CN114896314A - Method for dynamically accessing WMS - Google Patents

Method for dynamically accessing WMS Download PDF

Info

Publication number
CN114896314A
CN114896314A CN202210387737.8A CN202210387737A CN114896314A CN 114896314 A CN114896314 A CN 114896314A CN 202210387737 A CN202210387737 A CN 202210387737A CN 114896314 A CN114896314 A CN 114896314A
Authority
CN
China
Prior art keywords
wms
data
acquiring
configuration
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210387737.8A
Other languages
Chinese (zh)
Inventor
定明洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quandou Digital Technology Co ltd
Original Assignee
Quandou Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quandou Digital Technology Co ltd filed Critical Quandou Digital Technology Co ltd
Priority to CN202210387737.8A priority Critical patent/CN114896314A/en
Publication of CN114896314A publication Critical patent/CN114896314A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for dynamically accessing WMS, which comprises the following steps: acquiring configuration items between the ERP and a plurality of WMSs, constructing a WMS configuration list, and storing the configuration items and the configuration list to a cloud database; acquiring a user access request, wherein the user access request comprises a WMS number to be accessed and a data access request; inquiring a WMS configuration list from a cloud database according to the WMS number, acquiring the associated information of the WMS, and acquiring a configuration item of the WMS according to the associated information, wherein the WMS configuration list comprises a plurality of associated information; accessing the WMS according to the configuration item, and acquiring corresponding data according to the data access request to obtain feedback data, wherein the feedback data is encrypted data; and decrypting the feedback data to obtain plaintext data of the feedback data, and finishing the dynamic WMS access process. The invention can dynamically configure the WMS, improves the efficiency of docking the WMS and reduces the development cost of docking software in the prior art.

Description

Method for dynamically accessing WMS
Technical Field
The invention belongs to the technical field of information processing, and particularly relates to a method for dynamically accessing a WMS.
Background
Currently, many companies use an ERP (Enterprise Resource Planning) System to interface with a plurality of third-party WMSs (Warehouse Management systems). Since the technology of each third-party WMS is different, when a new third-party WMS is docked, the technical scenario of the third-party WMS needs to be adapted accordingly.
However, each time a new third-party WMS is docked, the third-party WMS needs to be adapted, which results in a problem that the system docking period is long.
Disclosure of Invention
Aiming at the defects in the prior art, the method for dynamically accessing the WMS provided by the invention solves the problems in the prior art.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a method of dynamically accessing a WMS, comprising:
acquiring configuration items between the ERP and a plurality of WMSs, constructing a WMS configuration list, and storing the configuration items and the configuration list to a cloud database;
acquiring a user access request, wherein the user access request comprises a WMS number to be accessed and a data access request;
inquiring a WMS configuration list from a cloud database according to the WMS number, acquiring associated information of the WMS, and acquiring a configuration item of the WMS according to the associated information, wherein the WMS configuration list comprises a plurality of associated information, and the associated information comprises the WMS number and a configuration item identifier corresponding to the WMS number;
accessing the WMS according to the configuration item, and acquiring corresponding data according to the data access request to obtain feedback data, wherein the feedback data is encrypted data;
and decrypting the feedback data to obtain plaintext data of the feedback data, and finishing the dynamic WMS access process.
Further, the configuration items between the ERP and the WMSs at least include: a business process interface between the ERP and the WMS and a communication mode between the ERP and the WMS.
Further, the obtaining of the configuration items between the ERP and the WMSs includes:
acquiring a service process interface between the ERP and the WMS to obtain a plurality of service process interfaces;
acquiring communication modes between the ERP and the WMS to obtain a plurality of communication modes;
and carrying out duplication removal operation on the business process interface and the communication mode to obtain a plurality of configuration items, wherein each configuration item is the business process interface or the communication mode.
Further, the building of the WMS configuration list includes:
acquiring WMS numbers, server addresses and signature modes of a plurality of WMSs;
taking the WMS number as a unique identification code, and associating the WMS code with the server address, the signature mode and the configuration item identifier to obtain associated information;
and acquiring the associated information of a plurality of WMSs, and constructing a WMS configuration list according to the associated information.
Further, the querying a WMS configuration list from a cloud database according to the WMS number, obtaining the association information of the WMS, and obtaining the configuration item of the WMS according to the association information includes:
inquiring a WMS configuration list from a cloud database according to the WMS number, and acquiring associated information corresponding to the WMS number;
and acquiring the configuration item corresponding to the associated information according to the configuration item identifier in the associated information.
Further, the accessing the WMS according to the configuration item and acquiring the corresponding data according to the data access request includes:
establishing an access link between the ERP and the WMS according to the configuration item;
and acquiring corresponding data according to the data access request on the basis of the access link.
Further, the encryption process of the encrypted data includes:
setting a corresponding relation between characters and numbers, wherein the corresponding relation between the characters and the numbers comprises that one character corresponds to one number and different characters correspond to different numbers;
digitizing the plaintext data according to the corresponding relation between the characters and the numbers to obtain digitized plaintext data;
and encrypting the digital plaintext data by using the public key to obtain encrypted data.
Further, the public key is used in pair with a private key, the public key is used for encryption, and the private key is used for decryption;
the generation process of the public key and the private key comprises the following steps:
randomly selecting two prime numbers A and B, wherein A is different from B;
acquiring an encryption parameter C (A) and an encryption parameter B according to the prime number A and the prime number B;
acquiring an intermediate parameter D ═ (A-1) × (B-1) according to the prime number A and the prime number B;
generating a public key parameter E, wherein the public key parameter E and the intermediate parameter D are relatively prime, and the value range of the public key parameter E is (1, D);
generating a private key parameter F, wherein the FE is equal to 1modD, wherein equal to represents congruence, and mod represents a modular operation;
and generating a public key according to the encryption parameter C and the public key parameter E, and generating a private key according to the encryption parameter C and the private key parameter F to obtain a public key and a private key which are used in pairs, wherein the public key is (E, C), and the private key is (F, C).
Further, the encrypting the digital plaintext data by using the public key includes:
the encryption rule is set as follows: m is equal to N E mod C, where N represents the number before encryption and M represents the number after encryption;
and according to the encryption rule, sequentially encrypting the digital strings in the digital plaintext data to obtain encrypted data.
Further, the decrypting the feedback data includes:
the decryption rule is set as follows: m is N F mod C;
According to a decryption rule, sequentially decrypting the digital strings in the feedback data to obtain plaintext digital strings;
and converting the plaintext digital string into characters according to the corresponding relation between the characters and the numbers to obtain plaintext data of the feedback data.
The invention has the beneficial effects that:
(1) the method for dynamically accessing the WMS can dynamically configure the WMS, improve the efficiency of docking the WMS and reduce the development cost of docking software in the prior art.
(2) The invention can reduce the maintenance work in the later period and avoid the problems of overstaffed docking software and difficult maintenance caused by docking a plurality of WMSs.
Drawings
Fig. 1 is a flowchart of a method for dynamically accessing a WMS according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of an apparatus for dynamically accessing a WMS according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a device for dynamically accessing a WMS according to an embodiment of the present invention.
21-construction module, 22-first acquisition module, 23-second acquisition module, 24-data request module, 25-decryption module, 31-memory, 32-processor and 33-bus.
Specific embodiments of the present application have been shown by way of example in the drawings and will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined by the appended claims, and all changes that can be made by the invention using the inventive concept are intended to be protected.
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Example 1
As shown in fig. 1, a method of dynamically accessing a WMS includes:
s11, obtaining configuration items between the ERP and the WMSs, constructing a WMS configuration list, and storing the configuration items and the configuration list in a cloud database.
And S12, acquiring a user access request, wherein the user access request comprises a WMS number to be accessed and a data access request.
S13, according to the WMS number, inquiring a WMS configuration list from the cloud database, acquiring the associated information of the WMS, and acquiring the configuration item of the WMS according to the associated information, wherein the WMS configuration list comprises a plurality of associated information, and the associated information comprises the WMS number and the configuration item identification corresponding to the WMS number.
The configuration item identifier represents a name, label or identification code of the configuration item to facilitate quick lookup of the configuration item. And according to the configuration item identification corresponding to the WMS number, quickly searching the configuration item in the cloud database.
S14, accessing the WMS according to the configuration item, and acquiring corresponding data according to the data access request to obtain feedback data, wherein the feedback data are encrypted data;
and S15, decrypting the feedback data to obtain plaintext data of the feedback data, and finishing the WMS process of dynamic access.
The configuration items are placed in the cloud database through exhaustive configuration items between the ERP and the WMSs, when a new WMS is docked, the configuration items required by the WMS are directly obtained from the cloud database, namely the new WMS is docked quickly according to the obtained configuration items, and the docking efficiency of the WMS is greatly improved.
In this embodiment, the configuration items between the ERP and the WMSs at least include: a service flow interface between the ERP and the WMS and a communication mode between the ERP and the WMS.
It is worth noting that the configuration items between the ERP and the WMSs can also be other configuration items required when the WMSs are docked.
In this embodiment, the obtaining the configuration items between the ERP and the plurality of WMSs includes:
acquiring service process interfaces between the ERP and the WMS to obtain a plurality of service process interfaces;
acquiring communication modes between the ERP and the WMS to obtain a plurality of communication modes;
and carrying out duplication removal operation on the business process interface and the communication mode to obtain a plurality of configuration items, wherein each configuration item is the business process interface or the communication mode.
In this embodiment, the building a WMS configuration list includes:
acquiring WMS numbers, server addresses and signature modes of a plurality of WMSs;
taking the WMS number as a unique identification code, and associating the WMS code with the server address, the signature mode and the configuration item identifier to obtain associated information;
and acquiring the associated information of a plurality of WMSs, and constructing a WMS configuration list according to the associated information.
When ERP needs to interface a new WMS, the related information can be inquired in the WMS configuration list according to the WMS number, so that the configuration item of the WMS is obtained, and the WMS is rapidly configured.
In this embodiment, the querying, according to the WMS number, the WMS configuration list from the cloud database, obtaining the association information of the WMS, and obtaining the configuration item of the WMS according to the association information includes:
inquiring a WMS configuration list from a cloud database according to the WMS number, and acquiring associated information corresponding to the WMS number;
and acquiring the configuration item corresponding to the associated information according to the configuration item identifier in the associated information.
In this embodiment, the accessing the WMS according to the configuration item and acquiring the corresponding data according to the data access request includes:
establishing an access link between the ERP and the WMS according to the configuration item;
and acquiring corresponding data according to the data access request on the basis of the access link.
On the basis of the configuration items, the access link between the ERP and the WMS is established by the prior art, and the docking efficiency is improved. It should be noted that the WMS may be configured other than by configuration items, and the present invention provides only one idea, and is not limited to only using the configuration items.
In this embodiment, the encryption process of the encrypted data includes:
setting a corresponding relation between characters and numbers, wherein the corresponding relation between the characters and the numbers comprises that one character corresponds to one number and different characters correspond to different numbers;
digitizing the plaintext data according to the corresponding relation between the characters and the numbers to obtain digitized plaintext data;
and encrypting the digital plaintext data by using the public key to obtain encrypted data.
In this embodiment, the public key is used in pair with a private key, the public key is used for encryption, and the private key is used for decryption;
the generation process of the public key and the private key comprises the following steps:
randomly selecting two prime numbers A and B, wherein A is different from B;
acquiring an encryption parameter C (A) and an encryption parameter B according to the prime number A and the prime number B;
acquiring an intermediate parameter D ═ (A-1) × (B-1) according to the prime number A and the prime number B;
generating a public key parameter E, wherein the public key parameter E and the intermediate parameter D are relatively prime, and the value range of the public key parameter E is (1, D);
generating a private key parameter F, wherein the FE is equal to 1modD, wherein equal to represents congruence, and mod represents a modular operation;
and generating a public key according to the encryption parameter C and the public key parameter E, and generating a private key according to the encryption parameter C and the private key parameter F to obtain a public key and a private key which are used in pairs, wherein the public key is (E, C), and the private key is (F, C).
In this embodiment, the encrypting the digitized plaintext data by using the public key includes:
the encryption rule is set as follows: m is equal to N E mod C, where N represents the number before encryption and M represents the number after encryption;
and according to the encryption rule, sequentially encrypting the digital strings in the digital plaintext data to obtain encrypted data.
In this embodiment, the decrypting the feedback data includes:
the decryption rule is set as follows: m is N F mod C;
According to a decryption rule, sequentially decrypting the digital strings in the feedback data to obtain plaintext digital strings;
and converting the plaintext digital string into characters according to the corresponding relation between the characters and the numbers to obtain plaintext data of the feedback data.
Optionally, the encryption and decryption processes are exemplified here, and the details are as follows.
Suppose that: the "winter" word corresponds to the number 11, the "ao" word corresponds to the number 05, and the "hui" word corresponds to the number 25, so that the digital string corresponding to the winter aoi is {11, 05, 25 }.
Let the prime number a be 3 and the prime number B be 11, then the encryption parameter C be 33 and the intermediate parameter D be 20. Taking the public key parameter E as 3, according with the condition: the public key parameter E and the intermediate parameter D are relatively prime, and the value range of the public key parameter E is (1, D). From the relation FE ≡ 1modD, it can be derived that the private key parameter F is 7.
Thus, a public key of (3, 33) and a private key of (7, 33) can be derived.
After obtaining the public key, the digital string corresponding to the winter olympic conference is encrypted according to the public key and an encryption rule, that is, according to M ═ N E mod C calculates the digital string corresponding to the winter Olympic Commission to obtain the encrypted data of {11, 26, 16 }.
When decryption is needed, the encrypted data is decrypted through a private key and a decryption rule, namely according to the condition that N is M F mod C calculates the encrypted data to obtain a plaintext number string of {11, 05, 25 }.
And converting the plaintext digit string {11, 05, 25} into 'winter Olympic' according to the corresponding relation between the characters and the digits to obtain plaintext data of the feedback data.
The method for dynamically accessing the WMS can dynamically configure the WMS, improve the efficiency of docking the WMS and reduce the development cost of docking software in the prior art. The invention can reduce the maintenance work in the later period and avoid the problems of overstaffed docking software and difficult maintenance caused by docking a plurality of WMSs.
Example 2
As shown in fig. 2, the present embodiment provides an apparatus for dynamically accessing a WMS, which includes a building module 21, a first obtaining module 22, a second obtaining module 23, a data requesting module 24, and a decrypting module 25.
The building module 21 is configured to obtain configuration items between the ERP and the WMSs, build a WMS configuration list, and store both the configuration items and the configuration list in the cloud database;
the first obtaining module 22 is configured to obtain a user access request, where the user access request includes a WMS number to be accessed and a data access request;
the second obtaining module 23 is configured to, according to the WMS number, query a WMS configuration list from the cloud database, obtain association information of the WMS, and obtain a configuration item of the WMS according to the association information, where the WMS configuration list includes a plurality of association information, and the association information includes the WMS number and a configuration item identifier corresponding to the WMS number;
the data request module 24 is configured to access the WMS according to the configuration item, and obtain corresponding data according to the data access request, to obtain feedback data, where the feedback data is encrypted data;
the decryption module 25 is configured to decrypt the feedback data to obtain plaintext data of the feedback data, and complete a WMS procedure of dynamic access.
Optionally, the configuration items between the ERP and the WMSs at least include: a business process interface between the ERP and the WMS and a communication mode between the ERP and the WMS.
In this embodiment, the building module 21 is specifically configured to obtain the configuration items between the ERP and the multiple WMSs, and includes: acquiring a service process interface between the ERP and the WMS to obtain a plurality of service process interfaces; acquiring communication modes between the ERP and the WMS to obtain a plurality of communication modes; and carrying out duplication removal operation on the business process interface and the communication mode to obtain a plurality of configuration items, wherein each configuration item is the business process interface or the communication mode.
The building of the WMS configuration list comprises the following steps: acquiring WMS numbers, server addresses and signature modes of a plurality of WMSs; taking the WMS number as a unique identification code, and associating the WMS code with the server address, the signature mode and the configuration item identifier to obtain associated information; and acquiring the associated information of a plurality of WMSs, and constructing a WMS configuration list according to the associated information.
In this embodiment, the second obtaining module 23 is specifically configured to, according to the WMS number, query the WMS configuration list from the cloud database, obtain association information of the WMS, and obtain a configuration item of the WMS according to the association information, where the obtaining includes: inquiring a WMS configuration list from a cloud database according to the WMS number, and acquiring associated information corresponding to the WMS number; and acquiring the configuration item corresponding to the associated information according to the configuration item identifier in the associated information.
In this embodiment, the data requesting module 24 is specifically configured to access the WMS according to the configuration item and obtain corresponding data according to the data access request, and includes: establishing an access link between the ERP and the WMS according to the configuration item; and acquiring corresponding data according to the data access request on the basis of the access link.
Optionally, the encryption process of the encrypted data includes:
setting a corresponding relation between characters and numbers, wherein the corresponding relation between the characters and the numbers comprises that one character corresponds to one number and different characters correspond to different numbers; digitizing the plaintext data according to the corresponding relation between the characters and the numbers to obtain digitized plaintext data; and encrypting the digital plaintext data by using the public key to obtain encrypted data.
Optionally, the public key is used in pair with a private key, the public key is used for encryption, and the private key is used for decryption.
The generation process of the public key and the private key comprises the following steps:
two prime numbers A and B are randomly selected, wherein A is different from B.
And acquiring an encryption parameter C (A) and B according to the prime number A and the prime number B.
And acquiring an intermediate parameter D ═ (A-1) × (B-1) according to the prime number A and the prime number B.
And generating a public key parameter E, wherein the public key parameter E and the intermediate parameter D are relatively prime, and the value range of the public key parameter E is (1, D).
Generating a private key parameter F, the FE ≡ 1modD, where ≡ denotes congruence and mod denotes modulo arithmetic.
And generating a public key according to the encryption parameter C and the public key parameter E, and generating a private key according to the encryption parameter C and the private key parameter F to obtain a public key and a private key which are used in pairs, wherein the public key is (E, C), and the private key is (F, C).
Optionally, the encrypting the digitized plaintext data by using the public key includes: the encryption rule is set as follows: m is equal to N E mod C, where N represents the number before encryption and M represents the number after encryption. And according to the encryption rule, sequentially encrypting the digital strings in the digital plaintext data to obtain encrypted data.
In this embodiment, the decryption module 25 is specifically configured to decrypt the feedback data, and includes: the decryption rule is set as follows: m is N F mod C; according to a decryption rule, sequentially decrypting the digital strings in the feedback data to obtain plaintext digital strings; and converting the plaintext digital string into characters according to the corresponding relation between the characters and the numbers to obtain plaintext data of the feedback data.
The advantageous effects of this embodiment are similar to those of embodiment 1, and are not described herein again.
Example 3
As shown in fig. 3, the present embodiment provides a device for dynamically accessing a WMS, comprising a memory 31 and a processor 32, wherein the memory 31 and the processor 32 are connected to each other through a bus 33;
the memory 31 stores computer-executable instructions;
the processor 32 executes computer-executable instructions stored in the memory to cause the processor to perform the method of dynamically accessing the WMS as described in embodiment 1.
Example 4
The present embodiment provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is used for implementing the method for dynamically accessing the WMS according to embodiment 1.
Example 5
Embodiments of the present application may also provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the method for dynamically accessing a WMS according to embodiment 1 is implemented.
It should be noted that any method for obtaining the difference set using the present inventive concept should be within the scope of the present application. Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A method of dynamically accessing a WMS, comprising:
acquiring configuration items between the ERP and a plurality of WMSs, constructing a WMS configuration list, and storing the configuration items and the configuration list to a cloud database;
acquiring a user access request, wherein the user access request comprises a WMS number to be accessed and a data access request;
inquiring a WMS configuration list from a cloud database according to the WMS number, acquiring associated information of the WMS, and acquiring a configuration item of the WMS according to the associated information, wherein the WMS configuration list comprises a plurality of associated information, and the associated information comprises the WMS number and a configuration item identifier corresponding to the WMS number;
accessing the WMS according to the configuration item, and acquiring corresponding data according to the data access request to obtain feedback data, wherein the feedback data is encrypted data;
and decrypting the feedback data to obtain plaintext data of the feedback data, and finishing the dynamic WMS access process.
2. The method for dynamically accessing WMSs as claimed in claim 1, wherein the configuration between ERP and WMSs at least comprises: a business process interface between the ERP and the WMS and a communication mode between the ERP and the WMS.
3. The method for dynamically accessing WMSs as claimed in claim 2, wherein the obtaining configuration items between ERP and WMSs comprises:
acquiring a service process interface between the ERP and the WMS to obtain a plurality of service process interfaces;
acquiring communication modes between the ERP and the WMS to obtain a plurality of communication modes;
and carrying out duplication removal operation on the business process interface and the communication mode to obtain a plurality of configuration items, wherein each configuration item is the business process interface or the communication mode.
4. The method for dynamically accessing WMSs as claimed in claim 1, wherein said building a WMS configuration list comprises:
acquiring WMS numbers, server addresses and signature modes of a plurality of WMSs;
taking the WMS number as a unique identification code, and associating the WMS code with the server address, the signature mode and the configuration item identifier to obtain associated information;
and acquiring the associated information of a plurality of WMSs, and constructing a WMS configuration list according to the associated information.
5. The method for dynamically accessing the WMS as claimed in claim 1, wherein the querying the WMS configuration list from the cloud database according to the WMS number, obtaining the association information of the WMS, and obtaining the WMS configuration item according to the association information comprises:
inquiring a WMS configuration list from a cloud database according to the WMS number, and acquiring associated information corresponding to the WMS number;
and acquiring the configuration item corresponding to the associated information according to the configuration item identifier in the associated information.
6. The method for dynamically accessing the WMS according to claim 1, wherein the accessing the WMS according to the configuration item and obtaining the corresponding data according to the data access request comprises:
establishing an access link between the ERP and the WMS according to the configuration item;
and acquiring corresponding data according to the data access request on the basis of the access link.
7. The method for dynamically accessing the WMS as claimed in claim 1, wherein the encryption process for the encrypted data comprises:
setting a corresponding relation between characters and numbers, wherein the corresponding relation between the characters and the numbers comprises that one character corresponds to one number and different characters correspond to different numbers;
digitizing the plaintext data according to the corresponding relation between the characters and the numbers to obtain digitized plaintext data;
and encrypting the digital plaintext data by using the public key to obtain encrypted data.
8. The method for dynamically accessing WMSs of claim 7, wherein said public key is used in pair with a private key, said public key being used for encryption and said private key being used for decryption;
the generation process of the public key and the private key comprises the following steps:
randomly selecting two prime numbers A and B, wherein A is different from B;
acquiring an encryption parameter C (A) and an encryption parameter B according to the prime number A and the prime number B;
acquiring an intermediate parameter D ═ (A-1) × (B-1) according to the prime number A and the prime number B;
generating a public key parameter E, wherein the public key parameter E and the intermediate parameter D are relatively prime, and the value range of the public key parameter E is (1, D);
generating a private key parameter F, wherein the FE is equal to 1modD, wherein equal to represents congruence, and mod represents a modular operation;
and generating a public key according to the encryption parameter C and the public key parameter E, and generating a private key according to the encryption parameter C and the private key parameter F to obtain a public key and a private key which are used in pairs, wherein the public key is (E, C), and the private key is (F, C).
9. The method for dynamically accessing the WMS as claimed in claim 8, wherein the encrypting the digitized plaintext data using the public key comprises:
the encryption rule is set as follows: m is equal to N E mod C, where N represents the number before encryption and M represents the number after encryption;
and according to the encryption rule, sequentially encrypting the digital strings in the digital plaintext data to obtain encrypted data.
10. The method of dynamically accessing a WMS of claim 9, wherein decrypting the feedback data comprises:
the decryption rules are set as follows: m is N F mod C;
According to a decryption rule, sequentially decrypting the digital strings in the feedback data to obtain plaintext digital strings;
and converting the plaintext digital string into characters according to the corresponding relation between the characters and the numbers to obtain plaintext data of the feedback data.
CN202210387737.8A 2022-04-13 2022-04-13 Method for dynamically accessing WMS Pending CN114896314A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210387737.8A CN114896314A (en) 2022-04-13 2022-04-13 Method for dynamically accessing WMS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210387737.8A CN114896314A (en) 2022-04-13 2022-04-13 Method for dynamically accessing WMS

Publications (1)

Publication Number Publication Date
CN114896314A true CN114896314A (en) 2022-08-12

Family

ID=82717862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210387737.8A Pending CN114896314A (en) 2022-04-13 2022-04-13 Method for dynamically accessing WMS

Country Status (1)

Country Link
CN (1) CN114896314A (en)

Similar Documents

Publication Publication Date Title
CN106991334B (en) Data access method, system and device
CN107209787B (en) Improving searching ability of special encrypted data
US9646166B2 (en) Masking query data access pattern in encrypted data
CN109858263B (en) Data storage and retrieval method and device, electronic equipment and storage medium
CN105373927A (en) Coupon code generation method of electronic coupon, device and server
WO2020224489A1 (en) Blockchain-based bank data sharing method and related apparatus
CN101840471B (en) Document right control method and device
CN110689349A (en) Transaction hash value storage and search method and device in block chain
CN113094334B (en) Digital service method, device, equipment and storage medium based on distributed storage
US20140095889A1 (en) Encrypted search database device, encrypted search data adding/deleting method and adding/deleting program
CN113127915A (en) Data encryption desensitization method and device, electronic equipment and storage medium
CN113420049A (en) Data circulation method and device, electronic equipment and storage medium
CN110378796A (en) Vehicle unique identification generation method, device, computer equipment and medium
CN113162763A (en) Data encryption and storage method and device, electronic equipment and storage medium
CN112287371B (en) Method and device for storing industrial data and computer equipment
CN114896314A (en) Method for dynamically accessing WMS
CN113821381B (en) Block chain node resource backup and off-line node resource transfer method and storage medium
CN109462474A (en) The generation method and relevant apparatus of Fernet key in a kind of Keystone
CN114297274A (en) Big data extraction method and device, computer equipment and storage medium
CN114417069A (en) Page data interaction method and device and electronic equipment
CN111526014A (en) System and method for unified management of clustered deployment application passwords
CN116382696B (en) Engineering attribute dynamic analysis and submission method based on factory object position number
TWM591647U (en) Data management system capable of securely accessing and deleting data
CN114793156B (en) Data processing method, device, equipment and storage medium
CN116781244B (en) MNSS platform data privacy and management method based on cosine chaos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination