theft symbol is generated in the following manner:
and integrating an anti-theft character generation rule on intelligent equipment used by a user, wherein the anti-theft character generation rule is the same as the steps SS1 to SS4 in the anti-theft verification step.
Further, the self-classification unit classifies the consultation information in the following manner:
step S1: when the consultation information is recorded, the recording format is 'consultation information+k', wherein k is defined as a grade code of the consultation information;
step S2: extracting a grade code k corresponding to the consultation information from the classifying unit;
step S3: classifying the consultation information with the same class code into a class, and marking the class of the class consultation information as A k
Wherein k=1, 2, 3, …, X1, wherein X1 is a preset highest ranking value.
Further, the management unit is used for inputting and modifying preset values.
Further, the display is used for receiving and displaying the shared correction level Q transmitted by the processor kx Information sharing channel G k Consultation information grade A k Shared information details.
Further, the storage unit is used for storing the time of each user logging in each time and the information of consultation.
The invention has the following beneficial effects:
the invention uses the verification unit to verify the identity information in the identity libraryThe received identity information is subjected to identity verification, and after the identity verification is passed, the identity information, the consultation information and the corresponding sharing grade Q are processed k Transmitting to a processor; the processor obtains the access times F of the user c And performing a level correction step to obtain a shared correction level Q kx Finally, according to the sharing correction level Q kx Selecting and sharing correction level Q by node selection unit kx Corresponding information sharing channel G k And obtain the information sharing channel G in the information sharing library k Corresponding advisory information level A k Shared information details corresponding to the consultation information are shared in the database, and the information level A is verified through identity authentication and the consultation information k Information sharing channel G k The risk of information leakage in the enterprise is reduced, and the safety of the information in the enterprise is ensured.
Of course, it is not necessary for any one product to practice the invention to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an enterprise internal management consultation information sharing system based on internet according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to FIG. 1, the present invention is an enterprise based on InternetThe internal management consultation information sharing system comprises a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit; the request unit is used for logging in an enterprise internal management consultation information sharing system, and is used for inputting identity information and consultation information, namely the sharing information to be consulted when logging in; the identity information comprises a user name and a corresponding password; the identity library stores the identity information of personnel in the enterprise and the corresponding sharing grade Q k The method comprises the steps of carrying out a first treatment on the surface of the Various sharing consultation information is stored in the information sharing library, and classified by the self-classifying unit, namely, the consultation information is classified into X1 classes, and the classes are respectively and sequentially marked as A k And each level of consultation information corresponds to one information sharing channel G k Wherein k=1, 2, 3, …, X1 is a preset value, a k 、Q k 、G k One-to-one correspondence; the verification unit performs identity verification on the received identity information according to the identity information in the identity library, and after the identity verification is passed, the identity information, the consultation information and the corresponding sharing grade Q k Transmitting to a processor; the processor obtains the access times F of the user c And performing a level correction step to obtain a shared correction level Q kx The grade correction step is as follows:
step S001: calculation F c and/X2, rounding the calculation result, and marking the obtained integer as a correction value Z x Wherein X2 is a preset adjustment value;
step S002: when correction value Z x If ∈X3, then take the correction value Z x =x3; otherwise correct value Z x Not adjusting, wherein X3 is a preset correction upper limit value;
step S003: shared correction level Q kx =Q k +Z x
The processor will consult information and share correction level Q kx Transmitting to information acquisition unit, and according to shared correction level Q kx Selecting and sharing correction level Q by node selection unit kx Corresponding information sharing channel G k And obtain the information sharing channel G in the information sharing library k Corresponding advisory information level A k Sharing information details corresponding to the advisory information.
The verification unit performs identity verification on the received identity information according to the identity information in the identity library, wherein the method comprises the following steps:
step SS01: comparing the received identity information with the identity information in the identity library;
step SS02: if the identity information in the identity library has the identity information consistent with the received identity information, the comparison result is consistent, the identity authentication step is completed, and the anti-theft verification step is carried out;
the anti-theft verification steps are as follows:
step SS1: the received identity information is sequenced according to the form of user name and password to obtain a character string Di, i=1, 2, 3, …, n is an integer, if the user name is yuangong zhang and the password is zhang256381, the character string Di is "yuangong zhang+zhang256381", and the character corresponding to D3 is "a";
step SS2: obtaining time nodes which are required to be logged in by a user, and sequencing the time nodes according to the form of year, month, day, time and group to obtain character strings Mj, j=1, 2, 3, …, M and M, wherein if the login time is 2020, 6 months, 1 day and 18 hours, 6 minutes, the character string Mj is 202006011806, and the character corresponding to M5 is 0;
step SS3: calculating the eigenvalues according to the formulaAnd rounding the eigenvalues and defining the integer as the key number, i.e. +.>The key sequence number is 3;
step SS4: circularly arranging character strings Di, marking the characters corresponding to the key serial numbers as keys, and marking Di corresponding to the key serial numbers 3 as 'a';
step SS5: when the secret key is consistent with the anti-theft symbol, the anti-theft verification is passed, namely the identity verification is passed;
otherwise, the authentication fails (possibly being a theft phenomenon of the identity information).
The generation mode of the anti-theft symbol is as follows:
and integrating an anti-theft character generation rule on intelligent equipment used by a user, wherein the anti-theft character generation rule is the same as the steps SS1 to SS4 in the anti-theft verification step.
The method for grading the consultation information through the self-classification unit comprises the following steps:
step S1: when the consultation information is recorded, the recording format is 'consultation information+k', wherein k is defined as a grade code of the consultation information;
step S2: extracting a grade code k corresponding to the consultation information from the classifying unit;
step S3: classifying the consultation information with the same class code into a class, and marking the class of the class consultation information as A k
Wherein k=1, 2, 3, …, X1, wherein X1 is a preset highest ranking value.
The management unit is used for inputting and modifying preset values.
Wherein the display is used for receiving and displaying the shared correction level Q transmitted by the processor kx Information sharing channel G k Consultation information grade A k Shared information details.
The storage unit is used for storing the time of each user logging in each time and the information of consultation.
An enterprise internal management consultation information sharing system based on Internet carries out identity verification on received identity information according to the identity information in an identity library through a verification unit, and after the identity verification is passed, the identity information, the consultation information and a corresponding sharing grade Q k Transmitting to a processor; the processor obtains the access times F of the user c And performing a level correction step to obtain a shared correction level Q kx Finally, according to the sharing correction level Q kx Selecting and sharing correction level Q by node selection unit kx Corresponding information sharing channel G k And obtain the information sharing channel G in the information sharing library k Corresponding advisory information level A k Shared information details corresponding to the consultation information are shared in the database, and the information level A is verified through identity authentication and the consultation information k Information sharing channel G k The risk of information leakage in the enterprise is reduced, and the safety of the information in the enterprise is ensured.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (6)

1. The enterprise internal management consultation information sharing system based on the Internet is characterized by comprising a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit;
the request unit is used for a user to log in the enterprise internal management consultation information sharing system, the request unit is used for inputting identity information and consultation information during logging in and generating an anti-theft symbol according to the identity information and the logging in time, and the request unit transmits the identity information, the consultation information and the anti-theft symbol to the verification unit; the identity information comprises a user name and a corresponding password;
the identity library stores the identity information of personnel in the enterprise and the corresponding sharing grade Q k
The information sharing library stores various sharing consultation information, and the sharing consultation information is classified by a classification unit, namely the consultation information is classified into X1 classes, and the classes are respectively and sequentially marked as A k And each level of consultation information corresponds to one information sharing channel G k Wherein k=1, 2, 3, …, X1 is a preset value, a k 、Q k 、G k One-to-one correspondence;
the verification unit performs identity verification on the received identity information according to the identity information in the identity library, and after the identity verification is passed, the identity information, the consultation information and the corresponding sharing grade Q k Transmitting to a processor;
the processor acquires the access times F of the user c And performing a level correction step to obtain a shared correction level Q kx The grade correction step is as follows:
step S001: calculation F c and/X2, rounding the calculation result, and marking the obtained integer as a correction value Z x Wherein X2 is a preset adjustment value;
step S002: when correction value Z x If ∈X3, then take the correction value Z x =x3; otherwise correct value Z x Not adjusting, wherein X3 is a preset correction upper limit value;
step S003: shared correction level Q kx =Q k +Z x
The processor will consult information and share correction level Q kx To the information acquisition unit,and according to the shared correction level Q kx Selecting and sharing correction level Q by node selection unit kx Corresponding information sharing channel G k And obtain the information sharing channel G in the information sharing library k Corresponding advisory information level A k Sharing information details corresponding to the consultation information;
the verification unit performs identity verification on the received identity information according to the identity information in the identity library in the following manner:
step SS01: comparing the received identity information with the identity information in the identity library;
step SS02: if the identity information in the identity library has the identity information consistent with the received identity information, the comparison result is consistent, the identity authentication step is completed, and the anti-theft verification step is carried out;
the anti-theft verification steps are as follows:
step SS1: ordering the received identity information according to the form of user name and password to obtain a character string Di, wherein i=1, 2, 3, … and n are integers;
step SS2: obtaining time nodes which are required to log in by a user, and sequencing the time nodes in a form of year, month, day, time and group to obtain character strings Mj, j=1, 2, 3, … and m, wherein m is an integer;
step SS3: calculating the eigenvalues according to the formulaRounding the characteristic value, and defining the integer as a key sequence number;
step SS4: circularly arranging character strings Di, and marking the characters corresponding to the key serial numbers as keys;
step SS5: when the secret key is consistent with the anti-theft symbol, the anti-theft verification is passed, namely the identity verification is passed;
otherwise, the authentication fails.
2. The internet-based intra-enterprise management advisory information sharing system of claim 1, wherein the antitheft symbol is generated by:
and integrating an anti-theft character generation rule on intelligent equipment used by a user, wherein the anti-theft character generation rule is the same as the steps SS1 to SS4 in the anti-theft verification step.
3. The internet-based intra-enterprise management advisory information sharing system as claimed in claim 1, wherein the way of grading the advisory information by the self-classification unit is:
step S1: when the consultation information is recorded, the recording format is 'consultation information+k', wherein k is defined as a grade code of the consultation information;
step S2: extracting a grade code k corresponding to the consultation information from the classifying unit;
step S3: classifying the consultation information with the same class code into a class, and marking the class of the class consultation information as A k
Wherein k=1, 2, 3, …, X1, wherein X1 is a preset highest ranking value.
4. The internet-based intra-enterprise management advisory information sharing system as claimed in claim 1, wherein the management unit is used for input and modification of preset values.
5. The internet-based intra-enterprise management advisory information sharing system as claimed in claim 1, wherein said display is adapted to receive and display the processor transmitted sharing correction level Q kx Information sharing channel G k Consultation information grade A k Shared information details.
6. The internet-based intra-enterprise management advisory information sharing system as claimed in claim 1, wherein the storage unit is for storing information of time of each user's login, advisory.
CN202010541410.2A 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet Active CN111708996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010541410.2A CN111708996B (en) 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010541410.2A CN111708996B (en) 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet

Publications (2)

Publication Number Publication Date
CN111708996A CN111708996A (en) 2020-09-25
CN111708996B true CN111708996B (en) 2024-03-15

Family

ID=72540149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010541410.2A Active CN111708996B (en) 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet

Country Status (1)

Country Link
CN (1) CN111708996B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113139198B (en) * 2021-05-08 2023-03-31 上海埃林哲软件系统股份有限公司 Enterprise management information sharing system based on Internet

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013097512A (en) * 2011-10-31 2013-05-20 Sumitomo Mitsui Banking Corp Login authentication system and method
CN109214164A (en) * 2018-09-07 2019-01-15 河北地质大学 Computer communication security login method Internet-based and system
CN110675124A (en) * 2019-09-23 2020-01-10 江西毕姆工程技术有限公司 Engineering management promotes service system based on internet
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method
CN111163104A (en) * 2020-01-02 2020-05-15 深圳市高德信通信股份有限公司 Network security protection system for enterprise

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8341710B2 (en) * 2009-12-14 2012-12-25 Verizon Patent And Licensing, Inc. Ubiquitous webtoken

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013097512A (en) * 2011-10-31 2013-05-20 Sumitomo Mitsui Banking Corp Login authentication system and method
CN109214164A (en) * 2018-09-07 2019-01-15 河北地质大学 Computer communication security login method Internet-based and system
CN110675124A (en) * 2019-09-23 2020-01-10 江西毕姆工程技术有限公司 Engineering management promotes service system based on internet
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method
CN111163104A (en) * 2020-01-02 2020-05-15 深圳市高德信通信股份有限公司 Network security protection system for enterprise

Also Published As

Publication number Publication date
CN111708996A (en) 2020-09-25

Similar Documents

Publication Publication Date Title
CN107423632B (en) Customizable sensitive data desensitization method and system
CN102598007B (en) Effective detection fingerprints the system and method for data and information
CN102938767B (en) The fuzzy keyword search methodology that efficiently can verify that based on the outer packet system of cloud data
CN109460966A (en) Contract signing method, apparatus and terminal device based on requesting party's classification
CN105207780B (en) A kind of certification user method and device
US20130262866A1 (en) Large-scale data processing cloud computing system
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN110929806B (en) Picture processing method and device based on artificial intelligence and electronic equipment
CN110753016B (en) Real name authentication method based on block chain
CN107343007A (en) Distributed file management method and system based on user identity and purview certification
CN103218723B (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN113656661B (en) Mobile government affair system based on natural language recognition
CN111461751A (en) Block chain-based house property information chain organization method, historical state tracing method and device
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet
CN115270193A (en) Data file secure sharing method and device based on block chain and under cooperative synchronization
CN112131471A (en) Method, device, equipment and medium for relation recommendation based on unauthorized undirected graph
CN116825259B (en) Medical data management method based on Internet of things
CN115982687B (en) User identity verification system for data operation and maintenance management platform
CN113010909A (en) Data security classification method and device for scientific data sharing platform
CN112988678A (en) Wisdom cloud data safety protection system based on block chain
CN114240349A (en) Ecological environment supervision method and system based on block chain
CN113626801A (en) Unified cooperative scheduling method for fine-grained distributed service resources
WO2022121183A1 (en) Text model training method, recognition method, apparatus, device and storage medium
CN111597521A (en) Transformer substation mobile terminal data security processing method and system
CN115481108B (en) Management method and system for same data among different departments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant