CN113537913A - High-security enterprise information management system and method - Google Patents

High-security enterprise information management system and method Download PDF

Info

Publication number
CN113537913A
CN113537913A CN202010299860.5A CN202010299860A CN113537913A CN 113537913 A CN113537913 A CN 113537913A CN 202010299860 A CN202010299860 A CN 202010299860A CN 113537913 A CN113537913 A CN 113537913A
Authority
CN
China
Prior art keywords
data
database
random variable
enterprise
staff
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010299860.5A
Other languages
Chinese (zh)
Inventor
张文辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Liyun Network Technology Co ltd
Original Assignee
Shanghai Liyun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Liyun Network Technology Co ltd filed Critical Shanghai Liyun Network Technology Co ltd
Priority to CN202010299860.5A priority Critical patent/CN113537913A/en
Publication of CN113537913A publication Critical patent/CN113537913A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a high-security enterprise information management system and a method, which relate to the technical field of information management, and the system comprises: the databases are used for storing and inputting data generated by production flow, logistics, fund flow, management flow and employee workflow of an enterprise; the data acquisition device is used for screening important data corresponding to each database part of the enterprise, acquiring corresponding information of the data, and formulating corresponding periodic standard values for the acquired data; the data encryption device is used for encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the intelligent management system has the advantages of high safety, high intelligent degree and high management efficiency.

Description

High-security enterprise information management system and method
Technical Field
The invention relates to the technical field of information management, in particular to a high-security enterprise information management system and method.
Background
At present, in the process from new product development establishment to final product batch production, a plurality of information including development demand information, product design information, project process files and the like are generated in each business link of some enterprises, and the resource sharing and the cooperative work of the enterprises are hindered under the condition that the information is dispersedly managed and is respectively administrative at present. The technical data signing, issuing and project management are all performed manually, and the conditions that the working condition is opaque, untimely, the design quality is uncontrollable and the like are gradually displayed in a manual operation mode. The file management of enterprises has the following problems: all the data are stored in the shared folders named by the names of the data, and the accuracy of the data cannot be controlled; the data is not managed in different categories, and is very difficult to check; the naming mode of the data is random, the data cannot be judged from the name, and the file must be opened for checking; project process files and technical files are not complete, and many are complete data for dealing with inspection; the electronic file after the design change has no version management, and the paper file has version control, but the tracing of old version data is relatively difficult, and new and old version comparison is not available. Difficulty in forming knowledge bases; the data security is difficult to guarantee, the data in the shared file can be deleted at will, although the file is provided with the encryption software, the file encrypted by the encryption software can be downloaded on the network to decipher the software.
In the process of project development, the progress of the project is not controlled strictly according to the planned time nodes. And due to the lack of performance management data support, the examination process is checked manually, and the personal factors may lack fairness.
Meanwhile, the enterprise data is related to high security, and strict secrecy is required. A simple data management system is difficult to meet the requirement.
Disclosure of Invention
In view of this, the present invention provides a high-security enterprise information management system and method, which have the advantages of high security, high intelligence degree, and high management efficiency.
In order to achieve the purpose, the invention adopts the following technical scheme:
a high security enterprise information management method, the method performing the steps of:
step 1: establishing a level database for the production flow, the logistics, the fund flow, the management flow and the employee workflow of an enterprise correspondingly;
step 2: screening important data corresponding to each database part of an enterprise, collecting corresponding information of the data, and formulating corresponding periodic standard values for the collected data;
and step 3: encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the method for encrypting the standard value comprises the following steps: generating a key, generating a core random variable, and connecting a predetermined number of the core random variables to generate a first random variable; carrying out data fusion between a standard value and the first random variable to generate intermediate data; and performing data scrambling processing on the intermediate data in each cycle based on the first random variable, the second random variable and the key, wherein in the data scrambling processing: performing, for each cycle, table conversion for converting a conversion table for converting data obtained by equally dividing a plaintext by the predetermined number, based on the first random variable and the second random variable, and generating a conversion table for converting data obtained by equally dividing a plaintext by the predetermined number; storing the transformation table in a transformation table storage unit; and performing data conversion processing on the intermediate data for each cycle, based on the key and the transformation table stored in the transformation table storage unit, for each data obtained by equally dividing the intermediate data by the predetermined number.
And 4, step 4: comparing the standard value of each work in the database with the corresponding work data of the staff, and judging the periodicity and volatility of the work of the staff;
and 5: the standard values recorded in the databases are adjusted upwards according to the increasing speed of the same technical level in the same industry in the period;
step 6: the working requirements of the staff are regularly adjusted according to the up-adjustment standard value, the pressure resistance of the staff is judged according to the qualification rate, the efficiency and the staff mobility of the staff, and the acceleration of the working data of the staff is planned;
and 7: data in the database is archived periodically, and the archived data is compared and the same data is purged.
Further, in the step 1: the database corresponding to the production flow, the logistics, the fund flow and the management flow sequentially records various data generated when the whole enterprise works according to time, and the database corresponding to the employee workflow records the work data of employees in each industry.
Further, in the step 2: the important data of production flow comprises equipment efficiency, time, number of people and loss of equipment in the process, the important data of logistics comprises flow data of products, the important data of fund flow comprises change and flow direction of enterprise funds, and the important data of management flow comprises flow data of personnel
A high security enterprise information management system, the system comprising: the databases are used for storing and inputting data generated by production flow, logistics, fund flow, management flow and employee workflow of an enterprise; the data acquisition device is used for screening important data corresponding to each database part of the enterprise, acquiring corresponding information of the data, and formulating corresponding periodic standard values for the acquired data; the data encryption device is used for encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the data analysis device is used for comparing the standard value of each work in the database with the corresponding employee work data and judging the periodicity and volatility of the work of the employees; the data recording device is used for adjusting the standard value recorded in each database up according to the increasing speed of the same technical level in the same industry in a period; the data calculation device is used for regularly increasing the working requirements of the staff according to the increasing standard value, judging the pressure resistance of the staff according to the qualification rate, the efficiency and the staff mobility of the staff and planning the speed increase of the working data of the staff; and the data cleaning device is used for periodically archiving the data in the database, comparing the archived data and cleaning the same data.
Specifically, the data encryption device includes: a random variable generation unit that generates one key, generates one core random variable, and generates a first random variable by connecting a predetermined number of the core random variables; a plaintext data fusion unit that performs data fusion between the plaintext and the first random variable to generate intermediate data; and a data scramble unit that performs data scramble processing on the intermediate data for each cycle based on the first random variable, the second random variable, and the key, the data scramble unit including: a conversion table storage unit that stores, for each round, one conversion table for converting data obtained by equally dividing a plaintext by the predetermined number; a transformation table transformation unit configured to generate one transformation table by performing table transformation for transforming the transformation table based on the first random variable and the second random variable for each cycle; a transformation table storage unit for storing the transformation table; and a data conversion unit that performs data conversion processing on the intermediate data for each cycle, the intermediate data being divided into equal parts by the predetermined number, based on the key and the transformation table stored in the transformation table storage unit.
Compared with the prior art, the invention has the following beneficial effects: the invention can ensure the safety of the data by inputting the data into the database and encrypting the data input into the database. Meanwhile, the encryption mode of the invention adopts a data scrambling mode to encrypt, and the cracking difficulty is higher. The whole enterprise data management process is automatically realized through the system, so that the complexity of data management is reduced, and the complexity of manual management is reduced.
Drawings
The invention is described in further detail below with reference to the following figures and detailed description:
fig. 1 is a schematic method flow diagram of a high-security enterprise information management method according to an embodiment of the present invention.
Fig. 2 is a schematic system structure diagram of a high-security enterprise information management system according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
Please refer to fig. 1. It should be understood that the structures, ratios, sizes, and the like shown in the drawings and described in the specification are only used for matching with the disclosure of the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions of the present invention, so that the present invention has no technical significance. In addition, the terms such as "upper", "lower", "left", "right", "middle" and "one" used in the present specification are for clarity of description, and are not intended to limit the scope of the present invention, and changes or modifications in the relative relationship may be made without substantial technical changes and modifications.
Example 1
A high security enterprise information management method, the method performing the steps of:
step 1: establishing a level database for the production flow, the logistics, the fund flow, the management flow and the employee workflow of an enterprise correspondingly;
step 2: screening important data corresponding to each database part of an enterprise, collecting corresponding information of the data, and formulating corresponding periodic standard values for the collected data;
and step 3: encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the method for encrypting the standard value comprises the following steps: generating a key, generating a core random variable, and connecting a predetermined number of the core random variables to generate a first random variable; carrying out data fusion between a standard value and the first random variable to generate intermediate data; and performing data scrambling processing on the intermediate data in each cycle based on the first random variable, the second random variable and the key, wherein in the data scrambling processing: performing, for each cycle, table conversion for converting a conversion table for converting data obtained by equally dividing a plaintext by the predetermined number, based on the first random variable and the second random variable, and generating a conversion table for converting data obtained by equally dividing a plaintext by the predetermined number; storing the transformation table in a transformation table storage unit; and performing data conversion processing on the intermediate data for each cycle, based on the key and the transformation table stored in the transformation table storage unit, for each data obtained by equally dividing the intermediate data by the predetermined number.
And 4, step 4: comparing the standard value of each work in the database with the corresponding work data of the staff, and judging the periodicity and volatility of the work of the staff;
and 5: the standard values recorded in the databases are adjusted upwards according to the increasing speed of the same technical level in the same industry in the period;
step 6: the working requirements of the staff are regularly adjusted according to the up-adjustment standard value, the pressure resistance of the staff is judged according to the qualification rate, the efficiency and the staff mobility of the staff, and the acceleration of the working data of the staff is planned;
and 7: data in the database is archived periodically, and the archived data is compared and the same data is purged.
Specifically, the data is recorded into the database, and the data recorded into the database is encrypted, so that the safety of the data is ensured. Meanwhile, the encryption mode of the invention adopts a data scrambling mode to encrypt, and the cracking difficulty is higher. The whole enterprise data management process is automatically realized through the system, so that the complexity of data management is reduced, and the complexity of manual management is reduced.
Example 2
On the basis of the above embodiment, in the step 1: the database corresponding to the production flow, the logistics, the fund flow and the management flow sequentially records various data generated when the whole enterprise works according to time, and the database corresponding to the employee workflow records the work data of employees in each industry.
Specifically, a database is a repository where data is stored. The storage space is large, and millions, millions and hundreds of millions of data can be stored. However, the database does not store data randomly, and has certain rules, otherwise, the query efficiency is low. The world today is an internet world that is full of data, which is flooded with large amounts of data. I.e. the internet world is the data world. The sources of data are many, such as travel records, consumption records, web pages viewed, messages sent, and so forth. In addition to text type data, images, music, and sounds are data.
Example 3
On the basis of the above embodiment, in step 2: the important data of the production flow comprises the efficiency of equipment, time, number of people and loss of equipment in the process, the important data of the logistics comprises the flow data of products, the important data of the fund flow comprises the change and flow direction of enterprise funds, and the important data of the management flow comprises the flow data of personnel.
Specifically, in the development history of databases, databases have been developed in various stages such as hierarchical databases, mesh databases, and relational databases, and database technologies have been developed rapidly in various aspects. Particularly, the relational database has become the most important member of the database products at present, and since the 80 s, almost all database products newly produced by database manufacturers support the relational database, and even some non-relational database products almost have interfaces supporting the relational database. The problem of managing and storing the relational data can be well solved by the traditional relational database. With the development of cloud computing and the arrival of the big data era, relational databases are increasingly unable to meet the requirements, mainly because more and more semi-relational and non-relational data need to be stored and managed by databases, and meanwhile, new technologies such as distributed technologies also put new requirements on the database technologies, so more and more non-relational databases begin to appear, which are greatly different from the traditional relational databases in design and data structure, and emphasize the high concurrency of reading and writing of database data and the storage of big data, and the databases are generally called as nosql (not only sql) databases. Traditional relational databases still remain powerful in some traditional fields.
Example 4
A high security enterprise information management system, the system comprising: the databases are used for storing and inputting data generated by production flow, logistics, fund flow, management flow and employee workflow of an enterprise; the data acquisition device is used for screening important data corresponding to each database part of the enterprise, acquiring corresponding information of the data, and formulating corresponding periodic standard values for the acquired data; the data encryption device is used for encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the data analysis device is used for comparing the standard value of each work in the database with the corresponding employee work data and judging the periodicity and volatility of the work of the employees; the data recording device is used for adjusting the standard value recorded in each database up according to the increasing speed of the same technical level in the same industry in a period; the data calculation device is used for regularly increasing the working requirements of the staff according to the increasing standard value, judging the pressure resistance of the staff according to the qualification rate, the efficiency and the staff mobility of the staff and planning the speed increase of the working data of the staff; and the data cleaning device is used for periodically archiving the data in the database, comparing the archived data and cleaning the same data.
Specifically, most companies only know to reformat their hard disks with commands such as Format, Fdisk, Delete, etc., but they simply transfer the information from the pointer to the file without knowing that the commands will not be deleted at all, and can resume the process by simply starting a simple command. Some companies have realized this but they generally have taken the approach of destroying old hard disks or demagnetizing them with demagnetizers, and Blacco, finland offers a complete, secure and efficient data clearing software solution for specialized erasure data services. Obtain numerous international organization certificates and support a plurality of devices.
Removable media devices are diskettes, flash memory devices, CDs, and DVDs. When the device is cleared, there should be no residual data on it, and even advanced forensic tools cannot recover any data. The clean-up technique may be a specific piece of software that erases the data, a specific device that is connected to store and erase the data, or a process that physically destroys the medium so that the data cannot be recovered from the storage device.
The method is to establish a data clearing strategy as a supplement of a data storage strategy. Data retention policies and procedures have clear requirements in many laws in the united states, such as the sabain act (SOX) and the health insurance circulation and accountability act (HIPAA). Although data purging is not explicitly mentioned in these and other jurisdictions, this strategy can ensure that content on an unused device or medium has been securely deleted, destroyed, or overwritten, from which it becomes very difficult or impossible to retrieve valuable data. Data purging policies can also reduce the likelihood of data and privacy disclosure, thereby reducing the risks that an enterprise may face.
Example 5
On the basis of the above embodiment, the data encryption apparatus includes: a random variable generation unit that generates one key, generates one core random variable, and generates a first random variable by connecting a predetermined number of the core random variables; a plaintext data fusion unit that performs data fusion between the plaintext and the first random variable to generate intermediate data; and a data scramble unit that performs data scramble processing on the intermediate data for each cycle based on the first random variable, the second random variable, and the key, the data scramble unit including: a conversion table storage unit that stores, for each round, one conversion table for converting data obtained by equally dividing a plaintext by the predetermined number; a transformation table transformation unit configured to generate one transformation table by performing table transformation for transforming the transformation table based on the first random variable and the second random variable for each cycle; a transformation table storage unit for storing the transformation table; and a data conversion unit that performs data conversion processing on the intermediate data for each cycle, the intermediate data being divided into equal parts by the predetermined number, based on the key and the transformation table stored in the transformation table storage unit.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional units, and in practical applications, the functions may be distributed by different functional units according to needs, that is, the units or steps in the embodiments of the present invention are further decomposed or combined, for example, the units in the foregoing embodiment may be combined into one unit, or may be further decomposed into multiple sub-units, so as to complete all or part of the functions described above. The names of the units and steps involved in the embodiments of the present invention are only for distinguishing the units or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage unit and the processing unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative elements, method steps, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the software elements, method steps, and corresponding programs may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus/unit.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (5)

1. A high-security enterprise information management method is characterized by comprising the following steps:
step 1: establishing a level database for the production flow, the logistics, the fund flow, the management flow and the employee workflow of an enterprise correspondingly;
step 2: screening important data corresponding to each database part of an enterprise, collecting corresponding information of the data, and formulating corresponding periodic standard values for the collected data;
and step 3: encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the method for encrypting the standard value comprises the following steps: generating a key, generating a core random variable, and connecting a predetermined number of the core random variables to generate a first random variable; carrying out data fusion between a standard value and the first random variable to generate intermediate data; and performing data scrambling processing on the intermediate data in each cycle based on the first random variable, the second random variable and the key, wherein in the data scrambling processing: performing, for each cycle, table conversion for converting a conversion table for converting data obtained by equally dividing a plaintext by the predetermined number, based on the first random variable and the second random variable, and generating a conversion table for converting data obtained by equally dividing a plaintext by the predetermined number; storing the transformation table in a transformation table storage unit; and performing data conversion processing on the intermediate data for each cycle, based on the key and the transformation table stored in the transformation table storage unit, for each data obtained by equally dividing the intermediate data by the predetermined number.
And 4, step 4: comparing the standard value of each work in the database with the corresponding work data of the staff, and judging the periodicity and volatility of the work of the staff;
and 5: the standard values recorded in the databases are adjusted upwards according to the increasing speed of the same technical level in the same industry in the period;
step 6: the working requirements of the staff are regularly adjusted according to the up-adjustment standard value, the pressure resistance of the staff is judged according to the qualification rate, the efficiency and the staff mobility of the staff, and the acceleration of the working data of the staff is planned;
and 7: data in the database is archived periodically, and the archived data is compared and the same data is purged.
2. The method of claim 2, wherein in step 1: the database corresponding to the production flow, the logistics, the fund flow and the management flow sequentially records various data generated when the whole enterprise works according to time, and the database corresponding to the employee workflow records the work data of employees in each industry.
3. The method of claim 2, wherein in step 2: the important data of the production flow comprises the efficiency of equipment, time, number of people and loss of equipment in the process, the important data of the logistics comprises the flow data of products, the important data of the fund flow comprises the change and flow direction of enterprise funds, and the important data of the management flow comprises the flow data of personnel.
4. A highly secure enterprise information management system according to the method of any one of claims 1 to 3, said system comprising: the databases are used for storing and inputting data generated by production flow, logistics, fund flow, management flow and employee workflow of an enterprise; the data acquisition device is used for screening important data corresponding to each database part of the enterprise, acquiring corresponding information of the data, and formulating corresponding periodic standard values for the acquired data; the data encryption device is used for encrypting the standard values, correspondingly inputting the encrypted data into a corresponding database, and importing the employee work data of different jobs in the enterprise employee workflow into the corresponding database; the data analysis device is used for comparing the standard value of each work in the database with the corresponding employee work data and judging the periodicity and volatility of the work of the employees; the data recording device is used for adjusting the standard value recorded in each database up according to the increasing speed of the same technical level in the same industry in a period; the data calculation device is used for regularly increasing the working requirements of the staff according to the increasing standard value, judging the pressure resistance of the staff according to the qualification rate, the efficiency and the staff mobility of the staff and planning the speed increase of the working data of the staff; and the data cleaning device is used for periodically archiving the data in the database, comparing the archived data and cleaning the same data.
5. The system of claim 4, wherein the data encryption device comprises: a random variable generation unit that generates one key, generates one core random variable, and generates a first random variable by connecting a predetermined number of the core random variables; a plaintext data fusion unit that performs data fusion between the plaintext and the first random variable to generate intermediate data; and a data scramble unit that performs data scramble processing on the intermediate data for each cycle based on the first random variable, the second random variable, and the key, the data scramble unit including: a conversion table storage unit that stores, for each round, one conversion table for converting data obtained by equally dividing a plaintext by the predetermined number; a transformation table transformation unit configured to generate one transformation table by performing table transformation for transforming the transformation table based on the first random variable and the second random variable for each cycle; a transformation table storage unit for storing the transformation table; and a data conversion unit that performs data conversion processing on the intermediate data for each cycle, the intermediate data being divided into equal parts by the predetermined number, based on the key and the transformation table stored in the transformation table storage unit.
CN202010299860.5A 2020-04-16 2020-04-16 High-security enterprise information management system and method Pending CN113537913A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010299860.5A CN113537913A (en) 2020-04-16 2020-04-16 High-security enterprise information management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010299860.5A CN113537913A (en) 2020-04-16 2020-04-16 High-security enterprise information management system and method

Publications (1)

Publication Number Publication Date
CN113537913A true CN113537913A (en) 2021-10-22

Family

ID=78088434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010299860.5A Pending CN113537913A (en) 2020-04-16 2020-04-16 High-security enterprise information management system and method

Country Status (1)

Country Link
CN (1) CN113537913A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101147182A (en) * 2005-03-31 2008-03-19 松下电器产业株式会社 Data encryption device and data encryption method
CN103778202A (en) * 2014-01-10 2014-05-07 江苏哲勤科技有限公司 Enterprise electronic document managing server side and system
CN110457286A (en) * 2019-06-27 2019-11-15 安徽鸿途创智图文快印有限公司 A kind of digital printing enterprise information management method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101147182A (en) * 2005-03-31 2008-03-19 松下电器产业株式会社 Data encryption device and data encryption method
CN103778202A (en) * 2014-01-10 2014-05-07 江苏哲勤科技有限公司 Enterprise electronic document managing server side and system
CN110457286A (en) * 2019-06-27 2019-11-15 安徽鸿途创智图文快印有限公司 A kind of digital printing enterprise information management method

Similar Documents

Publication Publication Date Title
US20110202774A1 (en) System for Collection and Longitudinal Analysis of Anonymous Student Data
US8229938B2 (en) Systems and methods for correlating meta-data model representations and asset-logic model representations
US10679230B2 (en) Associative memory-based project management system
CN102508833A (en) Data monitoring device and data monitoring method
CA2793400C (en) Associative memory-based project management system
Rifaie et al. Data warehouse architecture and design
US7904489B2 (en) Database unload/reload of partitioned tables
Ukanah et al. Blockchain application in healthcare
CN113537913A (en) High-security enterprise information management system and method
CN115796764A (en) Loan archive management method, system and terminal based on block chain and IPFS
US20210303603A1 (en) Data processing systems for generating and populating a data inventory
Ivkovic et al. HyperETL: Facilitating Data Analysis of Private Blockchain
Rifaie et al. Data modelling for effective data warehouse architecture and design
Mumma et al. A First Look at the Acquisition and Appraisal of the 2010 Olympic and Paralympic Winter Games Fonds: or, SELECT* FROM VANOC _Records AS Archives WHERE Value=“true”
Gillespie et al. Understanding Log Analytics at Scale
CN103366129A (en) Data file control and management system and method base on network
Van Bussel et al. Digital Archiving and e-Discovery: Delivering evidence in an age of overload
Ryazanova The blockchain technology in scientific and information activities
Rodero et al. The Audit of the Data Warehouse Framework.
CN116523171B (en) Data asset management method and system based on full life cycle management
Afify et al. Applying Machine Learning for Securing Data Storage Using Random DNA Sequences and Pseudo-Random Sequence Generators
Englbrecht et al. Supporting Process Mining with Recovered Residual Data
Dimisyqiyani et al. Using Archival Information System for Effective Retrieval of Document
Mathew et al. A water utility industry conceptual asset management data warehouse model
Oktavia IMPLEMENTING DATA WAREHOUSE AS A FOUNDATION FOR DECISION SUPPORT SYSTEM (PERSPECTIVE: TECHNICAL AND NONTECHNICAL FACTORS).

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination