CN113377352B - Big data form modeling generation method for government affair business - Google Patents
Big data form modeling generation method for government affair business Download PDFInfo
- Publication number
- CN113377352B CN113377352B CN202110756565.2A CN202110756565A CN113377352B CN 113377352 B CN113377352 B CN 113377352B CN 202110756565 A CN202110756565 A CN 202110756565A CN 113377352 B CN113377352 B CN 113377352B
- Authority
- CN
- China
- Prior art keywords
- data
- protection
- control
- denotes
- dimensional array
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000008859 change Effects 0.000 claims abstract description 4
- 231100000279 safety data Toxicity 0.000 claims description 30
- 238000004364 calculation method Methods 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 6
- 238000003491 array Methods 0.000 claims description 3
- 238000013500 data storage Methods 0.000 claims description 3
- 238000013461 design Methods 0.000 claims description 3
- 230000003068 static effect Effects 0.000 claims description 3
- 230000009466 transformation Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
- G06F8/24—Object-oriented
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Toxicology (AREA)
- Electromagnetism (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a big data form modeling generation method for government affair business, which comprises the following steps: s1, self-defining page layout, dragging one of a basic control, a container control and a template or any combined form control, editing a control field name, and constructing a multi-dimensional government business form in the system according to an actual working form; s2, setting basic properties, binding data sources and setting related rules for the form control; s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form. The invention can construct the multidimensional government affair business form in the system according to the actual working form, thereby preventing the result from being stolen and improving the system safety.
Description
Technical Field
The invention relates to the technical field of electronic forms, in particular to a big data form modeling generation method for government affair business.
Background
The form is mainly used for realizing a data acquisition function, along with the development of an artificial intelligence technology and a mobile information system, a plurality of functions can complete data display or collection by means of the form, data perception is completed by describing some characteristic information of the data, and however, the service form applied to a complex and dynamically-changing government service platform has the characteristics of large quantity, multiple data fields, deep data structure hierarchy and variability.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a large data form modeling generation method for government affair business.
In order to achieve the above object, the present invention provides a big data form modeling generation method for government affairs business, comprising the following steps:
s1, self-defining page layout, dragging one of a basic control, a container control and a template or any combined form control, editing a control field name, and constructing a multi-dimensional government business form in the system according to an actual working form;
s2, setting basic properties, binding data sources and setting related rules for the form control;
s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form.
In a preferred embodiment of the present invention, the S1 includes:
s1-1, the basic control of the self-defined form page layout comprises one or any combination of a text box, multi-line text, a button, a pull-down selection, a check box, a radio box, a date selector, a hyperlink, file uploading, picture uploading, a dynamic comment bar, a static comment bar and WPS; the container control comprises one or any combination of tables, sections, repeated tables and repeated sections; the template stores a form which is custom designed by a user; the form control is dragged to an editing page, so that form element selection is completed;
s1-2, inputting a text in the editing page, dragging the page control, and completing the position transformation of each field of the form;
or/and said S2 comprises:
s2-1, setting attributes including one or any combination of domain attributes, control attributes and styles according to the form control types;
s2-2, setting the data source attribute of the form control, and completing the link of the control and the data storage path;
s2-3, setting operation rules and completing the association between form controls;
s2-4, setting verification and format rules to complete the verification of the form control content;
or/and said S3 comprises: selecting one or any combination of event operations of clicking, text changing, value inputting, value deleting, button pressing, mouse releasing, mouse moving in and mouse moving out, then customizing the event conditions, and completing the control event setting.
In a preferred embodiment of the present invention, the S1 further includes: the user-defined form is exported to be a form template, the form template is stored in the system in a form of form control, and form design is rapidly completed by dragging the template control;
in a preferred embodiment of the present invention, the domain attributes include: field alias, field identification, field type, or any combination thereof.
In a preferred embodiment of the present invention, the control attribute comprises: control type, default, placeholder, data format, must fill selection, read only selection, or any combination.
In a preferred embodiment of the present invention, the pattern includes: and the control width, the font color, the font size and the font weight are one or any combination.
In a preferred embodiment of the present invention, in step S1, the form protection method is performed on the built work form, and the form protection method includes the following steps:
s11, performing first safety protection on the constructed work form to obtain first safety protection data, and recording the first safety protection data as A1(ii) a Recording the constructed work form for the first safety protection as A0;
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2;
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, the first security protection is performed on the built work form to obtain the first security protection data thereof, and the first security protection method is implemented by the encrypted code of the user who wants to export the built work form.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional codeArray PX,Y;
S1443, converting the two-dimensional code array into a one-dimensional array PX*Y′=(p1′ p2′ p3′ … pX*Y′);
S1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words;
s1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into a character two-dimensional code and displaying the character two-dimensional code on a download page;
s1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading.
In conclusion, due to the adoption of the technical scheme, the multi-dimensional government affair business form can be constructed in the system according to the actual working form, so that the result is prevented from being stolen, and the system safety is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
FIG. 2 is a schematic diagram showing a two-dimensional code of a search term according to the present invention.
FIG. 3 is a schematic diagram showing a one-dimensional array according to the present invention.
Fig. 4 is a schematic illustration of the present invention.
Fig. 5 is a schematic illustration of the present invention.
FIG. 6 is a schematic diagram of a fill-in array according to the present invention.
FIG. 7 is a schematic diagram of a two-dimensional code display of filled-in characters according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a big data form modeling generation method for government affair business, which comprises the following steps as shown in figure 1:
s1, self-defining page layout, dragging one of a basic control, a container control and a template or any combined form control, editing a control field name, and constructing a multi-dimensional government business form in the system according to an actual working form;
s2, setting basic properties, binding data sources and setting related rules for the form control;
s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form.
In a preferred embodiment of the present invention, the S1 includes:
s1-1, the basic control of the self-defined form page layout comprises one or any combination of a text box, multi-line text, a button, a pull-down selection, a check box, a radio box, a date selector, a hyperlink, file uploading, picture uploading, a dynamic comment bar, a static comment bar and WPS; the container control comprises one or any combination of tables, sections, repeated tables and repeated sections; the template stores a form which is custom designed by a user; the form control is dragged to an editing page, so that form element selection is completed;
s1-2, inputting a text in the editing page, dragging the page control, and completing the position transformation of each field of the form;
or/and said S2 comprises:
s2-1, setting attributes including one or any combination of domain attributes, control attributes and styles according to the form control types;
s2-2, setting the data source attribute of the form control, and completing the link of the control and the data storage path;
s2-3, setting operation rules and completing the association between form controls;
s2-4, setting verification and format rules to complete the verification of the form control content;
or/and said S3 comprises: selecting one or any combination of event operations of clicking, text changing, value inputting, value deleting, button pressing, mouse releasing, mouse moving in and mouse moving out, then customizing the event conditions, and completing the control event setting.
In a preferred embodiment of the present invention, the S1 further includes: the user-defined form is exported to be a form template, the form template is stored in the system in a form of form control, and form design is rapidly completed by dragging the template control;
or/and the domain attributes comprise: the field alias, the field identification, the field type or any combination thereof;
or/and the control attributes comprise: control type, default value, placeholder, data format, mandatory selection, read-only selection or any combination;
or/and the pattern comprises: and the control width, the font color, the font size and the font weight are one or any combination.
In a preferred embodiment of the present invention, in step S1, the form protection method is performed on the built work form, and the form protection method includes the following steps:
s11, performing first safety protection on the constructed work form to obtain first safety protection data, and recording the first safety protection data as A1(ii) a Recording the constructed work form for the first safety protection as A0;
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2;
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, performing first security protection on the constructed work form to obtain first security protection data thereof, where the first security protection method is implemented by an encryption code of a user who wants to export the constructed work form;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the constructed work form to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code of a user of the constructed work form to be exported;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by a system;
or, in step S11, performing primary security protection on the constructed work form to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a user of a work form to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the constructed work form to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code of a user of a work form to be exported and constructed;
or, in step S11, performing first security protection on the constructed work form to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; data thereofThe protection and safety protection is realized by adopting an encryption code of a user of the work form to be exported and constructed;
or, in step S11, performing first security protection on the constructed work form to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a user of a work form to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by the system.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or/and step S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the following operations are performed on the downloaded data:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoded data II obtained in the step S1422 is realized by utilizing the decryption code of the user of the work form to be exported and constructed, and the decoded data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoded data I obtained in the step S1421 is realized by using the decryption code of the user of the work form to be exported and constructed, and decoded data II of the decoded data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoded data II obtained in the step S1422 is realized by utilizing the decryption code of the user of the work form to be exported and constructed, and the decoded data is obtained;
or, 1421, decode the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoded data I obtained in the step S1421 is realized by using the decryption code of the user of the work form to be exported and constructed, and decoded data II of the decoded data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, in step S1421, the downloaded data is implemented by using the decryption key of the user of the work form to be derived and constructed, so as to obtain the first decoded data;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, in step S1421, the downloaded data is implemented by using the decryption key of the user of the work form to be derived and constructed, so as to obtain the first decoded data;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof. In the embodiment, the encryption code of the user of the work form to be exported and constructed is the public key of the operation user, the preset encryption code of the system is the private key of the system, the preset decryption code of the system is the public key of the system, and the decryption code of the user of the work form to be exported and constructed is the private key of the operation user; the encryption code received by the system is obtained by inputting a public key of an operating user or a public key of the system into a keyword operation function of one of MD5, sha1, sha256 and sha512, the public key of the operating user and a private key of the operating user are a pair of asymmetric keys, the public key of the system and the private key of the system are a pair of asymmetric keys, the data encrypted by the private key can only be decoded by the public key, the data encrypted by the public key can only be decoded by the private key, and the encryption code received by the system is a symmetric encryption algorithm.
In a preferred embodiment of the invention, the following operations are performed on the decoded data:
s14231, performing comparison code calculation on the decoded data, where the comparison code calculation method is as follows:
wherein, the Decoded data represents the Decoded data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
n represents the total number of times the keyword operation function is performed at step S142 or S144;
the Contrast code represents a comparison code calculated by a keyword operation function;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data into a constructed work form;
if the comparison code is not consistent with the search word, the downloaded data is re-decoded.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional code array, namelyWherein,x is a positive integer less than or equal to X, Y is a positive integer less than or equal to Y, X represents the total number of rows in the two-dimensional code array, Y represents the total number of columns in the two-dimensional code array, PX,YRepresenting a two-dimensional code array when px,yWhen the number is equal to 1, the two-dimensional code of the search word is a black square, and when the number is p, the two-dimensional code of the search word is a black squarex,yWhen the number is equal to 0, the two-dimensional code of the search word is a white square, Qx,yRepresenting a search term two-dimensional code;
s1443, converting the two-dimensional code array into a one-dimensional array, PX*Y′=(p1′ p2′ p3′ … pX*Y') denotes a one-dimensional array, i.e. p1′=p1,1,p2′=p1,2,p3′=p1,3,……,pY′=p1,Y;
pY+1′=p2,1,pY+2′=p2,2,pY+3′=p2,3,……,p2*Y′=p2,Y;
p2*Y+1′=p3,1,p2*Y+2′=p3,2,p2*Y+3′=p3,3,……,p3*Y′=p3,Y;
p3*Y+1′=p4,1,p3*Y+2′=p4,2,p3*Y+3′=p4,3,……,p4*Y′=p4,Y;
p(X-1)*Y+1′=pX,1,p(X-1)*Y+2′=pX,2,p(X-1)*Y+3′=pX,3,……,pX*Y′=pX,Y(ii) a Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words; the characters comprise numeric characters 0-9, or/and upper-case characters A-Z, or/and lower-case characters a-Z.
S1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into the two-dimensional code and displaying the two-dimensional code on a download page. For example, assume that its search term ishttp://www.cnipa.gov.cn(ii) a The search term http:// www.cnipa.gov.cn is converted by a two-dimensional code converter to obtain the search term two-dimensional code shown in FIG. 2, wherein the search term two-dimensional code is 29 × 29 squares. The two-dimensional code array shown in fig. 2 is converted into a one-dimensional array, and since one row of the one-dimensional array has 841 squares, only the first two rows of the two-dimensional code of the search term shown in fig. 2 form the one-dimensional array shown in fig. 3. To search the wordhttp://www.cnipa.gov.cnSequentially filling element positions equal to 0 in the one-dimensional array shown in fig. 3; after filling as shown in fig. 4. Then randomly filling the numeric characters 0-9, the capital characters A-Z and the lowercase characters a-Z into the element positions which are equal to 1 and are filled in the search words; as shown in fig. 5. The filled characters are extracted in turn to obtain the filling array corresponding to the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn and the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn, as shown in FIG. 6. The filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovv 1.cn is converted by a two-dimensional code converter, and the filled character two-dimensional code shown in FIG. 7 is obtained. The character-filled two-dimensional code shown in fig. 7 is displayed on a download page.
S1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading. Scanning the two-dimensional code shown in the figure 7 and displayed on the download page by using a two-dimensional code scanner to obtain a scanning character a09 mAeHhtTtp:/xXe/wGIwSFLwswjj7w.cnispnMqa 3. rrdYgdovv 1. cn; filling the scanning character a09 mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnisnMqa3. rrdYgdovv 1.cn into the filling array in sequence as shown in FIG. 6, extracting the characters filled in the white squares as shown in FIG. 5, and obtaining the search word http:// www.cnipa.gov.cn; and rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval word http:// www.cnipa.gov.cn for downloading.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (8)
1. A big data form modeling generation method for government affairs business is characterized by comprising the following steps:
s1, self-defining page layout, dragging one or any combination of basic controls, container controls and templates, editing control field names, and constructing a multi-dimensional government business form in a system according to an actual working form; in step S1, performing form protection on the built work form, where the form protection method includes the following steps:
s11, performing first safety protection on the constructed work form to obtain first safety protection data, and recording the first safety protection data as A1(ii) a Recording the constructed work form for the first safety protection as A0;
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2;
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
s14, exporting the security data to be exported in the step S13; exporting the security data to be exported in the step S13, and storing the security data in the desktop, and performing the following operations on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; returning to step S143;
s2, setting basic properties, binding data sources and setting related rules for the form control;
s3, setting form events including one or any combination of page loading events, click events and change events, triggering operation rules through the events, and realizing the basic operation of the multi-dimensional government affair form.
2. The big data form modeling generation method for government affairs business according to claim 1, wherein the S1 includes:
s1-1, the basic control of the self-defined form page layout comprises one or any combination of a text box, multi-line text, a button, a pull-down selection, a check box, a radio box, a date selector, a hyperlink, file uploading, picture uploading, a dynamic comment bar, a static comment bar and WPS; the container control comprises one or any combination of tables, sections, repeated tables and repeated sections; the template stores a form which is custom designed by a user; the form control is dragged to an editing page, so that form element selection is completed;
s1-2, inputting a text in the editing page, dragging the page control, and completing the position transformation of each field of the form;
or/and said S2 comprises:
s2-1, setting attributes including one or any combination of domain attributes, control attributes and styles according to the form control types;
s2-2, setting the data source attribute of the form control, and completing the link of the control and the data storage path;
s2-3, setting operation rules and completing the association between form controls;
s2-4, setting verification and format rules to complete the verification of the form control content;
or/and said S3 comprises: selecting one or any combination of event operations of clicking, text changing, value inputting, value deleting, button pressing, mouse releasing, mouse moving in and mouse moving out, then customizing the event conditions, and completing the control event setting.
3. The big data form modeling generation method for government affairs business according to claim 2, wherein the S1 further includes: the user-defined form is exported to be a form template, the form template is stored in the system in a form control mode, and form design is completed quickly by dragging the template control.
4. The big data form modeling generation method for government affairs business according to claim 2, wherein the domain attributes include: field alias, field identification, field type, or any combination thereof.
5. The big data form modeling generation method for government affairs business according to claim 2, wherein the control attributes include: control type, default, placeholder, data format, must fill selection, read only selection, or any combination.
6. The big data form modeling generation method for government affairs business according to claim 2, wherein the style includes: and the control width, the font color, the font size and the font weight are one or any combination.
7. The big data form modeling generation method for government affairs business according to claim 1, wherein in step S11, the built work form is firstly secured to obtain the first security data thereof, and the first security method is implemented by the encrypted code of the user who wants to export the built work form.
8. The big data form modeling generation method for government affairs business according to claim 1, wherein in step S142 or S144, the search term is obtained by:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the two-dimensional code of the search term obtained in the step S1441 into a two-dimensional code array PX,Y;
S1443, converting the two-dimensional code array into a one-dimensional array PX*Y′=(p1′ p2′ p3′ … pX*Y') to a host; namely, it is
Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' denotes the 1 st element from left to right in a one-dimensional array, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in a one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words;
s1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into a character two-dimensional code and displaying the character two-dimensional code on a download page;
s1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval words, and downloading.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110756565.2A CN113377352B (en) | 2021-07-05 | 2021-07-05 | Big data form modeling generation method for government affair business |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110756565.2A CN113377352B (en) | 2021-07-05 | 2021-07-05 | Big data form modeling generation method for government affair business |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113377352A CN113377352A (en) | 2021-09-10 |
CN113377352B true CN113377352B (en) | 2022-03-25 |
Family
ID=77580857
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110756565.2A Active CN113377352B (en) | 2021-07-05 | 2021-07-05 | Big data form modeling generation method for government affair business |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113377352B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117252180B (en) * | 2023-11-16 | 2024-02-23 | 太平金融科技服务(上海)有限公司 | Report generation method and device, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593476A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage |
CN107944527A (en) * | 2017-11-06 | 2018-04-20 | 中国东方电气集团有限公司 | A kind of encryption of anti-fake two-dimension code and coding/decoding method |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100313182A1 (en) * | 2009-06-05 | 2010-12-09 | Microsoft Corporation | Extensible user interface generation |
US8464229B2 (en) * | 2009-12-29 | 2013-06-11 | Microgen Aptitude Limited | Creation of form-based software application in a graphical user interface (GUI) environment |
CN105069074B (en) * | 2015-07-30 | 2018-11-20 | 江苏天联信息科技发展有限公司 | policy configuration file processing method, device and system |
CN110457669A (en) * | 2016-11-07 | 2019-11-15 | 特力惠信息科技股份有限公司 | The sheet disposal method and system based on B/S framework for facilitating service logic to control |
CN107807913A (en) * | 2017-11-16 | 2018-03-16 | 金航数码科技有限责任公司 | A kind of form design system and method based on web |
CN108920141A (en) * | 2018-07-02 | 2018-11-30 | 广东飞企互联科技股份有限公司 | The Automatic Typesetting generation method and generator of business form based on layout templates |
CN110264174A (en) * | 2019-06-19 | 2019-09-20 | 农业部沼气科学研究所 | A kind of interconnection method of enterprise and bank |
CN112668290A (en) * | 2020-12-28 | 2021-04-16 | 珠海新华通软件股份有限公司 | Dynamic form generation method and system based on gridding design |
-
2021
- 2021-07-05 CN CN202110756565.2A patent/CN113377352B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593476A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage |
CN107944527A (en) * | 2017-11-06 | 2018-04-20 | 中国东方电气集团有限公司 | A kind of encryption of anti-fake two-dimension code and coding/decoding method |
Non-Patent Citations (1)
Title |
---|
云计算中加密数据的模糊关键字搜索方法;杜军强 等;《计算机工程与应用》;20130709;第51卷(第05期);第146-152+227页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113377352A (en) | 2021-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Conti et al. | A visual study of primitive binary fragment types | |
US7640269B2 (en) | Image processing system and image processing method | |
CN101627620B (en) | Electronic document encryption system, decoding system, and method | |
CN106161006B (en) | Digital encryption algorithm | |
JP3997198B2 (en) | Image processing system and image processing method | |
EP1455284A2 (en) | Image processing method and image processing system | |
CN103917980A (en) | Apparatus and methods for obtaining a password hint | |
WO2021169502A1 (en) | A pixel image as well as its processing method and application system | |
CN107735783A (en) | Method and apparatus for searching for image | |
CN114842483A (en) | Standard file information extraction method and system based on neural network and template matching | |
US10872105B2 (en) | Method to identify and extract fragments among large collections of digital documents using repeatability and semantic information | |
CN113377352B (en) | Big data form modeling generation method for government affair business | |
CN104090793A (en) | Device and method for destroying Android mobile phone body data | |
Kumar et al. | Recent trends in text steganography with experimental study | |
CN116089984B (en) | Anti-disclosure management method and system for administrative files | |
JP2009048621A (en) | Data providing device, data providing method and program | |
CN113377351B (en) | Model construction work system for large-scale government affair business | |
Alsuhibany | Developing a visual cryptography tool for Arabic text | |
CN113362042B (en) | Government affair service integrated management workflow design modeling method | |
Sahu et al. | Encryption in QR code using stegnography | |
Choche et al. | A methodology to conceal QR codes for security applications | |
JP2005149097A (en) | Image processing system and image processing method | |
Fernau et al. | Regulated array grammars of finite index | |
CN114928437B (en) | Encryption method, device, equipment and storage medium | |
JP2012203483A (en) | Business form preparation system, business form preparation method, and business form preparation program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |