CN113377352B - Big data form modeling generation method for government affair business - Google Patents

Big data form modeling generation method for government affair business Download PDF

Info

Publication number
CN113377352B
CN113377352B CN202110756565.2A CN202110756565A CN113377352B CN 113377352 B CN113377352 B CN 113377352B CN 202110756565 A CN202110756565 A CN 202110756565A CN 113377352 B CN113377352 B CN 113377352B
Authority
CN
China
Prior art keywords
data
protection
control
denotes
dimensional array
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110756565.2A
Other languages
Chinese (zh)
Other versions
CN113377352A (en
Inventor
周宏文
李柏林
马小明
周安强
李晶
张建
刘佳川
黎欢
万斯奇
胡源
侯伟
戴一明
赵根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Planning And Natural Resources Information Center
Original Assignee
Chongqing Planning And Natural Resources Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Planning And Natural Resources Information Center filed Critical Chongqing Planning And Natural Resources Information Center
Priority to CN202110756565.2A priority Critical patent/CN113377352B/en
Publication of CN113377352A publication Critical patent/CN113377352A/en
Application granted granted Critical
Publication of CN113377352B publication Critical patent/CN113377352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • G06F8/24Object-oriented
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Toxicology (AREA)
  • Electromagnetism (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a big data form modeling generation method for government affair business, which comprises the following steps: s1, self-defining page layout, dragging one of a basic control, a container control and a template or any combined form control, editing a control field name, and constructing a multi-dimensional government business form in the system according to an actual working form; s2, setting basic properties, binding data sources and setting related rules for the form control; s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form. The invention can construct the multidimensional government affair business form in the system according to the actual working form, thereby preventing the result from being stolen and improving the system safety.

Description

Big data form modeling generation method for government affair business
Technical Field
The invention relates to the technical field of electronic forms, in particular to a big data form modeling generation method for government affair business.
Background
The form is mainly used for realizing a data acquisition function, along with the development of an artificial intelligence technology and a mobile information system, a plurality of functions can complete data display or collection by means of the form, data perception is completed by describing some characteristic information of the data, and however, the service form applied to a complex and dynamically-changing government service platform has the characteristics of large quantity, multiple data fields, deep data structure hierarchy and variability.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a large data form modeling generation method for government affair business.
In order to achieve the above object, the present invention provides a big data form modeling generation method for government affairs business, comprising the following steps:
s1, self-defining page layout, dragging one of a basic control, a container control and a template or any combined form control, editing a control field name, and constructing a multi-dimensional government business form in the system according to an actual working form;
s2, setting basic properties, binding data sources and setting related rules for the form control;
s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form.
In a preferred embodiment of the present invention, the S1 includes:
s1-1, the basic control of the self-defined form page layout comprises one or any combination of a text box, multi-line text, a button, a pull-down selection, a check box, a radio box, a date selector, a hyperlink, file uploading, picture uploading, a dynamic comment bar, a static comment bar and WPS; the container control comprises one or any combination of tables, sections, repeated tables and repeated sections; the template stores a form which is custom designed by a user; the form control is dragged to an editing page, so that form element selection is completed;
s1-2, inputting a text in the editing page, dragging the page control, and completing the position transformation of each field of the form;
or/and said S2 comprises:
s2-1, setting attributes including one or any combination of domain attributes, control attributes and styles according to the form control types;
s2-2, setting the data source attribute of the form control, and completing the link of the control and the data storage path;
s2-3, setting operation rules and completing the association between form controls;
s2-4, setting verification and format rules to complete the verification of the form control content;
or/and said S3 comprises: selecting one or any combination of event operations of clicking, text changing, value inputting, value deleting, button pressing, mouse releasing, mouse moving in and mouse moving out, then customizing the event conditions, and completing the control event setting.
In a preferred embodiment of the present invention, the S1 further includes: the user-defined form is exported to be a form template, the form template is stored in the system in a form of form control, and form design is rapidly completed by dragging the template control;
in a preferred embodiment of the present invention, the domain attributes include: field alias, field identification, field type, or any combination thereof.
In a preferred embodiment of the present invention, the control attribute comprises: control type, default, placeholder, data format, must fill selection, read only selection, or any combination.
In a preferred embodiment of the present invention, the pattern includes: and the control width, the font color, the font size and the font weight are one or any combination.
In a preferred embodiment of the present invention, in step S1, the form protection method is performed on the built work form, and the form protection method includes the following steps:
s11, performing first safety protection on the constructed work form to obtain first safety protection data, and recording the first safety protection data as A1(ii) a Recording the constructed work form for the first safety protection as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, the first security protection is performed on the built work form to obtain the first security protection data thereof, and the first security protection method is implemented by the encrypted code of the user who wants to export the built work form.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional codeArray PX,Y
S1443, converting the two-dimensional code array into a one-dimensional array PX*Y′=(p1′ p2′ p3′ … pX*Y′);
S1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words;
s1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into a character two-dimensional code and displaying the character two-dimensional code on a download page;
s1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading.
In conclusion, due to the adoption of the technical scheme, the multi-dimensional government affair business form can be constructed in the system according to the actual working form, so that the result is prevented from being stolen, and the system safety is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
FIG. 2 is a schematic diagram showing a two-dimensional code of a search term according to the present invention.
FIG. 3 is a schematic diagram showing a one-dimensional array according to the present invention.
Fig. 4 is a schematic illustration of the present invention.
Fig. 5 is a schematic illustration of the present invention.
FIG. 6 is a schematic diagram of a fill-in array according to the present invention.
FIG. 7 is a schematic diagram of a two-dimensional code display of filled-in characters according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a big data form modeling generation method for government affair business, which comprises the following steps as shown in figure 1:
s1, self-defining page layout, dragging one of a basic control, a container control and a template or any combined form control, editing a control field name, and constructing a multi-dimensional government business form in the system according to an actual working form;
s2, setting basic properties, binding data sources and setting related rules for the form control;
s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form.
In a preferred embodiment of the present invention, the S1 includes:
s1-1, the basic control of the self-defined form page layout comprises one or any combination of a text box, multi-line text, a button, a pull-down selection, a check box, a radio box, a date selector, a hyperlink, file uploading, picture uploading, a dynamic comment bar, a static comment bar and WPS; the container control comprises one or any combination of tables, sections, repeated tables and repeated sections; the template stores a form which is custom designed by a user; the form control is dragged to an editing page, so that form element selection is completed;
s1-2, inputting a text in the editing page, dragging the page control, and completing the position transformation of each field of the form;
or/and said S2 comprises:
s2-1, setting attributes including one or any combination of domain attributes, control attributes and styles according to the form control types;
s2-2, setting the data source attribute of the form control, and completing the link of the control and the data storage path;
s2-3, setting operation rules and completing the association between form controls;
s2-4, setting verification and format rules to complete the verification of the form control content;
or/and said S3 comprises: selecting one or any combination of event operations of clicking, text changing, value inputting, value deleting, button pressing, mouse releasing, mouse moving in and mouse moving out, then customizing the event conditions, and completing the control event setting.
In a preferred embodiment of the present invention, the S1 further includes: the user-defined form is exported to be a form template, the form template is stored in the system in a form of form control, and form design is rapidly completed by dragging the template control;
or/and the domain attributes comprise: the field alias, the field identification, the field type or any combination thereof;
or/and the control attributes comprise: control type, default value, placeholder, data format, mandatory selection, read-only selection or any combination;
or/and the pattern comprises: and the control width, the font color, the font size and the font weight are one or any combination.
In a preferred embodiment of the present invention, in step S1, the form protection method is performed on the built work form, and the form protection method includes the following steps:
s11, performing first safety protection on the constructed work form to obtain first safety protection data, and recording the first safety protection data as A1(ii) a Recording the constructed work form for the first safety protection as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, performing first security protection on the constructed work form to obtain first security protection data thereof, where the first security protection method is implemented by an encryption code of a user who wants to export the constructed work form;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the constructed work form to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code of a user of the constructed work form to be exported;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by a system;
or, in step S11, performing primary security protection on the constructed work form to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a user of a work form to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the constructed work form to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code of a user of a work form to be exported and constructed;
or, in step S11, performing first security protection on the constructed work form to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; data thereofThe protection and safety protection is realized by adopting an encryption code of a user of the work form to be exported and constructed;
or, in step S11, performing first security protection on the constructed work form to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a user of a work form to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by the system.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or/and step S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the following operations are performed on the downloaded data:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoded data II obtained in the step S1422 is realized by utilizing the decryption code of the user of the work form to be exported and constructed, and the decoded data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoded data I obtained in the step S1421 is realized by using the decryption code of the user of the work form to be exported and constructed, and decoded data II of the decoded data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoded data II obtained in the step S1422 is realized by utilizing the decryption code of the user of the work form to be exported and constructed, and the decoded data is obtained;
or, 1421, decode the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoded data I obtained in the step S1421 is realized by using the decryption code of the user of the work form to be exported and constructed, and decoded data II of the decoded data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, in step S1421, the downloaded data is implemented by using the decryption key of the user of the work form to be derived and constructed, so as to obtain the first decoded data;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, in step S1421, the downloaded data is implemented by using the decryption key of the user of the work form to be derived and constructed, so as to obtain the first decoded data;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof. In the embodiment, the encryption code of the user of the work form to be exported and constructed is the public key of the operation user, the preset encryption code of the system is the private key of the system, the preset decryption code of the system is the public key of the system, and the decryption code of the user of the work form to be exported and constructed is the private key of the operation user; the encryption code received by the system is obtained by inputting a public key of an operating user or a public key of the system into a keyword operation function of one of MD5, sha1, sha256 and sha512, the public key of the operating user and a private key of the operating user are a pair of asymmetric keys, the public key of the system and the private key of the system are a pair of asymmetric keys, the data encrypted by the private key can only be decoded by the public key, the data encrypted by the public key can only be decoded by the private key, and the encryption code received by the system is a symmetric encryption algorithm.
In a preferred embodiment of the invention, the following operations are performed on the decoded data:
s14231, performing comparison code calculation on the decoded data, where the comparison code calculation method is as follows:
Figure BDA0003147857070000121
wherein, the Decoded data represents the Decoded data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
n represents the total number of times the keyword operation function is performed at step S142 or S144;
the Contrast code represents a comparison code calculated by a keyword operation function;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data into a constructed work form;
if the comparison code is not consistent with the search word, the downloaded data is re-decoded.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional code array, namely
Figure BDA0003147857070000122
Wherein,
Figure BDA0003147857070000123
x is a positive integer less than or equal to X, Y is a positive integer less than or equal to Y, X represents the total number of rows in the two-dimensional code array, Y represents the total number of columns in the two-dimensional code array, PX,YRepresenting a two-dimensional code array when px,yWhen the number is equal to 1, the two-dimensional code of the search word is a black square, and when the number is p, the two-dimensional code of the search word is a black squarex,yWhen the number is equal to 0, the two-dimensional code of the search word is a white square, Qx,yRepresenting a search term two-dimensional code;
s1443, converting the two-dimensional code array into a one-dimensional array, PX*Y′=(p1′ p2′ p3′ … pX*Y') denotes a one-dimensional array, i.e. p1′=p1,1,p2′=p1,2,p3′=p1,3,……,pY′=p1,Y
pY+1′=p2,1,pY+2′=p2,2,pY+3′=p2,3,……,p2*Y′=p2,Y
p2*Y+1′=p3,1,p2*Y+2′=p3,2,p2*Y+3′=p3,3,……,p3*Y′=p3,Y
p3*Y+1′=p4,1,p3*Y+2′=p4,2,p3*Y+3′=p4,3,……,p4*Y′=p4,Y
Figure BDA0003147857070000131
p(X-1)*Y+1′=pX,1,p(X-1)*Y+2′=pX,2,p(X-1)*Y+3′=pX,3,……,pX*Y′=pX,Y(ii) a Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words; the characters comprise numeric characters 0-9, or/and upper-case characters A-Z, or/and lower-case characters a-Z.
S1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into the two-dimensional code and displaying the two-dimensional code on a download page. For example, assume that its search term ishttp://www.cnipa.gov.cn(ii) a The search term http:// www.cnipa.gov.cn is converted by a two-dimensional code converter to obtain the search term two-dimensional code shown in FIG. 2, wherein the search term two-dimensional code is 29 × 29 squares. The two-dimensional code array shown in fig. 2 is converted into a one-dimensional array, and since one row of the one-dimensional array has 841 squares, only the first two rows of the two-dimensional code of the search term shown in fig. 2 form the one-dimensional array shown in fig. 3. To search the wordhttp://www.cnipa.gov.cnSequentially filling element positions equal to 0 in the one-dimensional array shown in fig. 3; after filling as shown in fig. 4. Then randomly filling the numeric characters 0-9, the capital characters A-Z and the lowercase characters a-Z into the element positions which are equal to 1 and are filled in the search words; as shown in fig. 5. The filled characters are extracted in turn to obtain the filling array corresponding to the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn and the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn, as shown in FIG. 6. The filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovv 1.cn is converted by a two-dimensional code converter, and the filled character two-dimensional code shown in FIG. 7 is obtained. The character-filled two-dimensional code shown in fig. 7 is displayed on a download page.
S1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading. Scanning the two-dimensional code shown in the figure 7 and displayed on the download page by using a two-dimensional code scanner to obtain a scanning character a09 mAeHhtTtp:/xXe/wGIwSFLwswjj7w.cnispnMqa 3. rrdYgdovv 1. cn; filling the scanning character a09 mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnisnMqa3. rrdYgdovv 1.cn into the filling array in sequence as shown in FIG. 6, extracting the characters filled in the white squares as shown in FIG. 5, and obtaining the search word http:// www.cnipa.gov.cn; and rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval word http:// www.cnipa.gov.cn for downloading.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (8)

1. A big data form modeling generation method for government affairs business is characterized by comprising the following steps:
s1, self-defining page layout, dragging one or any combination of basic controls, container controls and templates, editing control field names, and constructing a multi-dimensional government business form in a system according to an actual working form; in step S1, performing form protection on the built work form, where the form protection method includes the following steps:
s11, performing first safety protection on the constructed work form to obtain first safety protection data, and recording the first safety protection data as A1(ii) a Recording the constructed work form for the first safety protection as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
s14, exporting the security data to be exported in the step S13; exporting the security data to be exported in the step S13, and storing the security data in the desktop, and performing the following operations on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; returning to step S143;
s2, setting basic properties, binding data sources and setting related rules for the form control;
s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form.
2. The big data form modeling generation method for government affairs business according to claim 1, wherein the S1 includes:
s1-1, the basic control of the self-defined form page layout comprises one or any combination of a text box, multi-line text, a button, a pull-down selection, a check box, a radio box, a date selector, a hyperlink, file uploading, picture uploading, a dynamic comment bar, a static comment bar and WPS; the container control comprises one or any combination of tables, sections, repeated tables and repeated sections; the template stores a form which is custom designed by a user; the form control is dragged to an editing page, so that form element selection is completed;
s1-2, inputting a text in the editing page, dragging the page control, and completing the position transformation of each field of the form;
or/and said S2 comprises:
s2-1, setting attributes including one or any combination of domain attributes, control attributes and styles according to the form control types;
s2-2, setting the data source attribute of the form control, and completing the link of the control and the data storage path;
s2-3, setting operation rules and completing the association between form controls;
s2-4, setting verification and format rules to complete the verification of the form control content;
or/and said S3 comprises: selecting one or any combination of event operations of clicking, text changing, value inputting, value deleting, button pressing, mouse releasing, mouse moving in and mouse moving out, then customizing the event conditions, and completing the control event setting.
3. The big data form modeling generation method for government affairs business according to claim 2, wherein the S1 further includes: the user-defined form is exported to be a form template, the form template is stored in the system in a form control mode, and form design is completed quickly by dragging the template control.
4. The big data form modeling generation method for government affairs business according to claim 2, wherein the domain attributes include: field alias, field identification, field type, or any combination thereof.
5. The big data form modeling generation method for government affairs business according to claim 2, wherein the control attributes include: control type, default, placeholder, data format, must fill selection, read only selection, or any combination.
6. The big data form modeling generation method for government affairs business according to claim 2, wherein the style includes: and the control width, the font color, the font size and the font weight are one or any combination.
7. The big data form modeling generation method for government affairs business according to claim 1, wherein in step S11, the built work form is firstly secured to obtain the first security data thereof, and the first security method is implemented by the encrypted code of the user who wants to export the built work form.
8. The big data form modeling generation method for government affairs business according to claim 1, wherein in step S142 or S144, the search term is obtained by:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the two-dimensional code of the search term obtained in the step S1441 into a two-dimensional code array PX,Y
S1443, converting the two-dimensional code array into a one-dimensional array PX*Y′=(p1′ p2′ p3′ … pX*Y') to a host; namely, it is
Figure FDA0003495471560000041
Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words;
s1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into a character two-dimensional code and displaying the character two-dimensional code on a download page;
s1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading.
CN202110756565.2A 2021-07-05 2021-07-05 Big data form modeling generation method for government affair business Active CN113377352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110756565.2A CN113377352B (en) 2021-07-05 2021-07-05 Big data form modeling generation method for government affair business

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110756565.2A CN113377352B (en) 2021-07-05 2021-07-05 Big data form modeling generation method for government affair business

Publications (2)

Publication Number Publication Date
CN113377352A CN113377352A (en) 2021-09-10
CN113377352B true CN113377352B (en) 2022-03-25

Family

ID=77580857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110756565.2A Active CN113377352B (en) 2021-07-05 2021-07-05 Big data form modeling generation method for government affair business

Country Status (1)

Country Link
CN (1) CN113377352B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117252180B (en) * 2023-11-16 2024-02-23 太平金融科技服务(上海)有限公司 Report generation method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593476A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage
CN107944527A (en) * 2017-11-06 2018-04-20 中国东方电气集团有限公司 A kind of encryption of anti-fake two-dimension code and coding/decoding method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100313182A1 (en) * 2009-06-05 2010-12-09 Microsoft Corporation Extensible user interface generation
US8464229B2 (en) * 2009-12-29 2013-06-11 Microgen Aptitude Limited Creation of form-based software application in a graphical user interface (GUI) environment
CN105069074B (en) * 2015-07-30 2018-11-20 江苏天联信息科技发展有限公司 policy configuration file processing method, device and system
CN110457669A (en) * 2016-11-07 2019-11-15 特力惠信息科技股份有限公司 The sheet disposal method and system based on B/S framework for facilitating service logic to control
CN107807913A (en) * 2017-11-16 2018-03-16 金航数码科技有限责任公司 A kind of form design system and method based on web
CN108920141A (en) * 2018-07-02 2018-11-30 广东飞企互联科技股份有限公司 The Automatic Typesetting generation method and generator of business form based on layout templates
CN110264174A (en) * 2019-06-19 2019-09-20 农业部沼气科学研究所 A kind of interconnection method of enterprise and bank
CN112668290A (en) * 2020-12-28 2021-04-16 珠海新华通软件股份有限公司 Dynamic form generation method and system based on gridding design

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593476A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage
CN107944527A (en) * 2017-11-06 2018-04-20 中国东方电气集团有限公司 A kind of encryption of anti-fake two-dimension code and coding/decoding method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
云计算中加密数据的模糊关键字搜索方法;杜军强 等;《计算机工程与应用》;20130709;第51卷(第05期);第146-152+227页 *

Also Published As

Publication number Publication date
CN113377352A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
Conti et al. A visual study of primitive binary fragment types
US7640269B2 (en) Image processing system and image processing method
CN101627620B (en) Electronic document encryption system, decoding system, and method
CN106161006B (en) Digital encryption algorithm
JP3997198B2 (en) Image processing system and image processing method
EP1455284A2 (en) Image processing method and image processing system
CN103917980A (en) Apparatus and methods for obtaining a password hint
WO2021169502A1 (en) A pixel image as well as its processing method and application system
CN107735783A (en) Method and apparatus for searching for image
CN114842483A (en) Standard file information extraction method and system based on neural network and template matching
US10872105B2 (en) Method to identify and extract fragments among large collections of digital documents using repeatability and semantic information
CN113377352B (en) Big data form modeling generation method for government affair business
CN104090793A (en) Device and method for destroying Android mobile phone body data
Kumar et al. Recent trends in text steganography with experimental study
CN116089984B (en) Anti-disclosure management method and system for administrative files
JP2009048621A (en) Data providing device, data providing method and program
CN113377351B (en) Model construction work system for large-scale government affair business
Alsuhibany Developing a visual cryptography tool for Arabic text
CN113362042B (en) Government affair service integrated management workflow design modeling method
Sahu et al. Encryption in QR code using stegnography
Choche et al. A methodology to conceal QR codes for security applications
JP2005149097A (en) Image processing system and image processing method
Fernau et al. Regulated array grammars of finite index
CN114928437B (en) Encryption method, device, equipment and storage medium
JP2012203483A (en) Business form preparation system, business form preparation method, and business form preparation program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant