CN113377351B - Model construction work system for large-scale government affair business - Google Patents

Model construction work system for large-scale government affair business Download PDF

Info

Publication number
CN113377351B
CN113377351B CN202110756231.5A CN202110756231A CN113377351B CN 113377351 B CN113377351 B CN 113377351B CN 202110756231 A CN202110756231 A CN 202110756231A CN 113377351 B CN113377351 B CN 113377351B
Authority
CN
China
Prior art keywords
data
decoding
code
denotes
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110756231.5A
Other languages
Chinese (zh)
Other versions
CN113377351A (en
Inventor
侯伟
胡源
杜康
陈萃
李翔
高成军
徐放
廖小莉
周健
黄凯
郭云龙
周宏文
汪蓓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Planning And Natural Resources Information Center
Original Assignee
Chongqing Planning And Natural Resources Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Planning And Natural Resources Information Center filed Critical Chongqing Planning And Natural Resources Information Center
Priority to CN202110756231.5A priority Critical patent/CN113377351B/en
Publication of CN113377351A publication Critical patent/CN113377351A/en
Application granted granted Critical
Publication of CN113377351B publication Critical patent/CN113377351B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The invention provides a model construction work system for large-scale government affair business, which comprises the following steps: s1, creating related services according to actual working requirements; s2, creating a service related form as an information carrier of service flow; s3, creating a workflow model in the business, and completing the design of the business examination and approval path; and S4, creating a workflow example, and realizing the actual processing of the complex audit and approval government affairs business. The invention completes the processing of the government affairs business by establishing the business form.

Description

Model construction work system for large-scale government affair business
Technical Field
The invention relates to the technical field of electronic forms, in particular to a model construction work system for large-scale government affair business.
Background
Electronic government refers to a brand new management mode for office work, management and public service provision for society by comprehensively applying modern information technology, network technology, office automation technology and the like in government activities. The category of the generalized electronic government affairs includes all national institutions; the electronic government affairs in the narrow sense mainly include all levels of administrative bodies directly responsible for managing national public affairs and social affairs. The electronic government system in China has been developed for more than ten years. However, with the advent of the big data age, the original e-government system has not been able to fully satisfy the needs of all levels of governments and departments.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a model construction work system for large-scale government affair business.
In order to achieve the above object of the present invention, the present invention provides a model construction work system for large-scale government affairs business, comprising the steps of:
s1, creating related services according to actual working requirements;
s2, creating a service related form as an information carrier of service flow;
s3, creating a workflow model in the business and finishing the design of the business examination and approval path;
and S4, creating a workflow example, and realizing the actual processing of the complex audit and approval government affairs business.
In a preferred embodiment of the present invention, the S1 includes: newly establishing a service, and setting the attribute of the service, wherein the attribute comprises one or any combination of the application, the name, the abbreviation, the code and the counter of the service;
or/and said S2 comprises: setting basic attributes and operation attributes of form controls by drawing a form page, and completing the creation of a form;
or/and said S3 comprises:
s3-1, setting the attribute and allocation strategy of the working link by drawing the flow node and the flow line, and completing the creation of the working flow path;
s3-2, selecting a work node to relate to the form, associating the workflow and the form, and completing the creation of a workflow model;
or/and said S4 comprises: and filling in forms of all business links according to the created workflow model, and finishing the examination and approval work of the complex government business through examination and approval of all links.
In a preferred embodiment of the present invention, the drawing form page includes: inputting text information on a form editing page, and displaying and representing the name of a form control; and finishing the layout design of the form by dragging the form control.
In a preferred embodiment of the present invention, the form controls comprise: one or any combination of basic controls of a text box, multi-line text, a button, a drop-down selection, a check box, a radio box, a date selector, a hyperlink, a file upload, a picture upload, a dynamic comment field, a static comment field, and WPS; the container control comprises one or any combination of a table, a section, a repeating table, and a repeating section.
In a preferred embodiment of the present invention, the form control basic properties include: one or any combination of domain properties, control properties, styles.
In a preferred embodiment of the present invention, the form control operations include: event settings or/and trigger settings.
In a preferred embodiment of the present invention, in step S3, model security protection is performed before the built model is derived, and the method for model security protection includes the following steps:
s11, carrying out first safety protection on the constructed model to obtain first safety protection data thereof, and recording the first safety protection data as A1(ii) a The model which is constructed for the first security protection is recorded as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or/and step S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the following operations are performed on the downloaded data:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, 1421, decode the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the second decoded data obtained in the step S1422 by using a decryption code preset by the system, so as to obtain the decoded data.
In a preferred embodiment of the invention, the following operations are performed on the decoded data:
s14231, performing comparison code calculation on the decoded data, where the comparison code calculation method is as follows:
Figure BDA0003147604260000051
wherein, the Decoded data represents the Decoded data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
n represents the total number of times the keyword operation function is performed at step S142 or S144;
the Contrast code represents a comparison code calculated by a keyword operation function;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data to form a constructed model;
if the comparison code is not consistent with the search word, the downloaded data is re-decoded.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search word two-dimensional code obtained in the step S1441 into a two-dimensional code array, namely
Figure BDA0003147604260000061
Wherein the content of the first and second substances,
Figure BDA0003147604260000062
x is a positive integer less than or equal to X, Y is a positive integer less than or equal to Y, X represents the total number of rows in the two-dimensional code array, Y represents the total number of columns in the two-dimensional code array, PX,YRepresenting a two-dimensional code array when px,yWhen the number is equal to 1, the two-dimensional code of the search word is a black square, and when the number is p, the two-dimensional code of the search word is a black squarex,yWhen the number is equal to 0, the two-dimensional code of the search word is a white square, Qx,yRepresenting a search term two-dimensional code;
s1443, converting the two-dimensional code array into a one-dimensional array, PX*Y′=(p1′ p2′ p3′ … pX*Y') denotes a one-dimensional array, i.e. p1′=p1,1,p2′=p1,2,p3′=p1,3,……,pY′=p1,Y
pY+1′=p2,1,pY+2′=p2,2,pY+3′=p2,3,……,p2*Y′=p2,Y
p2*Y+1′=p3,1,p2*Y+2′=p3,2,p2*Y+3′=p3,3,……,p3*Y′=p3,Y
p3*Y+1′=p4,1,p3*Y+2′=p4,2,p3*Y+3′=p4,3,……,p4*Y′=p4,Y
Figure BDA0003147604260000063
p(X-1)*Y+1′=pX,1,p(X-1)*Y+2′=pX,2,p(X-1)*Y+3′=pX,3,……,pX*Y′=pX,Y(ii) a Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes a one-dimensional array from left to right(X-1) Y +1 th element, p(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words;
s1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into a character two-dimensional code and displaying the character two-dimensional code on a download page;
s1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading.
In summary, due to the adoption of the technical scheme, the invention completes the processing of the government affair business by creating the business form.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
FIG. 2 is a schematic diagram showing a two-dimensional code of a search term according to the present invention.
FIG. 3 is a schematic diagram showing a one-dimensional array according to the present invention.
Fig. 4 is a schematic illustration of the present invention.
Fig. 5 is a schematic illustration of the present invention.
FIG. 6 is a schematic diagram of a fill-in array according to the present invention.
FIG. 7 is a schematic diagram of a two-dimensional code display of filled-in characters according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a model construction work system for large-scale government affair business, which comprises the following steps as shown in figure 1:
s1, creating related services according to actual working requirements;
s2, creating a service related form as an information carrier of service flow;
s3, creating a workflow model in the business and finishing the design of the business examination and approval path;
and S4, creating a workflow example, and realizing the actual processing of the complex audit and approval government affairs business.
In a preferred embodiment of the present invention, the S1 includes: newly establishing a service, and setting the attribute of the service, wherein the attribute comprises one or any combination of the application, the name, the abbreviation, the code and the counter of the service;
or/and said S2 comprises: setting basic attributes and operation attributes of form controls by drawing a form page to finish creating the form;
or/and said S3 comprises:
s3-1, setting the attribute and allocation strategy of the working link by drawing the flow node and the flow line, and completing the creation of the working flow path;
s3-2, selecting a work node to relate to the form, associating the workflow and the form, and completing the creation of a workflow model;
or/and said S4 comprises: and filling in forms of all business links according to the created workflow model, and finishing the examination and approval work of the complex government business through examination and approval of all links.
In a preferred embodiment of the present invention, the drawing form page includes: inputting text information on a form editing page, and displaying and representing the name of a form control; completing the layout design of the form by dragging the form control;
or/and the form controls comprise: one or any combination of basic controls of a text box, multi-line text, a button, a drop-down selection, a check box, a radio box, a date selector, a hyperlink, a file upload, a picture upload, a dynamic comment field, a static comment field, and WPS; the container control comprises one or any combination of a table, a section, a repeated table and a repeated section;
or/and the form control basic properties comprise: one or any combination of domain property, control property and style;
or/and the form control operation comprises: event settings or/and trigger settings.
In a preferred embodiment of the present invention, in step S3, model security protection is performed before the built model is derived, and the method for model security protection includes the following steps:
s11, carrying out first safety protection on the built model to obtain first safety protection data thereof, and recording the first safety protection data as A1(ii) a The model which is constructed for the first security protection is recorded as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the safety data to be exported;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, performing first security protection on the built model to obtain first security protection data thereof, where the first security protection method is implemented by an encryption code of a user of the model to be derived;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by an encryption code of a model user to be exported and constructed;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by a system;
or, in step S11, performing primary security protection on the constructed model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; its data protection safety protectionThe encryption code received by the system is adopted for realization;
or, in step S11, performing primary security protection on the constructed model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection safety protection is realized by adopting an encryption code of a model user to be exported and constructed;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code of a model user to be exported and constructed;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carry out data protection and safety protection to obtain the sameProtecting safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by the system.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or/and step S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the following operations are performed on the downloaded data:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, 1421, decode the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof. In the embodiment, the encryption code of the model user to be exported and constructed is the public key of the operation user, the encryption code preset by the system is the private key of the system, the decryption code preset by the system is the public key of the system, and the decryption code of the model user to be exported and constructed is the private key of the operation user; the encryption code received by the system is obtained by inputting a public key of an operating user or a public key of the system into a keyword operation function of one of MD5, sha1, sha256 and sha512, the public key of the operating user and a private key of the operating user are a pair of asymmetric keys, the public key of the system and the private key of the system are a pair of asymmetric keys, the data encrypted by the private key can only be decoded by the public key, the data encrypted by the public key can only be decoded by the private key, and the encryption code received by the system is a symmetric encryption algorithm.
In a preferred embodiment of the invention, the following operations are performed on the decoded data:
s14231, performing comparison code calculation on the decoded data, where the comparison code calculation method is as follows:
Figure BDA0003147604260000141
wherein, the Decoded data represents the Decoded data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
n represents the total number of times the keyword operation function is performed at step S142 or S144;
the Contrast code represents a comparison code calculated by a keyword operation function;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data to form a constructed model;
and if the comparison code is inconsistent with the search word, re-decoding the downloaded data.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional code array, namely
Figure BDA0003147604260000151
Wherein the content of the first and second substances,
Figure BDA0003147604260000152
x is a positive integer less than or equal to X, Y is a positive integer less than or equal to Y, X represents the total number of rows in the two-dimensional code array, Y represents the total number of columns in the two-dimensional code array, PX,YRepresenting a two-dimensional code array when px,yWhen the number is equal to 1, the two-dimensional code of the search word is a black square, and when the number is p, the two-dimensional code of the search word is a black squarex,yWhen the number is equal to 0, the two-dimensional code of the search word is a white square, Qx,yRepresenting a search term two-dimensional code;
s1443, converting the two-dimensional code array into a one-dimensional array, PX*Y′=(p1′p2′p3′…pX*Y') denotes a one-dimensional array, i.e. p1′=p1,1,p2′=p1,2,p3′=p1,3,……,pY′=p1,Y
pY+1′=p2,1,pY+2′=p2,2,pY+3′=p2,3,……,p2*Y′=p2,Y
p2*Y+1′=p3,1,p2*Y+2′=p3,2,p2*Y+3′=p3,3,……,p3*Y′=p3,Y
p3*Y+1′=p4,1,p3*Y+2′=p4,2,p3*Y+3′=p4,3,……,p4*Y =p4,Y
Figure BDA0003147604260000153
p(X-1)*Y+1′=pX,1,p(X-1)*Y+2′=pX,2,p(X-1)*Y+3′=pX,3,……,pX*Y′=pX,Y(ii) a Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words; the characters comprise numeric characters 0-9, or/and upper-case characters A-Z, or/and lower-case characters a-Z.
S1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into the two-dimensional code and displaying the two-dimensional code on a download page. For example, assume its term http:// www.cnipa.gov.cn; the search term http:// www.cnipa.gov.cn is converted by a two-dimensional code converter to obtain the search term two-dimensional code shown in FIG. 2, wherein the search term two-dimensional code is 29 × 29 squares. The two-dimensional code array shown in fig. 2 is converted into a one-dimensional array, and since one row of the one-dimensional array has 841 squares, only the first two rows of the two-dimensional code of the search term shown in fig. 2 form the one-dimensional array shown in fig. 3. Sequentially filling the search word http:// www.cnipa.gov.cn into the element positions equal to 0 in the one-dimensional array shown in FIG. 3; after filling as shown in fig. 4. Then randomly filling the numeric characters 0-9, the capital characters A-Z and the lowercase characters a-Z into the element positions which are equal to 1 and are filled in the search words; as shown in fig. 5. The filled characters are extracted in turn to obtain the filling array corresponding to the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn and the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn, as shown in FIG. 6. The filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovv 1.cn is converted by a two-dimensional code converter, and the filled character two-dimensional code shown in FIG. 7 is obtained. The character-filled two-dimensional code shown in fig. 7 is displayed on a download page.
S1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the search word, and downloading the storage position. Scanning the two-dimensional code shown in the figure 7 and displayed on the download page by using a two-dimensional code scanner to obtain a scanning character a09 mAeHhtTtp:/xXe/wGIwSFLwswjj7w.cnispnMqa 3. rrdYgdovv 1. cn; filling the scanning character a09 mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnisnMqa3. rrdYgdovv 1.cn into the filling array in sequence as shown in FIG. 6, extracting the characters filled in the white squares as shown in FIG. 5, and obtaining the search word http:// www.cnipa.gov.cn; and rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval word http:// www.cnipa.gov.cn for downloading.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (8)

1. A model construction work system for large-scale government affairs business, which is characterized by comprising the following steps:
s1, creating related services according to actual working requirements;
s2, creating a service related form as an information carrier of service flow;
s3, creating a workflow model in the business and finishing the design of the business examination and approval path; model safety protection is carried out before the constructed model is exported, and the method for protecting the model safety comprises the following steps:
s11, carrying out first safety protection on the constructed model to obtain first safety protection data thereof, and recording the first safety protection data as A1(ii) a The model which is constructed for the first security protection is recorded as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
s14, exporting the security data to be exported in the step S13; and after the safety data to be exported are exported, storing the safety data in the desktop, and executing the following operations on the safety data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if store the cloudIn the keyword, then order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
and S144, uploading the (i + 1) th repeated word obtained by calculation in the step S143 to a storage cloud, and judging whether the (i + 1) th repeated word exists in the storage cloud:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; returning to step S143;
and S4, creating a workflow example, and realizing the actual processing of the complex audit and approval government affairs business.
2. The model building work system for large-scale government affairs business according to claim 1, wherein the S1 includes: newly establishing a service, and setting the attribute of the service, wherein the attribute comprises one or any combination of the application, the name, the abbreviation, the code and the counter of the service;
and/or said S2 includes: setting basic attributes and operation attributes of form controls by drawing a form page, and completing the creation of a form;
or/and said S3 comprises:
s3-1, setting the attribute and allocation strategy of the working link by drawing the flow node and the flow line, and completing the creation of the working flow path;
s3-2, selecting a work node to relate to the form, associating the workflow and the form, and completing the creation of a workflow model;
or/and said S4 comprises: and filling in forms of all business links according to the created workflow model, and finishing the examination and approval work of the complex government business through examination and approval of all links.
3. The model building work system for large-scale government affairs business according to claim 2, wherein the drawing form page includes: inputting text information on a form editing page, and displaying and representing the name of a form control; and finishing the layout design of the form by dragging the form control.
4. The model build work system for large-scale government affairs business of claim 2, wherein the form control includes: one or any combination of basic controls of a text box, multi-line text, a button, a drop-down selection, a check box, a radio box, a date selector, a hyperlink, a file upload, a picture upload, a dynamic comment field, a static comment field, and WPS; the container control comprises one or any combination of a table, a section, a repeating table, and a repeating section.
5. The model build work system for large-scale government affairs business according to claim 4, wherein the form control basic properties include: one or any combination of domain properties, control properties, styles.
6. The model build work system for large-scale government affairs business of claim 4, wherein the form control operation comprises: event settings or/and trigger settings.
7. The model building work system for large-scale government affair business according to claim 1, wherein in steps S142 and/or S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the downloaded data is subjected to the following operations:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, 1421, decode the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof.
8. The model building work system for large-scale government affairs business according to claim 7, wherein in step S142 or S144, the search terms are obtained by:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional code array, namely
Figure FDA0003566312390000051
Wherein the content of the first and second substances,
Figure FDA0003566312390000052
x is a positive integer less than or equal to X, Y is a positive integer less than or equal to Y, X represents the total number of rows in the two-dimensional code array, Y represents the total number of columns in the two-dimensional code array, PX,YRepresenting a two-dimensional code array when px,yWhen the number is equal to 1, the two-dimensional code of the search word is a black square, and when the number is p, the two-dimensional code of the search word is a black squarex,yWhen the number is equal to 0, the two-dimensional code of the search word is a white square, Qx,yRepresenting a search term two-dimensional code;
s1443, converting the two-dimensional code array into a one-dimensional array, PX*Y′=(p1′ p2′ p3′ … pX*Y') denotes a one-dimensional array, i.e. p1′=p1,1,p2′=p1,2,p3′=p1,3,……,pY′=p1,Y
Figure FDA0003566312390000053
Wherein p is1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words;
s1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into a character two-dimensional code and displaying the character two-dimensional code on a download page;
s1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading.
CN202110756231.5A 2021-07-05 2021-07-05 Model construction work system for large-scale government affair business Active CN113377351B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110756231.5A CN113377351B (en) 2021-07-05 2021-07-05 Model construction work system for large-scale government affair business

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110756231.5A CN113377351B (en) 2021-07-05 2021-07-05 Model construction work system for large-scale government affair business

Publications (2)

Publication Number Publication Date
CN113377351A CN113377351A (en) 2021-09-10
CN113377351B true CN113377351B (en) 2022-05-17

Family

ID=77580826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110756231.5A Active CN113377351B (en) 2021-07-05 2021-07-05 Model construction work system for large-scale government affair business

Country Status (1)

Country Link
CN (1) CN113377351B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761111A (en) * 2014-02-19 2014-04-30 中国科学院软件研究所 Method and system for constructing data-intensive workflow engine based on BPEL language

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008143087A1 (en) * 2007-05-14 2008-11-27 International Frontier Technology Laboratory, Inc. Authenticity validation subject, authenticity validation chip reader, and authenticity judging method
CN101082970A (en) * 2007-07-05 2007-12-05 山东浪潮齐鲁软件产业股份有限公司 Method for realizing government affairs examination and approval workflow engines system
CN103593476B (en) * 2013-11-28 2017-01-25 中国科学院信息工程研究所 Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage
CN106656908B (en) * 2015-10-28 2020-02-21 阿里巴巴集团控股有限公司 Two-dimensional code processing method and device
CN106651734A (en) * 2015-10-30 2017-05-10 重庆邮电大学 Binary two-dimensional code image encryption and decryption method and device
CN111291584B (en) * 2016-07-22 2023-05-02 创新先进技术有限公司 Method and system for identifying two-dimensional code position
CN107944527A (en) * 2017-11-06 2018-04-20 中国东方电气集团有限公司 A kind of encryption of anti-fake two-dimension code and coding/decoding method
CN109871200A (en) * 2017-12-04 2019-06-11 星际空间(天津)科技发展有限公司 One kind being used for rapid build business approval systems approach
CN109379351B (en) * 2018-09-30 2021-04-27 武汉斗鱼网络科技有限公司 Two-dimensional code encryption method, storage medium, equipment and system
CN111221606A (en) * 2019-12-29 2020-06-02 苏州宏软信息技术有限公司 Device management workflow service control method based on Activiti control
CN112036736B (en) * 2020-08-28 2023-08-01 杭州指令集智能科技有限公司 Workflow creation method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761111A (en) * 2014-02-19 2014-04-30 中国科学院软件研究所 Method and system for constructing data-intensive workflow engine based on BPEL language

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
省级土地整治项目动态监管业务本体及工作流模型构建与实现;刘耀林等;《武汉大学学报(信息科学版)》;20130405(第04期);第120-124页 *

Also Published As

Publication number Publication date
CN113377351A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
EP3756130B1 (en) Image hidden information detector
CN1759403A (en) Information management system
CN107735783A (en) Method and apparatus for searching for image
CN114842483A (en) Standard file information extraction method and system based on neural network and template matching
CN116089620B (en) Electronic archive data management method and system
CN104090793A (en) Device and method for destroying Android mobile phone body data
KR20090052130A (en) Data protection method using data partition
US8412755B2 (en) Permuting records in a database for leak detection and tracing
Gao et al. High-performance reversible data hiding in encrypted images with adaptive Huffman code
CN113377352B (en) Big data form modeling generation method for government affair business
CN113377351B (en) Model construction work system for large-scale government affair business
CN116089984B (en) Anti-disclosure management method and system for administrative files
US20200019606A1 (en) Expression recognition using character skipping
CN111400670B (en) Watermark adding method, device, equipment and storage medium
RU2538913C2 (en) Method for depersonalisation of personal data
CN113362042B (en) Government affair service integrated management workflow design modeling method
Choche et al. A methodology to conceal QR codes for security applications
Qin et al. New advances of privacy protection and multimedia content security for big data and cloud computing
CN112613055A (en) Image processing system and method based on distributed cloud server and digital-image conversion
Mekhaznia et al. New approach for attack of permutation-based image encryption schemes
Zhang et al. Self-embedding watermarking algorithm under high tampering rates
US11443030B2 (en) Method to encode and decode otherwise unrecorded private credentials, terms, phrases, or sentences
CN115952554A (en) Electronic signature data processing method and device, computer equipment and storage medium
JP2011227655A (en) Information retrieval system, information retrieval method, and program
JP5891867B2 (en) Information processing method, apparatus and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant