CN112039986A - System and method for realizing information interaction among departments of enterprise - Google Patents

System and method for realizing information interaction among departments of enterprise Download PDF

Info

Publication number
CN112039986A
CN112039986A CN202010888624.7A CN202010888624A CN112039986A CN 112039986 A CN112039986 A CN 112039986A CN 202010888624 A CN202010888624 A CN 202010888624A CN 112039986 A CN112039986 A CN 112039986A
Authority
CN
China
Prior art keywords
data
information
department
block chain
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010888624.7A
Other languages
Chinese (zh)
Inventor
刘凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010888624.7A priority Critical patent/CN112039986A/en
Publication of CN112039986A publication Critical patent/CN112039986A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2358Change logging, detection, and notification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Resources & Organizations (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Mathematical Analysis (AREA)
  • Power Engineering (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Mathematical Physics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a system and a method for realizing information interaction among all departments of an enterprise, relating to the technical field of enterprise information management. The invention utilizes the Fabric platform architecture and the bottom foundation framework of the universal authority block chain, can be suitable for various different occasions, overcomes the defects of various public chain items such as low throughput, no privacy of transaction disclosure, no final certainty, low efficiency of consensus algorithm and the like through the Fabric platform, and ensures that each enterprise department can fully utilize the existing information resources.

Description

System and method for realizing information interaction among departments of enterprise
Technical Field
The invention relates to the technical field of enterprise information management, in particular to a system and a method for realizing information interaction among all departments of an enterprise by applying a Fabric block chain network.
Background
In the conventional technology, management of each department of an enterprise mainly depends on a manual mode, and due to the fact that original data of information of power enterprises are huge, new data are easily generated in the management process. Therefore, the existing management method is difficult to adapt to the rapid development requirement of modern power enterprises. With the development of information technology, information interaction among all departments of an enterprise is carried out by gradually applying a computer to carry out data information management, but once a problem occurs in a computer information management system or the system is crashed, data is difficult to recover, and troubles are brought to the management of all the departments of the enterprise.
With the rapid development of the block chain technology, the block chain technology has the characteristics of decentralization, distrust, tamper resistance, information traceability and the like, and is gradually applied to various fields such as finance, government, enterprises and the like, the application range of the block chain technology is gradually expanded at present, the block chain is originated from bit coins, the block chain technology is a basic technology for constructing the block chain of the bit coins and encrypting and transmitting transaction information, and when information interaction is carried out among various departments of an enterprise, how to realize the information-based data transmission and sharing among the various departments of the enterprise is a technical problem to be solved urgently at present.
On the other hand, when data processing is performed on data information of each department of an enterprise, which is acquired by the enterprise, various types of data need to be analyzed and summarized, the data dimension is large during data processing due to various types of data, which all causes huge data packets during data processing, data sharing and data sharing, and especially when the data dimension is too large, the cost of data transmission and data calculation and the equipment cost are increased in a geometric progression manner, so that data transmission is difficult, the equipment requirements of each client side and server side are high, so that the data processing cost and the equipment cost are increased, which is not beneficial to the application and popularization of information interaction and advanced technology by adopting advanced technology. If the data can be properly subjected to dimensionality reduction on the premise of ensuring accurate data transmission, the data processing cost is greatly saved, the processing equipment cost is reduced, and money is saved for enterprises, so that the method has very important significance. Moreover, when the blockchain technology is adopted for various types of data in each department, the corresponding data is simultaneously stored in the blockchain database of each department, but because the data of enterprises have different authorities for different departments, a reasonable encryption mode rather than a simple equal-authority encryption mode is desired to be provided, which inevitably affects the security of the data.
Disclosure of Invention
Aiming at the defects of the prior art, the invention discloses a system and a method for realizing information interaction among all departments of an enterprise, which realize the information interaction among all the departments of the enterprise by applying a block chain bottom layer architecture and constructing a Fabric architecture informatization management platform, thereby improving the data sharing and data management capability.
The invention adopts the following technical scheme:
a system for realizing information interaction among departments of an enterprise, wherein the system comprises:
the block chain underlying architecture is internally provided with a data layer, a network layer, a consensus layer, an excitation layer and an intelligent contract layer from bottom to top in sequence, wherein the data layer at least comprises a block data module, a chain structure module, a digital signature module, a hash function module, a Merkle tree module and an asymmetric encryption module; the network layer comprises at least a P2P network module, a propagation mechanism module and a verification mechanism; the consensus layer at least comprises a PBFT module, a POS module, a DPOS module and a POW module; the incentive layer at least comprises an issuing mechanism module and a distribution mechanism module; the intelligent contract layer at least comprises a virtual machine module and a DAPP module;
the enterprise department structure layer is at least internally provided with a research and development department, a maintenance department, a personnel department, a financial department, a marketing department, a production department and a board of directors; the database of all departments jointly forms a distributed database of the block chain database; the database of each department is connected with a data encryption and decryption module, when the data of the previous department is prepared to be stored in the databases of other departments, the data is encrypted by the data encryption and decryption module and then sent to the databases of other departments for encryption, and when the databases of other departments store the data, only the encrypted data is stored, so that the data is ensured not to be read by the departments without corresponding authority;
the system comprises a Fabric architecture layer, a network node, a CA node and a sequencing node, wherein a client, the network node, the CA node and the sequencing node are arranged in the Fabric architecture layer, the client is connected with the network node, and the network node is respectively connected with the CA node and the sequencing node;
the system comprises a block chain platform, a service platform and a service platform, wherein the block chain platform is a modularized block chain solution supporting platform based on HyperLegendr Fabric and comprises a block chain network, block chain nodes and node servers, the block chain nodes are connected with the node servers, the block chain nodes are arranged in the block chain network, and the block chain nodes are connected with the node servers;
the system comprises a data interaction layer, a data processing layer and a data processing layer, wherein the data interaction layer is internally provided with node equipment, a computer component, a database integrated in the computer component, a monitoring unit and a remote information communication module; wherein:
the output end of the block chain bottom layer framework is connected with the input end of an enterprise department structure layer, the output end of the enterprise department structure layer is connected with the input end of a Fabric framework layer, the output end of the Fabric framework layer is connected with the input end of a block chain platform, and the output end of the block chain platform is connected with the input end of a data interaction layer.
The invention also adopts the following technical scheme:
a method for realizing information interaction among departments of an enterprise comprises the following steps:
(1) data acquisition: the block chain bottom layer architecture acquires department data information from each department in an enterprise department structure layer, wherein the data information at least comprises human resource information, performance information, workload information, personnel movement information, promotion history information or salary information;
(2) data preprocessing: the method comprises the steps that a Fabric architecture informatization management platform in a Fabric architecture layer conducts screening, cleaning and big data dimension reduction processing on acquired data information of all departments of an enterprise to acquire effective data, wherein a big data dimension reduction algorithm is an E-PCA algorithm;
(3) data encryption: the Fabric architecture informatization management platform encrypts the preprocessed data of each department of the enterprise through an encryption algorithm of a DES encryption unit, a 3DES encryption unit, a Blowfish encryption unit, a Twofish encryption unit, an IDEA encryption unit, an RC6 encryption unit, a character string encryption unit or a CAST5 encryption unit;
(4) data sharing: the Fabric architecture informatization management platform calculates and transmits the processed data to the block chain through an encryption algorithm or a consensus algorithm, and realizes data sharing of all departments of the enterprise in a wireless communication mode.
Further, the working method of the E-PCA algorithm comprises the following steps:
(21) initializing information; setting a sample data matrix U of each department of an enterprisen*mThe data matrix output after the data dimension reduction is Yk*mDefining data types as m, n and f respectively, wherein m represents the number of extracted home data, n represents the number of extracted home data characteristic attributes and represents an information entropy threshold, and f represents a sharing rate; the calculation formula of the sharing rate is as follows:
Figure BDA0002656278330000051
(22) calculating information entropy of intelligent home information attribute of each type of data, comparing the calculated information entropy with an information entropy threshold, and performing feature screening, wherein the screening method is that if the selected sample data a is selectediInformation entropy H (a) ofi) >. sup.iPut into the data A, if the selected sample data aiInformation entropy H (a) ofi) If the selection is less than or equal to the threshold value, abandoning the non-selection;
(23) data matrix Un*mPerforming centralized operation to obtain matrix Xn*mWherein the data matrix U isn*mThe formula for performing the centering operation is:
X=A-repmat(mean(A,2),1,m); (2)
the operation method is that the variable of X subtracts the mean value of X to increase the orthogonality of the base vectors.
(24) And then, calculating covariance among different data attribute dimensions to construct a covariance matrix Cov, wherein the formula of the covariance matrix Cov is as follows:
Cov=(XXT)/(size(X,2)-1); (3)
(25) calculating an eigenValue and an eigenVector of the Cov;
(26) selecting a transformation base: selecting k eigenvectors corresponding to the largest k eigenvalues as column vectors to form an eigenvector matrix Vn×k
(27) And (3) calculating a dimensionality reduction result:
Y=VTX; (4)
further, the encryption algorithm further comprises an elliptic curve function algorithm.
Further, the function equation of the elliptic curve function algorithm is as follows:
y2=x3+ax+b (5)
further, the method for applying the block chain work of Fabric in the Fabric architecture layer comprises:
different enterprise department information is connected to a block chain network node and is communicated through a chain link, a data platform for storing, modifying or editing electronic information files of each employee is provided, account numbers are provided for each employee and a manager in terms of data access authority, the employee has the authority of reporting supporting materials, the manager has corresponding authority of auditing and data perfecting and simultaneously meets the functions of inquiring and counting the information of the employee and the manager, a Fabric architecture informatization management platform adopts a distributed entry and centralized audit information entry mode, the employee can respectively enter information in each node in the block chain network, different types of information are audited by related professional managers and then are submitted to a human resource department, after the verification of the information is confirmed under the human resource department, the data is processed by special symbol watermarks and then is merged to a block chain, and finishing information processing.
The data sharing method comprises the steps of receiving data and sending the data; when data is sent, the data information is encrypted through the public key of the receiver, and then a data ciphertext is generated, so that the safety in the data transmission process is enhanced; when receiving data, calculating the abstract of the transmitted data by using a hash function in a block chain, and then digitally signing the abstract by using a private key; the data sender can send the data cipher text and the signature at the same time; the receiver decrypts the data through the public key, firstly obtains the summary information, then performs identity verification, then decrypts the data by using the private key, and then obtains the summary information by using the hash function; the user can verify the integrity of the log through data comparison, and then the interaction and sharing of the data are realized.
Further, in the data sending process, the method comprises the following steps:
(1) the department service system packs data according to the service definition standard; the block chain management system is internally provided with business data organized by each enterprise department and then distributed with the business data;
(2) calling a data submission method of the SD K, and submitting data attribution main bodies and packaged business data of all enterprise departments;
(3) the SD K inquires a public key of a data attribution main body on the node machine, and if the public key cannot be found, a data decryption center interface is called to obtain the public key;
(4) the SDK encrypts the packed service data by using the public key to generate encrypted packed service data;
(5) the SDK uses the authentication authorization private key signature of a service department together with the data attribution main body and the encrypted packed service data;
(6) and calling the interface of the node machine to submit data, and executing data saving action after the signature is verified successfully by the node machine.
Further, in the data receiving process, the method comprises the following steps:
(1) the SDK signs the inquiry request by using a CA private key of a business department for data management of each enterprise department;
(2) the SDK calls a node machine query interface, and the node machine executes a query action and returns encrypted service data after successfully verifying the signature;
(3) the SDK submits the encrypted business data of each enterprise department to a decryption center through a hypertext transfer protocol channel based on a secure socket layer to decrypt and obtain decrypted business data;
(4) the SDK returns the decrypted service data.
Further, the databases of all departments jointly form a distributed database of the block chain database; the database of each department is connected with a data encryption and decryption module, when the data of the previous department is prepared to be stored in the databases of other departments, the data is encrypted by the data encryption and decryption module and then sent to the databases of other departments for encryption, and when the databases of other departments store the data, only the encrypted data is stored, so that the data is ensured not to be read by the departments without corresponding authority.
Has the positive and beneficial effects that:
1. the information interaction system of the blockchain bottom layer framework, the enterprise department structural layer, the Fabric structural layer, the blockchain platform and the data interaction layer is constructed, information intercommunication among all departments of an enterprise is achieved, the blockchain technology is integrated into enterprise department management by fully utilizing the blockchain bottom layer framework, safe data transmission is achieved, transmitted data can be shared and cannot be tampered, the encryption performance of the data is improved, remote, online and real-time data acquisition and application can be achieved through systematic construction, and application, management and monitoring of data of the personal information database are improved.
2. The invention realizes the encryption of the transmitted data by using the DES encryption unit, the 3DES encryption unit, the Blowfish encryption unit, the Twofish encryption unit, the IDEA encryption unit, the RC6 encryption unit, the character string encryption unit or the CAST5 encryption unit which are packaged by data, thereby improving the data security performance and being beneficial to improving the security performance of data transmission.
3. The invention can be suitable for various occasions by utilizing the Fabric platform architecture and the bottom layer basic framework of the universal authority block Chain (authorized Chain), and adopts the modular architecture to provide switchable and extensible components, including services such as consensus algorithm, encryption security, digital assets, intelligent contracts, identity authentication and the like. The defects of various public link projects, such as low throughput, no privacy of transaction disclosure, no final certainty, low efficiency of a consensus algorithm and the like, are overcome through the Fabric platform, so that each enterprise department can fully utilize the existing information resources.
4. The invention also adopts an elliptic curve function to realize the encryption and calculation of the data so as to enhance the privacy of the data.
5. This application is under the accurate prerequisite of assurance data transmission, properly reduces the dimension to the data and handles, then must will greatly practice thrift data processing cost, reduce the processing equipment cost to save money for the enterprise, therefore this possesses very important meaning.
Drawings
FIG. 1 is a schematic diagram of an architecture for implementing an information interaction system between departments of an enterprise according to the present invention;
FIG. 2 is a schematic diagram of the bottom architecture of the blockchain technique in the information interaction system for implementing the business
FIG. 3 is a schematic diagram of an enterprise department in an information interaction system for implementing the interaction between various departments of an enterprise according to the present invention;
FIG. 4 is a schematic diagram of an embodiment of a Fabric platform in an information interaction system between various departments of an enterprise according to the present invention;
FIG. 5 is a schematic diagram of another embodiment of a Fabric platform in an information interaction system between various departments of an enterprise according to the present invention;
FIG. 6 is a flowchart illustrating a method for implementing information interaction between departments of an enterprise according to the present invention;
FIG. 7 is a schematic diagram of an elliptic curve structure in a method for implementing information interaction between departments of an enterprise according to the present invention;
FIG. 8 is a schematic diagram illustrating a data sharing method in a method for implementing information interaction between departments of an enterprise according to the present invention;
FIG. 9 is a schematic diagram of a data interaction method in a method for implementing information interaction between departments of an enterprise according to the present invention;
FIG. 10 is a schematic structural diagram illustrating an embodiment of a method for implementing information interaction between departments of an enterprise according to the present invention;
FIG. 11 is a schematic diagram illustrating data encryption according to an embodiment of a method for implementing information interaction between departments of an enterprise according to the present invention;
fig. 12 is a schematic diagram of data decryption according to an embodiment of a method for implementing information interaction between departments of an enterprise.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, and it should be understood that the embodiments described herein are merely for the purpose of illustrating and explaining the present invention and are not intended to limit the present invention.
Embodiment (1) a system for realizing information interaction between departments of an enterprise
As shown in fig. 1-3, a system for implementing information interaction between departments of an enterprise, wherein the system includes:
the block chain underlying architecture is internally provided with a data layer, a network layer, a consensus layer, an excitation layer and an intelligent contract layer from bottom to top in sequence, wherein the data layer at least comprises a block data module, a chain structure module, a digital signature module, a hash function module, a Merkle tree module and an asymmetric encryption module; the network layer comprises at least a P2P network module, a propagation mechanism module and a verification mechanism; the consensus layer at least comprises a PBFT module, a POS module, a DPOS module and a POW module; the incentive layer at least comprises an issuing mechanism module and a distribution mechanism module; the intelligent contract layer at least comprises a virtual machine module and a DAPP module;
the enterprise department structure layer is at least internally provided with a research and development department, a maintenance department, a personnel department, a financial department, a marketing department, a production department and a board of directors; the database of all departments jointly forms a distributed database of the block chain database; the database of each department is connected with a data encryption and decryption module, when the data of the previous department is prepared to be stored in the databases of other departments, the data is encrypted by the data encryption and decryption module and then sent to the databases of other departments for encryption, and when the databases of other departments store the data, only the encrypted data is stored, so that the data is ensured not to be read by the departments without corresponding authority;
the system comprises a Fabric architecture layer, a network node, a CA node and a sequencing node, wherein a client, the network node, the CA node and the sequencing node are arranged in the Fabric architecture layer, the client is connected with the network node, and the network node is respectively connected with the CA node and the sequencing node;
the system comprises a block chain platform, a service platform and a service platform, wherein the block chain platform is a modularized block chain solution supporting platform based on HyperLegendr Fabric and comprises a block chain network, block chain nodes and node servers, the block chain nodes are connected with the node servers, the block chain nodes are arranged in the block chain network, and the block chain nodes are connected with the node servers;
the system comprises a data interaction layer, a data processing layer and a data processing layer, wherein the data interaction layer is internally provided with node equipment, a computer component, a database integrated in the computer component, a monitoring unit and a remote information communication module; wherein:
the output end of the block chain bottom layer framework is connected with the input end of an enterprise department structure layer, the output end of the enterprise department structure layer is connected with the input end of a Fabric framework layer, the output end of the Fabric framework layer is connected with the input end of a block chain platform, and the output end of the block chain platform is connected with the input end of a data interaction layer.
In the above embodiments, the blockchain is referred to as a multi-party commonly maintained, decentralized, traceable, and non-falsifiable distributed database, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Request data in a certain period can be packed into a data block (block) through a cryptographic technology, and the data block is connected into a chain structure for storage according to time sequence by using a Hash fingerprint. A data block is typically composed of two parts, a block header and a block body. The block header usually stores data such as the version number of the system, the hash value of the previous block, the merkle root, and the timestamp, and the block body contains detailed request data.
In the above embodiment, the blockchain adopts a software platform as a support platform for a hyper-hedger Fabric-based modular blockchain solution, the enterprise information management system adopted by the blockchain generally includes a management application layer, a blockchain network, an access layer, and a department service system, and the above data processing transmission and sharing are realized through the blockchain management system.
In the above embodiments, as shown in fig. 4-5, the Fabric platform is an alliance chain architecture, supports intelligent contract technology, is token independent in system operation, and can support transaction throughput of about hundred per second, and basically meets the requirement of performing cross-institution transaction of digital assets between alliances. In addition, Fabric adopts a modular architecture, wherein a consensus algorithm and the like can be used as a pluggable module for a user to choose. Meanwhile, the method can lead a user to redesign and develop a specific module according to the self requirement, so that the Fabric is selected as a block chain foundation platform of the digital asset transaction system. The Fabric mainly comprises member service modules (Membership Services), block chain service modules (Blockchain Services) and chain code service modules (Chaincode Services). The member service module mainly provides functions of member registration, identity management, transaction examination and the like, and performs mechanism registration authentication and transaction authentication through a registration certificate issuing mechanism (ECA) and a transaction authentication center (TCA). The block chain service module is mainly responsible for point-to-point communication between nodes, consensus, and the storage of account book data. The chain code service module provides intelligent contract service, provides a safe contract running environment and the like. Meanwhile, the platform realizes asynchronous communication through an Event Stream (Event Stream) between all the components.
In the above embodiment, in the Fabric platform, the client mainly functions to interact with the Fabric system to implement operation on the blockchain system. These operations are classified into two types, a management type and a chain code type. The management class comprises a start-stop node, a configuration network and the like; chain code class operations are primarily lifecycle management of the chain code, such as installing, instantiating, and calling the chain code. The most common clients are command line Clients (CLI), and in addition, application clients developed with Fabric SDK. The user uses the function of the Fabric system through different clients.
The network nodes (Peer) are Peer nodes in a block chain decentralized network and are mainly divided into an endorsement node (Endorser) and a confirmation node (Committer) according to functions. The endorsement node is mainly used for verifying, simulating and executing the transaction plan and endorseing the transaction plan. The confirmation node is mainly responsible for checking the validity of the transaction, and updating and maintaining the blockchain data and the ledger state. In actual deployment, the endorsement node and the confirmation node may be deployed on the same physical node or may be separately deployed.
Wherein the main responsibility of the ordering node (Orderer) is to order the transactions sent from the various nodes. In the case of concurrency, the sequence of each node transaction needs to be determined and agreed by sequencing nodes. After the sequencing node determines the transaction sequence according to a certain rule, the sequencing node sends the transaction sequence to each node to persist the transaction into an account book of the block chain. The sequencing node supports multiple channels isolated from each other so that transactions are sent only to related nodes (Peer).
Wherein the CA node mainly provides identity information based on the digital certificate for the member in the Fabric network, and can generate or cancel the identity certificate (certificate) of the member. On the basis of definite membership, the Fabric can realize the management of authority control.
Where the components of the Fabric network belong to different organizations, peer-to-peer decentralized networks are formed between the organizations. Each organization typically has its own clients, network nodes and CA nodes, and may create one or more different types of nodes as needed. The sequencing node does not belong to an entity of a certain organization, and belongs to a component commonly maintained by the organization.
Embodiment (2) a method for realizing information interaction between departments of an enterprise
As shown in fig. 6, a method for implementing information interaction between departments of an enterprise, wherein the method includes the following steps:
(1) data acquisition: the block chain bottom layer architecture acquires department data information from each department in an enterprise department structure layer, wherein the data information at least comprises human resource information, performance information, workload information, personnel movement information, promotion history information or salary information;
(2) data preprocessing: the method comprises the steps that a Fabric architecture informatization management platform in a Fabric architecture layer conducts screening, cleaning and big data dimension reduction processing on acquired data information of all departments of an enterprise to acquire effective data, wherein a big data dimension reduction algorithm is an E-PCA algorithm;
(3) data encryption: the Fabric architecture informatization management platform encrypts the preprocessed data of each department of the enterprise through an encryption algorithm of a DES encryption unit, a 3DES encryption unit, a Blowfish encryption unit, a Twofish encryption unit, an IDEA encryption unit, an RC6 encryption unit, a character string encryption unit or a CAST5 encryption unit;
(4) data sharing: the Fabric architecture informatization management platform calculates and transmits the processed data to the block chain through an encryption algorithm or a consensus algorithm, and realizes data sharing of all departments of the enterprise in a wireless communication mode.
In the invention, the working method of the E-PCA algorithm comprises the following steps:
(21) initializing information; setting a sample data matrix U of each department of an enterprisen*mThe data matrix output after the data dimension reduction is Yk*mDefining data types as m, n and f respectively, wherein m represents the number of extracted home data, n represents the number of extracted home data characteristic attributes and represents an information entropy threshold, and f represents a sharing rate; the calculation formula of the sharing rate is as follows:
Figure BDA0002656278330000151
(22) calculating information entropy of intelligent home information attribute of each type of data, comparing the calculated information entropy with an information entropy threshold, and performing feature screening, wherein the screening method is that if the selected sample data a is selectediInformation entropy H (a) ofi) >. sup.iPut into the data A, if the selected sample data aiInformation entropy H (a) ofi) At most, put inAbandoning and unselecting;
(23) data matrix Un*mPerforming centralized operation to obtain matrix Xn*mWherein the data matrix U isn*mThe formula for performing the centering operation is:
X=A-repmat(mean(A,2),1,m); (2)
the operation method is that the variable of X subtracts the mean value of X to increase the orthogonality of the base vectors.
(24) And then, calculating covariance among different data attribute dimensions to construct a covariance matrix Cov, wherein the formula of the covariance matrix Cov is as follows:
Cov=(XXT)/(size(X,2)-1); (3)
(25) calculating an eigenValue and an eigenVector of the Cov;
(26) selecting a transformation base: selecting k eigenvectors corresponding to the largest k eigenvalues as column vectors to form an eigenvector matrix Vn×k
(27) And (3) calculating a dimensionality reduction result:
Y=VTX; (4)
as shown in fig. 7, the encryption algorithm further includes an elliptic curve function algorithm. The function equation of the elliptic curve function algorithm is as follows:
y2=x3+ax+b (5)
the functional equation of the elliptic curve function algorithm is explained below with reference to fig. 7, and it can be seen from the functional relation that the number of the non-vertical lines and the focal points of the curve is 3, and the tangent lines on the non-vertical lines intersect with the curve at other points. Assuming that there are 2 points Q and P, and the point Q and the point P intersect at R', there are:
R=Q+P (6)
wherein R and R' are symmetric about the X axis. When the point Q coincides with the point P, assuming that the coincidence point is D, the straight line is tangent to the curve, and R' is represented as the intersection point. Then there is the formula:
D+D=R (7)
at this point, R and R' are still symmetric about the X axis, then:
Q=aP (8)
since there are 3 intersections, a equals 3, the formula can be transformed into:
Q=3P (9)
when performing encryption calculation in a block chain, assuming that a modulus is p, a base point is G, and an ordinal number is n, then:
public key G as private key; (10)
the Q point and the P point represent two different points on the curve, which can be calculated by the following formula:
Figure BDA0002656278330000171
Rx=d2-Px-Qx (12)
Ry=d(Px-Qx)-Px (13)
the encryption of the public key is completed through the algorithm, and when the private key encryption is completed, the data z is encrypted by adopting the private key dA, and the method is adopted: selecting data k, let: k is more than or equal to 0 and less than or equal to 1, and then the following formula is adopted for calculation:
p(x,y)=k*G (14)
then, calculating:
r=x mod n (15)
when r segment 0 occurs, then reselection occurs. Then calculated using the following formula:
Figure BDA0002656278330000172
and if s is 0 after the final calculation, recalculating. And then, a data signature (r, s) is generated, so that privacy and key addition are realized, and the safety of human resource information is ensured.
As shown in fig. 8-10, the method for applying the block chain work of Fabric in the Fabric architecture layer includes:
as shown in fig. 8, different enterprise department information is connected to the nodes of the blockchain network, and then the information is connected and communicated through the uplink, so as to provide a data platform for storing, modifying or editing the electronic information file of each employee, and in the aspect of data access authority, account numbers are provided for each employee and a manager, the employee has the authority of reporting support materials, the manager has corresponding authority of auditing and data perfecting, and simultaneously the information inquiry and statistics functions of the employee and the manager are satisfied, the fabic architecture informatization management platform adopts a distributed type-in and centralized type-in information type-in mode, the employee can respectively type information in each node in the blockchain network, different types of information are audited by the relevant professional manager and then submitted to the human resource department, after the verification of the information under the human resource department is confirmed, the data is merged into the blockchain by using special symbol watermarking processing, and finishing information processing.
As shown in fig. 9 and 10, the data sharing method includes reception of data and transmission of data; when data is sent, the data information is encrypted through the public key of the receiver, and then a data ciphertext is generated, so that the safety in the data transmission process is enhanced; when receiving data, calculating the abstract of the transmitted data by using a hash function in a block chain, and then digitally signing the abstract by using a private key; the data sender can send the data cipher text and the signature at the same time; the receiver decrypts the data through the public key, firstly obtains the summary information, then performs identity verification, then decrypts the data by using the private key, and then obtains the summary information by using the hash function; the user can verify the integrity of the log through data comparison, and then the interaction and sharing of the data are realized.
In the above embodiment, in the data sending process, the method includes the following steps:
(1) the department service system packs data according to the service definition standard; the block chain management system is internally provided with business data organized by each enterprise department and then distributed with the business data;
(2) calling a data submission method of the SD K, and submitting data attribution main bodies and packaged business data of all enterprise departments;
(3) the SD K inquires a public key of a data attribution main body on the node machine, and if the public key cannot be found, a data decryption center interface is called to obtain the public key;
(4) the SDK encrypts the packed service data by using the public key to generate encrypted packed service data;
(5) the SDK uses the authentication authorization private key signature of a service department together with the data attribution main body and the encrypted packed service data;
(6) and calling the interface of the node machine to submit data, and executing data saving action after the signature is verified successfully by the node machine.
In the above embodiment, in the data receiving process, the method includes the following steps:
(1) the SDK signs the inquiry request by using a CA private key of a business department for data management of each enterprise department;
(2) the SDK calls a node machine query interface, and the node machine executes a query action and returns encrypted service data after successfully verifying the signature;
(3) the SDK submits the encrypted business data of each enterprise department to a decryption center through a hypertext transfer protocol channel based on a secure socket layer to decrypt and obtain decrypted business data;
(4) the SDK returns the decrypted service data.
As shown in fig. 11 and 12, the encryption unit further includes a symmetric key encryption algorithm and a symmetric key decryption algorithm.
As shown in fig. 11, the method of the symmetric key encryption algorithm is as follows:
(1) selecting data information to be encrypted in a database through an application program, transmitting the data information to block chain node point equipment through a block chain platform via a block chain network, and inputting an encryption character string in the block chain node point equipment to obtain an encrypted data information character string;
(2) generating a private key, and sharing the private key encryption feature code generated by a private key generator among different equipment nodes in the block chain network, wherein the sharing mode is realized by adopting the block chain network;
(3) signing, namely encrypting the feature code according to a private key of a user, attaching the result to the back of data, attaching the encrypted feature code to the back of the data, signing the encrypted information string, receiving the encrypted information string through the block chain network, signing, if the signing is successful, obtaining the encrypted information string if the signing is successful, and if the signing is unsuccessful, re-signing;
(4) generating a symmetric key, obtaining encryption information by different block chain node devices which are communicated with each other, generating a temporary symmetric key at a master control server node through data signature, and encrypting data in the whole block chain network by using the symmetric key;
(5) and after obtaining the encryption information by each block chain link point device by using the symmetric key, obtaining the public key of the data through the block chain network, encrypting the temporary symmetric key by using the public key, attaching the result to the whole data, and then sending the result to each block chain node, thereby realizing the encryption of the video data by the method.
As shown in fig. 12, the symmetric key decryption method includes:
(1) each block chain node device decrypts the encrypted symmetric key by adopting the private key acquired by the device;
(2) decrypting the entire encrypted data using the symmetric key;
(3) identity authentication; each block chain node device decrypts the feature codes of the data by adopting the public keys on the respective nodes, and verifies the identity information of different nodes of the block chain node device;
(4) decrypting; any one block chain node device calculates the feature code of the data by using the same symmetric encryption algorithm, then calculates the feature code of the data by using the symmetric encryption algorithm again, compares the feature code with the decrypted feature code, and verifies the integrity of the data sent by different data nodes in the block chain network;
(5) and each block chain node device carries out information through the acquired password and carries out information interaction through the acquired password, and the interaction method is to transmit or forward the information of each block chain node device through the block information block chain node device so as to acquire decryption information.
Although specific embodiments of the present invention have been described above, it will be understood by those skilled in the art that these specific embodiments are merely illustrative and that various omissions, substitutions and changes in the form of the detail of the methods and systems described above may be made by those skilled in the art without departing from the spirit and scope of the invention. For example, it is within the scope of the present invention to combine the steps of the above-described methods to perform substantially the same function in substantially the same way to achieve substantially the same result. Accordingly, the scope of the invention is to be limited only by the following claims.

Claims (8)

1. The utility model provides a realize information interaction system between each department of enterprise which characterized in that: the system comprises:
the block chain underlying architecture is internally provided with a data layer, a network layer, a consensus layer, an excitation layer and an intelligent contract layer from bottom to top in sequence, wherein the data layer at least comprises a block data module, a chain structure module, a digital signature module, a hash function module, a Merkle tree module and an asymmetric encryption module; the network layer comprises at least a P2P network module, a propagation mechanism module and a verification mechanism; the consensus layer at least comprises a PBFT module, a POS module, a DPOS module and a POW module; the incentive layer at least comprises an issuing mechanism module and a distribution mechanism module; the intelligent contract layer at least comprises a virtual machine module and a DAPP module;
the enterprise department structure layer is at least internally provided with a research and development department, a maintenance department, a personnel department, a financial department, a marketing department, a production department and a board of directors; the database of all departments jointly forms a distributed database of the block chain database; the database of each department is connected with a data encryption and decryption module, when the data of the previous department is prepared to be stored in the databases of other departments, the data is encrypted by the data encryption and decryption module and then sent to the databases of other departments for encryption, and when the databases of other departments store the data, only the encrypted data is stored, so that the data is ensured not to be read by the departments without corresponding authority;
the system comprises a Fabric architecture layer, a network node, a CA node and a sequencing node, wherein a client, the network node, the CA node and the sequencing node are arranged in the Fabric architecture layer, the client is connected with the network node, and the network node is respectively connected with the CA node and the sequencing node;
the system comprises a block chain platform, a service platform and a service platform, wherein the block chain platform is a modularized block chain solution supporting platform based on HyperLegendr Fabric and comprises a block chain network, block chain nodes and node servers, the block chain nodes are connected with the node servers, the block chain nodes are arranged in the block chain network, and the block chain nodes are connected with the node servers;
the system comprises a data interaction layer, a data processing layer and a data processing layer, wherein the data interaction layer is internally provided with node equipment, a computer component, a database integrated in the computer component, a monitoring unit and a remote information communication module; wherein:
the output end of the block chain bottom layer framework is connected with the input end of an enterprise department structure layer, the output end of the enterprise department structure layer is connected with the input end of the Fabric framework layer, the output end of the Fabric framework layer is connected with the input end of the block chain platform, and the output end of the block chain platform is connected with the input end of the data interaction layer;
the method for realizing the information interaction among all departments of the enterprise comprises the following steps:
(1) data acquisition: the block chain bottom layer architecture acquires department data information from each department in an enterprise department structure layer, wherein the data information at least comprises human resource information, performance information, workload information, personnel movement information, promotion history information or salary information;
(2) data preprocessing: the method comprises the steps that a Fabric architecture informatization management platform in a Fabric architecture layer conducts screening, cleaning and big data dimension reduction processing on acquired data information of all departments of an enterprise to acquire effective data, wherein a big data dimension reduction algorithm is an E-PCA algorithm;
(3) data encryption: the Fabric architecture informatization management platform encrypts the preprocessed data of each department of the enterprise through an encryption algorithm of a DES encryption unit, a 3DES encryption unit, a Blowfish encryption unit, a Twofish encryption unit, an IDEA encryption unit, an RC6 encryption unit, a character string encryption unit or a CAST5 encryption unit;
(4) data sharing: the Fabric architecture informatization management platform calculates and transmits the processed data to a block chain through an encryption algorithm or a consensus algorithm, and realizes data sharing of each department of an enterprise through a wireless communication mode;
the working method of the E-PCA algorithm comprises the following steps:
(21) initializing information; setting a sample data matrix U of each department of an enterprisen*mThe data matrix output after the data dimension reduction is Yk*mDefining data types as m, n and f respectively, wherein m represents the number of extracted home data, n represents the number of extracted home data characteristic attributes and represents an information entropy threshold, and f represents a sharing rate; the calculation formula of the sharing rate is as follows:
Figure FDA0002656278320000031
(22) calculating information entropy of intelligent home information attribute of each type of data, comparing the calculated information entropy with an information entropy threshold, and performing feature screening, wherein the screening method is that if the selected sample data a is selectediInformation entropy H (a) ofi) >. sup.iPut into the data A, if the selected sample data aiInformation entropy H (a) ofi) If the selection is less than or equal to the threshold value, abandoning the non-selection;
(23) data matrix Un*mPerforming centralized operation to obtain matrix Xn*mWherein the data matrix U isn*mThe formula for performing the centering operation is:
X=A-repmat(mean(A,2),1,m); (2)
the operation method is that the variable of X subtracts the mean value of X to increase the orthogonality of the base vectors.
(24) And then, calculating covariance among different data attribute dimensions to construct a covariance matrix Cov, wherein the formula of the covariance matrix Cov is as follows:
Cov=(XXT)/(size(X,2)-1); (3)
(25) calculating an eigenValue and an eigenVector of the Cov;
(26) selecting a transformation base: selecting k characteristic directions corresponding to the maximum k characteristic valuesThe quantities are respectively taken as column vectors to form a characteristic vector matrix Vn×k
(27) And (3) calculating a dimensionality reduction result:
Y=VTX; (4) 。
2. the method of claim 1, wherein the method comprises: the encryption algorithm also includes an elliptic curve function algorithm.
3. The method of claim 2, wherein the method comprises: the function equation of the elliptic curve function algorithm is as follows:
y2=x3+ax+b (5) 。
4. the method of claim 1, wherein the method comprises: the method for applying the block chain work of the Fabric in the Fabric architecture layer comprises the following steps:
different enterprise department information is connected to a block chain network node and is communicated through a chain link, a data platform for storing, modifying or editing electronic information files of each employee is provided, account numbers are provided for each employee and a manager in terms of data access authority, the employee has the authority of reporting supporting materials, the manager has corresponding authority of auditing and data perfecting and simultaneously meets the functions of inquiring and counting the information of the employee and the manager, a Fabric architecture informatization management platform adopts a distributed entry and centralized audit information entry mode, the employee can respectively enter information in each node in the block chain network, different types of information are audited by related professional managers and then are submitted to a human resource department, after the verification of the information is confirmed under the human resource department, the data is processed by special symbol watermarks and then is merged to a block chain, and finishing information processing.
5. The method of claim 1, wherein the method comprises: the data sharing method comprises the steps of receiving data and sending the data; when data is sent, the data information is encrypted through the public key of the receiver, and then a data ciphertext is generated, so that the safety in the data transmission process is enhanced; when receiving data, calculating the abstract of the transmitted data by using a hash function in a block chain, and then digitally signing the abstract by using a private key; the data sender can send the data cipher text and the signature at the same time; the receiver decrypts the data through the public key, firstly obtains the summary information, then performs identity verification, then decrypts the data by using the private key, and then obtains the summary information by using the hash function; the user can verify the integrity of the log through data comparison, and then the interaction and sharing of the data are realized.
6. The method of claim 5, wherein the method comprises:
in the data transmission flow, the method comprises the following steps:
(1) the department service system packs data according to the service definition standard; the block chain management system is internally provided with business data organized by each enterprise department and then distributed with the business data;
(2) calling a data submission method of the SDK, and submitting a data attribution main body and packaged service data;
(3) the SDK inquires a public key of a data attribution main body on the node machine, and if the public key cannot be found, a data decryption center interface is called to obtain the public key;
(4) the SDK encrypts the packed service data by using the public key to generate encrypted packed service data;
(5) the SDK uses the authentication authorization private key signature of a service department together with the data attribution main body and the encrypted packed service data;
(6) and calling the interface of the node machine to submit data, and executing data saving action after the signature is verified successfully by the node machine.
7. The method of claim 6, wherein the method comprises:
in the data receiving process, the method comprises the following steps:
(1) the SDK uses a CA private key of a service department to sign the query request;
(2) the SDK calls a node machine query interface, and the node machine executes a query action and returns encrypted service data after successfully verifying the signature;
(3) the SDK submits the encrypted service data to a decryption center through a hypertext transfer protocol channel based on a secure socket layer to decrypt and obtain decrypted service data;
(4) the SDK returns the decrypted service data.
8. The method of claim 8, wherein the method comprises:
in order to ensure that data in the block chain is not read by departments which should not be read, databases of all departments jointly form a distributed database of the block chain database; the database of each department is connected with a data encryption and decryption module, when the data of the previous department is prepared to be stored in the databases of other departments, the data is encrypted by the data encryption and decryption module and then sent to the databases of other departments for encryption, and when the databases of other departments store the data, only the encrypted data is stored, so that the data is ensured not to be read by the departments without corresponding authority.
CN202010888624.7A 2020-08-28 2020-08-28 System and method for realizing information interaction among departments of enterprise Pending CN112039986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010888624.7A CN112039986A (en) 2020-08-28 2020-08-28 System and method for realizing information interaction among departments of enterprise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010888624.7A CN112039986A (en) 2020-08-28 2020-08-28 System and method for realizing information interaction among departments of enterprise

Publications (1)

Publication Number Publication Date
CN112039986A true CN112039986A (en) 2020-12-04

Family

ID=73586838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010888624.7A Pending CN112039986A (en) 2020-08-28 2020-08-28 System and method for realizing information interaction among departments of enterprise

Country Status (1)

Country Link
CN (1) CN112039986A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112508534A (en) * 2020-12-17 2021-03-16 杭州趣链科技有限公司 Personnel information management method and device based on block chain and related equipment
CN112633858A (en) * 2021-01-05 2021-04-09 润联软件系统(深圳)有限公司 Process approval processing method and system
CN112734545A (en) * 2020-12-31 2021-04-30 中国工商银行股份有限公司 Block chain data sharing method, device and system
CN113094428A (en) * 2021-03-10 2021-07-09 贾晓丰 Regional data management method, device and system
CN114697255A (en) * 2022-06-01 2022-07-01 江苏青山软件有限公司 Enterprise network transmission data risk early warning system and method
CN117857151A (en) * 2023-12-22 2024-04-09 广东省药品交易中心有限公司 Tamper-proof method for first-class electronic data of medicine based on sharing
CN117857151B (en) * 2023-12-22 2024-05-28 广东省药品交易中心有限公司 Tamper-proof method for first-class electronic data of medicine based on sharing

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288307A (en) * 2019-05-13 2019-09-27 西安电子科技大学 Intelligent contract co-development system and data processing method based on Fabric block chain
CN110501917A (en) * 2019-09-11 2019-11-26 智慧谷(厦门)物联科技有限公司 The system and method for realizing internet of things intelligent household information management using cloud computing
CN110532329A (en) * 2019-09-02 2019-12-03 智慧谷(厦门)物联科技有限公司 A kind of Intelligent bracelet data processing and sharing method based on block chain technology
CN110969447A (en) * 2019-11-25 2020-04-07 江苏省农业科学院 Product depth traceability system based on block chain technology
CN111027087A (en) * 2019-12-16 2020-04-17 智慧谷(厦门)物联科技有限公司 Enterprise information management system and method for encrypting mnemonics by applying block chain
CN111160784A (en) * 2019-12-30 2020-05-15 北京工业大学 Product management method based on block chain
CN111541668A (en) * 2020-04-16 2020-08-14 华北电力大学 Energy Internet of things information safe transmission and storage method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288307A (en) * 2019-05-13 2019-09-27 西安电子科技大学 Intelligent contract co-development system and data processing method based on Fabric block chain
CN110532329A (en) * 2019-09-02 2019-12-03 智慧谷(厦门)物联科技有限公司 A kind of Intelligent bracelet data processing and sharing method based on block chain technology
CN110501917A (en) * 2019-09-11 2019-11-26 智慧谷(厦门)物联科技有限公司 The system and method for realizing internet of things intelligent household information management using cloud computing
CN110969447A (en) * 2019-11-25 2020-04-07 江苏省农业科学院 Product depth traceability system based on block chain technology
CN111027087A (en) * 2019-12-16 2020-04-17 智慧谷(厦门)物联科技有限公司 Enterprise information management system and method for encrypting mnemonics by applying block chain
CN111160784A (en) * 2019-12-30 2020-05-15 北京工业大学 Product management method based on block chain
CN111541668A (en) * 2020-04-16 2020-08-14 华北电力大学 Energy Internet of things information safe transmission and storage method based on block chain

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112508534A (en) * 2020-12-17 2021-03-16 杭州趣链科技有限公司 Personnel information management method and device based on block chain and related equipment
CN112734545A (en) * 2020-12-31 2021-04-30 中国工商银行股份有限公司 Block chain data sharing method, device and system
CN112734545B (en) * 2020-12-31 2024-02-02 中国工商银行股份有限公司 Block chain data sharing method, device and system
CN112633858A (en) * 2021-01-05 2021-04-09 润联软件系统(深圳)有限公司 Process approval processing method and system
CN113094428A (en) * 2021-03-10 2021-07-09 贾晓丰 Regional data management method, device and system
CN113094428B (en) * 2021-03-10 2024-01-09 贾晓丰 Regional data management method, device and system
CN114697255A (en) * 2022-06-01 2022-07-01 江苏青山软件有限公司 Enterprise network transmission data risk early warning system and method
CN117857151A (en) * 2023-12-22 2024-04-09 广东省药品交易中心有限公司 Tamper-proof method for first-class electronic data of medicine based on sharing
CN117857151B (en) * 2023-12-22 2024-05-28 广东省药品交易中心有限公司 Tamper-proof method for first-class electronic data of medicine based on sharing

Similar Documents

Publication Publication Date Title
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
CN108833081B (en) Block chain-based equipment networking authentication method
CN112039986A (en) System and method for realizing information interaction among departments of enterprise
Gao et al. CoC: A unified distributed ledger based supply chain management system
Jiang et al. Public integrity auditing for shared dynamic cloud data with group user revocation
CN100477833C (en) Authentication method
CN111027087B (en) Enterprise information management system and method for encrypting mnemonics by applying block chain
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
KR20180115768A (en) Encryption method and system for secure extraction of data from a block chain
US20070189541A1 (en) Method and system for initialzing a key management system
CN111931250B (en) Multiparty safe calculation integrated machine
CN105164971A (en) Verification system and method with extra security for lower-entropy input records
CN110769035A (en) Block chain asset issuing method, platform, service node and storage medium
JP2004072777A (en) Security framework and protocol for universal generic transaction
US9112886B2 (en) Method and system for providing centralized data field encryption, and distributed storage and retrieval
US20070055893A1 (en) Method and system for providing data field encryption and storage
US8583943B2 (en) Method and system for providing data field encryption and storage
CN112311772A (en) Hyperridge-based cross-domain certificate management system and method
CN112700245A (en) Block chain-based digital mobile certificate application method and device
CN115619404B (en) Block chain-based enterprise associated transaction business cooperative processing method
Sun et al. Research on logistics information blockchain data query algorithm based on searchable encryption
CN106060073A (en) Channel key negotiation method
WO2001043344A1 (en) System and method for generating and managing attribute certificates
CN104125230A (en) Short message authentication service system and authentication method
US11803631B2 (en) Binding a hardware security token to a host device to prevent exploitation by other host devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination