CN112488638A - Enterprise process electronic management system and method - Google Patents

Enterprise process electronic management system and method Download PDF

Info

Publication number
CN112488638A
CN112488638A CN201910858260.5A CN201910858260A CN112488638A CN 112488638 A CN112488638 A CN 112488638A CN 201910858260 A CN201910858260 A CN 201910858260A CN 112488638 A CN112488638 A CN 112488638A
Authority
CN
China
Prior art keywords
information
management
data
employee
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910858260.5A
Other languages
Chinese (zh)
Inventor
龚梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Enterprise Management Co ltd
Original Assignee
Hangzhou Yunxiang Enterprise Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Enterprise Management Co ltd filed Critical Hangzhou Yunxiang Enterprise Management Co ltd
Priority to CN201910858260.5A priority Critical patent/CN112488638A/en
Publication of CN112488638A publication Critical patent/CN112488638A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0633Workflow analysis

Abstract

The invention discloses an enterprise process electronic management system and a method, wherein the system comprises: the system comprises an employee side, a right management side, a process management side, a risk monitoring side, a data management side, a special network and a database; the employee side, the authority management side, the process management side, the risk monitoring side, the data management side and the database are respectively in signal connection with the private network; the database is used for storing all data information of the system; the authority management end is used for carrying out authority management of the system and carrying out authority input, deletion and editing; the employee terminal is used for providing the employee login system, inputting login information and initiating a process; the process management end comprises: process approval, process deletion and process editing; the risk monitoring terminal is used for monitoring the operation behavior of each terminal and carrying out risk monitoring; the data management end is used for inputting, deleting and editing data; private networks are used to provide encrypted transmissions for data transmission in the system. The intelligent monitoring system has the advantages of high safety and high intelligent degree.

Description

Enterprise process electronic management system and method
Technical Field
The invention relates to the technical field of enterprise management, in particular to an enterprise process electronic management system and method.
Background
The enterprise process management mainly reforms the interior of an enterprise, changes the overlapping, multiple intermediate layers, non-closed loop processes and the like of enterprise function management mechanisms, ensures that each process can be managed by one function mechanism from beginning to end, achieves the purposes of no mechanism overlapping and no business repetition, and achieves the effects of shortening the process period and saving the operation capital.
Process management ultimately desires to improve customer satisfaction and company market competitiveness and to achieve the goal of improving enterprise performance. The overall goal of process improvement is determined by the development period of the enterprise. And under the guidance of the overall target, the improvement target of each type of business or unit flow is customized.
The development of enterprise processes goes through four stages.
Stage 1.0: the main contribution of the process is to clear the time sequence concept of the business, decompose the working steps on the time dimension, disassemble the business and carry out linear expression.
2.0 stage: the main contribution of the process is to make clear the role concept on the basis of time sequence, and can research department responsibility in the task completing process, namely linear expression and concept responsible for the result.
3.0 stage: the main contribution of the process is to establish the two-dimensional process management idea, the time sequence and the null sequence are interwoven into the longitude and latitude lines of the process, and the concepts of the plot and the role are clearer. This is the most advanced procedure so far.
4.0 stage: the leadership research center of the Beijing university's college of money and business concentrates on the expert, develop the enterprise process 4.0, carry on the more deep innovation on the basis of time sequence, empty sequence, role, plot, the plot designs and highlights the sequence curtain, develops, turns over and ends the four-step cycle mode, pursue the achievement and promote continuously spirally; in the role design, the person who does the work is responsible, and the management guidance of the heavy responsibility and the light right forms the multidimensional cross operation of the principal and the assistant. In such a flow, the position is no longer high, even if the leader is not in the main channel of the flow, the leader is only a matchmaker, and the management idea that the leader is the service is embodied; meanwhile, the leader has the function of not only examination and approval but also emphasizing the motivation function and adding a humanized 'core' to the system.
In the prior art, enterprise management is still often controlled manually, and although some process management software is borrowed during process management, security is not always paid attention to the process management software, and information of enterprise employees is easily leaked during process management.
Disclosure of Invention
In view of this, the present invention provides an enterprise process electronic management system and method, which have the advantages of high security and high intelligence degree.
In order to achieve the purpose, the invention adopts the following technical scheme:
an enterprise process electronic management system, the system comprising: the system comprises an employee side, a right management side, a process management side, a risk monitoring side, a data management side, a special network and a database; the employee side, the authority management side, the process management side, the risk monitoring side, the data management side and the database are respectively in signal connection with a special network; the database is used for storing all data information of the system and providing data support for other ends in the system; the authority management terminal is used for carrying out authority management of the system, carrying out authority input, deletion and editing, and carrying out authority verification on information input by the staff terminal; the employee terminal is used for providing the employee login system, inputting login information and initiating a process; the process management terminal is used for managing the process, and comprises: process approval, process deletion and process editing; the risk monitoring terminal is used for monitoring the operation behavior of each terminal and monitoring the risk; the data management terminal is used for inputting, deleting and editing data; the private network is used for providing encrypted transmission for data transmission in the system.
Further, the employee side includes: the device comprises a display device, an input device, a fingerprint input device and an iris input device; the display device, the input equipment, the fingerprint input equipment and the iris input equipment are respectively in signal connection with a special network; the display device is used for displaying information and providing interaction for a user; the input device is used for providing input information for a user; the fingerprint input equipment is used for inputting fingerprint information; and the iris inputting equipment is used for inputting the iris information.
Further, the rights management side includes: a right verification unit and a right management unit; the authority verification unit is used for verifying and comparing the received information with the information stored in the database after receiving the fingerprint information and the iris information input by the employee terminal, and judging the authority of the employee; and the authority management unit is used for inputting, deleting and editing the user authority.
Further, the process management end includes: the process approval unit is used for approving the processes initiated by the employees and feeding the approval results back to the employee terminals; and the process management unit is used for archiving, deleting and editing the process.
Further, the private network includes: a network channel and encryption means; the encryption device encrypts and decrypts data information transmitted in a network channel; when the data information just starts to enter a network channel, encrypting the entered data information; when the data information leaves the network channel, the data is decrypted.
An electronic management method for enterprise processes, the method comprising the steps of:
step 1: when an employee logs in the system, firstly, fingerprint information and iris information are input through an employee terminal; the input fingerprint information and the input iris information are sent to an authority verification end through a special network;
step 2: the authority verification end verifies the received fingerprint information and iris information, and if the verification is passed, the result is sent to the employee end to inform the user of performing subsequent operation; if the verification fails, sending a result to the employee end, and informing the user that the verification fails;
and step 3: if the authority verification end passes the verification, the employee can initiate a flow at the employee end, and the initiated flow and related information are sent to the flow management end;
and 4, step 4: the process management end examines and approves the received process; meanwhile, the process management end can delete, edit and archive the process;
and 5: personnel at the risk monitoring end can check information of other ends through the risk monitoring end at any time to monitor risks;
step 6: and the data management terminal performs entry, deletion, editing and backup management on data in the database.
Further, the private network encrypts and decrypts information transmitted in the network; when the data information just starts to enter the private network, encrypting the entered data information; when the data information leaves the private network, the data is decrypted.
Further, the method for encrypting the information transmitted in the network by the private network comprises the following steps: the method for operating the first key and the second key according to bits to obtain the final encryption key comprises the following steps:
step 1: taking the data information as a parameter A, taking the result of inverse operation of the data information as a parameter B, and constructing an encryption matrix:
Figure BDA0002198879660000031
recording a known encryption factor
Figure BDA0002198879660000032
Step 2, the encryption matrix and the encryption factor are processed
Figure BDA0002198879660000033
Matrix multiplication to obtain an encrypted string matrix X:
Figure BDA0002198879660000034
Figure BDA0002198879660000035
and step 3: and taking letters in the alphabet, which sequentially correspond to the numerical values of the P parameter and the Q parameter in the X matrix, as final encryption results.
Further, the method for decrypting the information transmitted in the network by the private network performs the following steps: the inverse of the encryption operation is performed.
Compared with the prior art, the invention has the following beneficial effects:
1. the safety is high: the invention can timely find and stop the violation of rules and regulations by monitoring the whole process, thereby ensuring the safety of the system. Meanwhile, the data in the data communication is encrypted, so that the safety of the data is ensured, and the safety of the system is further improved.
2. The intelligent degree is high: in the invention, the whole enterprise management process can be intelligently completed through the system, and the intelligent degree is high.
Drawings
The invention is described in further detail below with reference to the following figures and detailed description:
fig. 1 is a schematic system structure diagram of an enterprise process electronic management system disclosed in an embodiment of the present invention.
Fig. 2 is a schematic method flow diagram of an enterprise flow electronic management system and method according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
Please refer to fig. 1. It should be understood that the structures, ratios, sizes, and the like shown in the drawings and described in the specification are only used for matching with the disclosure of the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions under which the present invention can be implemented, so that the present invention has no technical significance, and any structural modification, ratio relationship change, or size adjustment should still fall within the scope of the present invention without affecting the efficacy and the achievable purpose of the present invention. In addition, the terms "upper", "lower", "left", "right", "middle" and "one" used in the present specification are for clarity of description, and are not intended to limit the scope of the present invention, and the relative relationship between the terms and the terms is not to be construed as a scope of the present invention.
Example 1
An enterprise process electronic management system, the system comprising: the system comprises an employee side, a right management side, a process management side, a risk monitoring side, a data management side, a special network and a database; the employee side, the authority management side, the process management side, the risk monitoring side, the data management side and the database are respectively in signal connection with a special network; the database is used for storing all data information of the system and providing data support for other ends in the system; the authority management terminal is used for carrying out authority management of the system, carrying out authority input, deletion and editing, and carrying out authority verification on information input by the staff terminal; the employee terminal is used for providing the employee login system, inputting login information and initiating a process; the process management terminal is used for managing the process, and comprises: process approval, process deletion and process editing; the risk monitoring terminal is used for monitoring the operation behavior of each terminal and monitoring the risk; the data management terminal is used for inputting, deleting and editing data; the private network is used for providing encrypted transmission for data transmission in the system.
Specifically, the process management is a systematic method which is centered on standardized and end-to-end construction of excellent business processes and aims to continuously improve the performance of the organization business. Process management emphasizes normalization, persistence, and systematization. Unlike the BPR (Business Process reconfiguration/Business Process Re-engineering/Business Process reconfiguration), the concept of Process management theory standardization and systematization indicates that the Business Process is not completely redesigned, but the Process is designed in a standardized manner, and the Process is redesigned when the Process needs to be redesigned, and the Process is not needed to be improved. Meanwhile, the process management is a systematic method, is a continuous and continuously improved method, and gives up the original dramatic improvement.
The process flow is divided into a strategic process flow, an operational process flow and an auxiliary process flow. Strategic flows refer to flows that an organization plans for its future. Including those for strategic planning, product or service development, and development of new processes. An operational flow refers to a flow where an organization performs conventional functions, such as market development (winning customers), service implementation flow (satisfying customers), after-sales service (customer support), cash and property management flow, and the like. Auxiliary processes refer to processes that assist strategic and operational processes, such as human resources management, information system management, and the like. These 3 types of processes are applicable to all organizations, and each type of process can be subdivided into a series of sub-processes, which can be further subdivided into more specific processes step by step until the sub-processes are subdivided into T-processes of each employee. The core flow of all organizations is essentially the same. The number and complexity of the core processes is independent of the size of the organization. This is not surprising, and is known as "sparrows are small and have a good five zang organs". Because all organizations, regardless of their size + are doing essentially the same thing: creating new products and or services, satisfying customers, and managing resources to achieve organizational goals.
Example 2
On the basis of the above embodiment, the employee side includes: the device comprises a display device, an input device, a fingerprint input device and an iris input device; the display device, the input equipment, the fingerprint input equipment and the iris input equipment are respectively in signal connection with a special network; the display device is used for displaying information and providing interaction for a user; the input device is used for providing input information for a user; the fingerprint input equipment is used for inputting fingerprint information; and the iris inputting equipment is used for inputting the iris information.
Example 3
On the basis of the above embodiment, the right management side includes: a right verification unit and a right management unit; the authority verification unit is used for verifying and comparing the received information with the information stored in the database after receiving the fingerprint information and the iris information input by the employee terminal, and judging the authority of the employee; and the authority management unit is used for inputting, deleting and editing the user authority.
Example 4
On the basis of the above embodiment, the process management end includes: the process approval unit is used for approving the processes initiated by the employees and feeding the approval results back to the employee terminals; and the process management unit is used for archiving, deleting and editing the process.
Example 5
On the basis of the above embodiment, the private network includes: a network channel and encryption means; the encryption device encrypts and decrypts data information transmitted in a network channel; when the data information just starts to enter a network channel, encrypting the entered data information; when the data information leaves the network channel, the data is decrypted.
Example 6
An electronic management method for enterprise processes, the method comprising the steps of:
step 1: when an employee logs in the system, firstly, fingerprint information and iris information are input through an employee terminal; the input fingerprint information and the input iris information are sent to an authority verification end through a special network;
step 2: the authority verification end verifies the received fingerprint information and iris information, and if the verification is passed, the result is sent to the employee end to inform the user of performing subsequent operation; if the verification fails, sending a result to the employee end, and informing the user that the verification fails;
and step 3: if the authority verification end passes the verification, the employee can initiate a flow at the employee end, and the initiated flow and related information are sent to the flow management end;
and 4, step 4: the process management end examines and approves the received process; meanwhile, the process management end can delete, edit and archive the process;
and 5: personnel at the risk monitoring end can check information of other ends through the risk monitoring end at any time to monitor risks;
step 6: and the data management terminal performs entry, deletion, editing and backup management on data in the database.
Example 7
On the basis of the above embodiment, the private network encrypts and decrypts information transmitted in the network; when the data information just starts to enter the private network, encrypting the entered data information; when the data information leaves the private network, the data is decrypted.
Example 8
On the basis of the above embodiment, the method for encrypting information transmitted in the network by the private network performs the following steps: the method for operating the first key and the second key according to bits to obtain the final encryption key comprises the following steps:
step 1: taking the data information as a parameter A, taking the result of inverse operation of the data information as a parameter B, and constructing an encryption matrix:
Figure BDA0002198879660000061
recording a known encryption factor
Figure BDA0002198879660000062
Step 2, the encryption matrix and the encryption factor are processed
Figure BDA0002198879660000063
Matrix multiplication to obtain an encrypted string matrix X:
Figure BDA0002198879660000064
Figure BDA0002198879660000065
and step 3: and taking letters in the alphabet, which sequentially correspond to the numerical values of the P parameter and the Q parameter in the X matrix, as final encryption results.
Specifically, the data encryption technology used in cooperation with a firewall is one of the main technical means adopted for improving the security and confidentiality of an information system and data and preventing secret data from being decoded by the outside. Technically, measures are taken from two aspects of software and hardware respectively. According to different roles, data encryption technologies can be classified into data transmission encryption technologies, data storage encryption technologies, authentication technologies for data integrity, and key management technologies.
The purpose of data transmission encryption technology is to encrypt data stream in transmission, and there are two kinds of encryption, line encryption and end-to-end encryption. The line encryption focuses on the line without considering the information source and the information sink, and the security protection is provided for the secret information through different encryption keys of each line. The end-end encryption means that information is automatically encrypted by a sending end, data packet encapsulation is carried out by TCP/IP, then the information passes through the Internet as unreadable and unidentifiable data, and when the information reaches a destination, the information is automatically recombined and decrypted to form readable data.
The data storage encryption technology aims to prevent data from being decrypted in a storage link, and can be divided into ciphertext storage and access control. The former is generally realized by methods such as encryption algorithm conversion, additional encryption codes, encryption modules and the like; the latter is to examine and limit the user qualification and authority to prevent illegal users from accessing data or legal users from unauthorized accessing data.
The purpose of data integrity authentication techniques is to verify the identity of the person involved in the transfer, access and processing of information and the content of the associated data, typically including the authentication of passwords, keys, identities, data and the like. The system realizes the safety protection of data by comparing whether the characteristic value input by the verification object conforms to the preset parameter.
The key management technology comprises security measures in all links of key generation, distribution, storage, replacement, destruction and the like.
Example 9
On the basis of the above embodiment, the method for decrypting information transmitted in the network by the private network performs the following steps: the inverse of the encryption operation is performed.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (9)

1. An electronic management system for enterprise processes, the system comprising: the system comprises an employee side, a right management side, a process management side, a risk monitoring side, a data management side, a special network and a database; the employee side, the authority management side, the process management side, the risk monitoring side, the data management side and the database are respectively in signal connection with a special network; the database is used for storing all data information of the system and providing data support for other ends in the system; the authority management terminal is used for carrying out authority management of the system, carrying out authority input, deletion and editing, and carrying out authority verification on information input by the staff terminal; the employee terminal is used for providing the employee login system, inputting login information and initiating a process; the process management terminal is used for managing the process, and comprises: process approval, process deletion and process editing; the risk monitoring terminal is used for monitoring the operation behavior of each terminal and monitoring the risk; the data management terminal is used for inputting, deleting and editing data; the private network is used for providing encrypted transmission for data transmission in the system.
2. The system of claim 1, wherein the employee side comprises: the device comprises a display device, an input device, a fingerprint input device and an iris input device; the display device, the input equipment, the fingerprint input equipment and the iris input equipment are respectively in signal connection with a special network; the display device is used for displaying information and providing interaction for a user; the input device is used for providing input information for a user; the fingerprint input equipment is used for inputting fingerprint information; and the iris inputting equipment is used for inputting the iris information.
3. The system of claim 2, wherein the rights management side comprises: a right verification unit and a right management unit; the authority verification unit is used for verifying and comparing the received information with the information stored in the database after receiving the fingerprint information and the iris information input by the employee terminal, and judging the authority of the employee; and the authority management unit is used for inputting, deleting and editing the user authority.
4. The system of claim 3, wherein the process management side comprises: the process approval unit is used for approving the processes initiated by the employees and feeding the approval results back to the employee terminals; and the process management unit is used for archiving, deleting and editing the process.
5. The system of claim 4, wherein the private network comprises: a network channel and encryption means; the encryption device encrypts and decrypts data information transmitted in a network channel; when the data information just starts to enter a network channel, encrypting the entered data information; when the data information leaves the network channel, the data is decrypted.
6. An electronic management method of enterprise processes based on the system of any of claims 1 to 5, characterized in that it performs the following steps:
step 1: when an employee logs in the system, firstly, fingerprint information and iris information are input through an employee terminal; the input fingerprint information and the input iris information are sent to an authority verification end through a special network;
step 2: the authority verification end verifies the received fingerprint information and iris information, and if the verification is passed, the result is sent to the employee end to inform the user of performing subsequent operation; if the verification fails, sending a result to the employee end, and informing the user that the verification fails;
and step 3: if the authority verification end passes the verification, the employee can initiate a flow at the employee end, and the initiated flow and related information are sent to the flow management end;
and 4, step 4: the process management end examines and approves the received process; meanwhile, the process management end can delete, edit and archive the process;
and 5: personnel at the risk monitoring end can check information of other ends through the risk monitoring end at any time to monitor risks;
step 6: and the data management terminal performs entry, deletion, editing and backup management on data in the database.
7. The method of claim 6, wherein the private network encrypts and decrypts information transmitted in the network; when the data information just starts to enter the private network, encrypting the entered data information; when the data information leaves the private network, the data is decrypted.
8. The method of claim 7, wherein the private network encrypts the information transmitted in the network by performing the steps of: the method for operating the first key and the second key according to bits to obtain the final encryption key comprises the following steps:
step 1: taking the data information as a parameter A, and performing inverse operation on the data informationIf the parameter B is obtained, an encryption matrix is constructed:
Figure FDA0002198879650000021
recording a known encryption factor
Figure FDA0002198879650000022
Step 2, the encryption matrix and the encryption factor are processed
Figure FDA0002198879650000023
Matrix multiplication to obtain an encrypted string matrix X:
Figure FDA0002198879650000024
Figure FDA0002198879650000025
and step 3: and taking letters in the alphabet, which sequentially correspond to the numerical values of the P parameter and the Q parameter in the X matrix, as final encryption results.
9. The method of claim 8, wherein the private network decrypts information transmitted in the network by performing the steps of: the inverse of the encryption operation is performed.
CN201910858260.5A 2019-09-11 2019-09-11 Enterprise process electronic management system and method Pending CN112488638A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910858260.5A CN112488638A (en) 2019-09-11 2019-09-11 Enterprise process electronic management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910858260.5A CN112488638A (en) 2019-09-11 2019-09-11 Enterprise process electronic management system and method

Publications (1)

Publication Number Publication Date
CN112488638A true CN112488638A (en) 2021-03-12

Family

ID=74920149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910858260.5A Pending CN112488638A (en) 2019-09-11 2019-09-11 Enterprise process electronic management system and method

Country Status (1)

Country Link
CN (1) CN112488638A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104589A (en) * 2010-01-13 2011-06-22 刘文祥 Private network series
CN103606052A (en) * 2013-11-26 2014-02-26 上海实训信息技术有限公司 Enterprise information management system
CN103854076A (en) * 2012-11-29 2014-06-11 瀚科科技(大连)有限公司 Enterprise personnel management system
CN104240005A (en) * 2013-06-21 2014-12-24 刘伟 Application information management system, device and method
CN106100841A (en) * 2016-05-31 2016-11-09 成都九十度工业产品设计有限公司 A kind of data encryption system based on molecule encryption technology and method
CN108053191A (en) * 2018-01-22 2018-05-18 温州博盈科技有限公司 A kind of Enterprise Office System based on internet
CN108259501A (en) * 2018-01-26 2018-07-06 成都易达天下国际贸易有限责任公司 A kind of encryption system and encryption method of EMS declarations system
CN109840424A (en) * 2018-12-18 2019-06-04 合肥天源迪科信息技术有限公司 A kind of data base encryption and the system that desensitizes

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104589A (en) * 2010-01-13 2011-06-22 刘文祥 Private network series
CN103854076A (en) * 2012-11-29 2014-06-11 瀚科科技(大连)有限公司 Enterprise personnel management system
CN104240005A (en) * 2013-06-21 2014-12-24 刘伟 Application information management system, device and method
CN103606052A (en) * 2013-11-26 2014-02-26 上海实训信息技术有限公司 Enterprise information management system
CN106100841A (en) * 2016-05-31 2016-11-09 成都九十度工业产品设计有限公司 A kind of data encryption system based on molecule encryption technology and method
CN108053191A (en) * 2018-01-22 2018-05-18 温州博盈科技有限公司 A kind of Enterprise Office System based on internet
CN108259501A (en) * 2018-01-26 2018-07-06 成都易达天下国际贸易有限责任公司 A kind of encryption system and encryption method of EMS declarations system
CN109840424A (en) * 2018-12-18 2019-06-04 合肥天源迪科信息技术有限公司 A kind of data base encryption and the system that desensitizes

Similar Documents

Publication Publication Date Title
DE10051571B4 (en) Method and system to support security policies using stylesheet processing
CN104054321B (en) For the safety management of cloud service
Grechaninov et al. Decentralized Access Demarcation System Construction in Situational Center Network
US20200279139A1 (en) Systems and methods for data protection
CN105103488A (en) Policy enforcement with associated data
US20230283712A1 (en) Systems and methods for blockchain wireless services in a controlled environment
Carvalho et al. Adapting ISO 27001 to a public institution
US11863536B2 (en) Remote data queries through a firewall
CN111835723A (en) Service data encryption transmission system and method based on cloud platform
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
US20070214491A1 (en) Interactive security control system and method with automated order submission and approval process
Korba Privacy in distributed electronic commerce
CN112488638A (en) Enterprise process electronic management system and method
CN108183906B (en) Time bank management method, server, terminal, storage medium and electronic device
CN101826964A (en) Outgoing document security management system supporting collaboration
Dudykevych et al. Investigation of Payment Cards systems information security control
Hyvärinen et al. Information Security Requirements for B2B SaaS Providers
CN116049322B (en) Data sharing platform and method based on privacy calculation
Halleen et al. Security monitoring with cisco security mars
Kumar et al. Data Preservation in Chatbot with Cloud Deployment
Rajmohan et al. Investigation of Endorsement Guideline Protocol Actuality Problem Using Blowfish AES Algorithm
Sivakumar et al. Cognitive Radio Networks (CRN) To Ensure Secondary Users
LYDIA et al. POLAR CODE PERFORMANCE ANALYSIS FOR HIGH-SPEED WIRELESS DATA COMMUNICATION SYSTEM
Takahashi et al. Security as a service for user customized data protection
DE202023105411U1 (en) A system for preserving the privacy of mobile users

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210312

RJ01 Rejection of invention patent application after publication