CN116049901B - Detection task traceable management system based on timestamp encryption - Google Patents

Detection task traceable management system based on timestamp encryption Download PDF

Info

Publication number
CN116049901B
CN116049901B CN202310041780.3A CN202310041780A CN116049901B CN 116049901 B CN116049901 B CN 116049901B CN 202310041780 A CN202310041780 A CN 202310041780A CN 116049901 B CN116049901 B CN 116049901B
Authority
CN
China
Prior art keywords
report
management module
detection
module
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310041780.3A
Other languages
Chinese (zh)
Other versions
CN116049901A (en
Inventor
王超
封谦
王明龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Cqc Huanyu Information Security Technology Co ltd
Original Assignee
Beijing Cqc Huanyu Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Cqc Huanyu Information Security Technology Co ltd filed Critical Beijing Cqc Huanyu Information Security Technology Co ltd
Priority to CN202310041780.3A priority Critical patent/CN116049901B/en
Publication of CN116049901A publication Critical patent/CN116049901A/en
Application granted granted Critical
Publication of CN116049901B publication Critical patent/CN116049901B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a detection task traceable management system based on timestamp encryption, which relates to the technical field of data processing, wherein a task management module is used for creating and recording creation timestamps and key information of detection tasks; the report information input module is used for inputting the original data of the detection task and calling the digital certificate for encryption; the configuration management module is used for inquiring in the standard library and the sample database based on the key information and determining a matched data processing algorithm; calculating the encrypted original data according to a data processing algorithm, generating detection data and a structured report, recording a generation time stamp of the report and encrypting the report; the signature management module is used for calling the organization data certificate, carrying out signature authorization on the encrypted report, recording the signature authorization time stamp and generating a detection report of the detection task. The invention encrypts the tamper-proof digital certificate by the key node in the test and report issuing process, ensures the validity of the electronic signature and improves the authority of the report.

Description

Detection task traceable management system based on timestamp encryption
Technical Field
The invention relates to the technical field of data processing, in particular to a detection task traceable management system based on time stamp encryption.
Background
When the current detection department performs test detection on a detection task, the current detection department usually performs calculation recording of data manually and generates a detection report manually. On one hand, the working efficiency is lower, on the other hand, the detection authenticity and the detection quality cannot be guaranteed, and further, the fine management on the working progress and the quality of the inspection task cannot be realized, so that the authority of the report is reduced, and the inspection work of audit is not facilitated.
Disclosure of Invention
In view of the above-mentioned drawbacks or shortcomings in the prior art, the present invention provides a detection task traceable management system based on timestamp encryption, which can solve or partially solve the above-mentioned technical problems.
The invention provides a detection task traceability management system based on timestamp encryption, which comprises: the system comprises a task management module, a resource library module, a report information input module, a configuration management module and a signature management module; wherein,,
the task management module is used for creating a detection task, recording a creation time stamp of the detection task and key information corresponding to the detection task, and distributing the detection task to a target detection department; the report information input module is connected with the configuration management module and is used for inputting the original data of the detection task, calling a digital certificate to encrypt the original data and sending the encrypted original data to the configuration management module; the resource library module comprises a standard library and a sample database; the resource library module is connected with the configuration management module so that the configuration management module can perform data query in the standard library and the sample database; the configuration management module is connected with the signature management module and is used for inquiring in the standard library and the sample database based on the key information to determine a matched data processing algorithm; calculating the encrypted original data according to the data processing algorithm, generating detection data and a structured report, and recording a generation time stamp of the structured report; encrypting the structured report, and sending the encrypted structured report to the signature management module; the signature management module is used for retrieving the organization data certificate, performing signature authorization on the encrypted report, recording a signature authorization time stamp and generating a detection report of the detection task.
The detection task traceable management system based on the timestamp encryption can realize fine management of the work progress and quality of the detection task, and ensure that each report sent by a detection department is true and credible. The key nodes in the test and report issuing processes are all subjected to tamper-proof digital certificate encryption, the validity of the electronic signature is ensured by using the time stamp, the report authority is improved, and the checking work of audit can be satisfied without additional work.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 is a diagram of a task traceable management system for detection based on timestamp encryption according to one embodiment of the present invention;
FIG. 2 is a block diagram of a task traceable management system for detection based on timestamp encryption according to an embodiment of the present invention;
FIG. 3 is a flowchart of a detection task traceability management system based on timestamp encryption according to another embodiment of the present invention;
FIG. 4 is a block diagram of a task traceability management system for detection based on timestamp encryption according to still another embodiment of the present invention;
FIG. 5 is a flowchart of a detection task traceability management system based on timestamp encryption according to still another embodiment of the present invention;
FIG. 6 is a flowchart of a detection task traceability management system based on timestamp encryption according to still another embodiment of the present invention;
fig. 7 is a flowchart of a detection task traceable management system based on timestamp encryption according to still another embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present invention to describe the acquisition modules, these acquisition modules should not be limited to these terms. These terms are only used to distinguish the acquisition modules from each other.
Depending on the context, the word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to detection". Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should be noted that, the terms "upper", "lower", "left", "right", and the like in the embodiments of the present invention are described in terms of the angles shown in the drawings, and should not be construed as limiting the embodiments of the present invention. In addition, in the context, it will also be understood that when an element is referred to as being formed "on" or "under" another element, it can be directly formed "on" or "under" the other element or be indirectly formed "on" or "under" the other element through intervening elements.
Referring to fig. 1, an embodiment of the present invention provides a detection task traceability management system based on timestamp encryption, which includes a task management module 110, a resource library module 120, a report information entry module 130, a configuration management module 140 and a signature management module 150; wherein,,
the task management module 110 is configured to create a detection task, record a creation time stamp of the detection task and key information corresponding to the detection task, and distribute the detection task to a target detection department; the report information input module 130 is connected to the configuration management module 140, and is configured to input the original data of the detection task, call a digital certificate to encrypt the original data, and send the encrypted original data to the configuration management module 140; the repository module 120 includes a standard repository and a sample database; the resource library module 120 is connected with the configuration management module 140, so that the configuration management module 140 performs data query in the standard library and the sample database; the configuration management module 140 is connected with the signature management module 140 and is used for inquiring in the standard library and the sample database based on the key information to determine a matched data processing algorithm; calculating the encrypted original data according to the data processing algorithm, generating detection data and a structured report, and recording a generation time stamp of the structured report; encrypting the structured report, and sending the encrypted structured report to the signature management module 150; the signature management module 150 is configured to invoke a certificate of the organization data, perform signature authorization on the encrypted report, record a signature authorization timestamp, and generate a detection report of the detection task.
The Beidou satellite clock synchronization system is high-tech equipment developed for timing of computers, automatic devices and the like, standard time signals can be obtained from GPS (GlobalPositioning System ) satellites, and transmitted to a module requiring time information in the system through various interfaces, so that a standard time source is provided in the system, and the time of the whole system is consistent.
Specifically, the staff member synchronizes task information from the entrusted enterprise, logs in to the system of the present invention, creates a detection task at the task management module 110, and records key information of the detection task. The system acquires the current Beidou satellite time, and records the creation time point of the detection task as the creation time stamp. The key information is information characterizing the attribute of the detection task, including but not limited to detection targets, sample models, sample key components, descriptive text of the sample, etc. The task management module 110 determines a suitable target detection division according to the above-mentioned key information, and distributes the detection task to the target detection division.
After receiving the detection task, a worker of the target detection department performs an off-line test to obtain original data obtained by testing of a test instrument, or directly reads the value of the instrument and records the value as the original data; the report information input module 130 of the system inputs or manually inputs the original data by a worker, invokes a digital certificate to encrypt the original data, and sends the encrypted original data to the configuration management module 140.
The standard library in the resource library module 130 comprises standard requirements corresponding to each detection target of the product, and the sample database comprises a sample description library, a sample model library and a key component list library. And the association relation among the standard requirements, the sample data and the data processing algorithm is established in advance, namely, the matched data processing algorithm can be determined after the standard requirements corresponding to all detection targets of the detection task and the sample data (sample model, sample key parts and description text of the sample) related to the detection task are determined.
After receiving the original data, the configuration management module 140 starts a detection data calculation and judgment engine, and determines a matched data processing algorithm according to standard requirements, sample types, sample key components, description texts of samples and the like included in the key information; firstly, selecting a numerical value suitable for calculation from original data according to standard requirements; substituting the data logic in the data processing algorithm and the related formulas into the numerical value of the original data to calculate, and generating the detection data to be identified in the report. Further, generating a structured report based on the detection data, and recording Beidou satellite time when the structured report is generated as a time stamp; encrypting the structured report through a digital certificate to ensure that the recorded and modified content is searchable, retrospective and cannot be tampered; finally, the encrypted structured report is sent to the signature management module 150. Optionally, the structured report includes, but is not limited to, test content, test data, test results, and decision conclusions.
The signature management module 150 invokes the organization data certificate to perform signature authorization on the encrypted report; in the signing process, automatically recording Beidou satellite time as a signing authorization time stamp; and after signature is finished, generating an electronic version detection report to generate a detection report of the detection task.
The detection task traceable management system based on the timestamp encryption can realize fine management of the work progress and quality of the detection task, and ensure that each report sent by a detection department is true and credible. The key nodes in the test and report issuing processes are all subjected to tamper-proof digital certificate encryption, the validity of the electronic signature is ensured by using the time stamp, the report authority is improved, and the checking work of audit can be satisfied without additional work.
As some alternative embodiments of the present invention, as shown in fig. 2, the system further includes an audit module 160, where the audit module includes a primary audit sub-module 161 and a final audit sub-module 162 that are connected, where the primary audit sub-module 161 is connected to the configuration management module 140, and the final audit sub-module is connected to the signature management module 150. The primary auditing submodule 161 is used for auditing the received structured report once, and if the auditing is qualified, the structured report is sent to the final auditing submodule 162; the final review sub-module 162 is configured to perform a second review on the received structured report, and if the review is qualified, send the structured report to the signature management module 150.
Specifically, the primary review sub-module 161 checks the test content, the test data, the test result and the determination conclusion in the test report according to the test task, and checks whether the test report content is missing; if the report is qualified, submitting a final review; if the detection report is unqualified, a primary staff is required to judge whether the report needs to be subjected to detection test again, and the detection report is returned to a flow node corresponding to the unqualified problem. For the inspection report that is qualified for the initial review, the final review submodule 162 performs final review, the content and flow of the review are similar to those of the initial review, and after the report is qualified, the inspection report is updated to be in a state to be signed, and the inspection report is sent to the signature management module 150.
Optionally, fig. 3 shows a flowchart of traceable management of a detection task by the system disclosed in the embodiment of the present invention, and the processing flow of the detection task is described in the foregoing embodiment and is not repeated herein. It should be noted that, before the detection task is allocated, the task management module 110 may first determine whether a sample is needed, and if the sample is not needed, directly enter the task allocation flow; if a sample is required, the sample is correlated by a sample management procedure.
As further alternative embodiments of the present invention, as shown in FIG. 2, the system further includes a base resource management module 170, the base resource management module 170 including at least department information, the base resource management module 170 being coupled to the task management module 110; the task management module 170 determines at least one target detection department corresponding to the detection task according to the key information and department information in the basic resource module 170.
Specifically, the department information includes detection task information, personnel information and the like that are responsible for each detection department, and after the task management module 170 determines a detection target of a detection task in the key information, polling and searching are performed in the department information, a target detection department responsible for the detection target is determined, and the task is allocated to the department. The target detection department can be one or a plurality of target detection departments. For example, the energy-saving detection task only needs to be independently carried out by a safety detection department; the certification type detection task safety detection department and the strategic department cooperate to complete the test. The detection tasks are different, the detection items are also different, and each target detection department participates in the corresponding detection test as required.
Further, as some alternative embodiments of the present invention, detection of the sample is involved in the detection task. Thus, the system also includes the functions of sample management and traceability, as shown in fig. 4 and 5. The resource library module 120 is connected with the task management module 110, and the resource library module 120 is used for numbering received samples, recording a warehousing time stamp and sending a warehousing instruction of the samples to the task management module 110; the task management module 110 is configured to, after receiving the warehousing instruction, correlate the sample with the detection task and record a correlation time module stamp, and after determining the target detection department, generate a shipment instruction and send the shipment instruction to the resource library module 120; the resource library module 120 is configured to record a time stamp of the sample when the sample is delivered after receiving the delivery instruction.
Optionally, the report information input module 130 is connected to the resource library module 120, and is configured to confirm the sample form of the sample, and record a receiving timestamp of the sample; and issues a library returning application to the resource library module 120 after the detection task is completed; the repository module 120 records a repository-returning timestamp of the sample after receiving the sample returned based on the repository-returning application.
Specifically, after the resource library module 120 receives the sample, the sample is numbered, and the Beidou satellite time point of the received sample is automatically recorded and used as a warehousing time stamp; synchronizing the sample information to a worker; the business personnel contact with the entrusted enterprises to confirm the information of the sample number, the model number, related detection tasks and the like. After confirming the error, the resource library module 120 sends the sample storage instruction to the task management module 110, where the storage instruction includes information such as the number of samples, the model number, and related detection tasks. The task management module 110 is configured to associate the sample with the detection task after receiving the warehousing instruction, and record the current beidou satellite time as an association timestamp. After determining the target detection departments according to the above embodiments, the task management module 110 generates a delivery instruction according to the order of the flows between the target detection departments and sends the delivery instruction to the resource library module 120; the resource library module 120 is configured to make a library action for a sample after receiving the library outlet instruction, and record a library outlet timestamp of the sample.
Further, the report information input module 130 confirms the form of the sample after receiving the sample, and records the receiving time stamp of the sample based on the time point of the Beidou satellite. After the staff of the target detection department completes the detection task in the development test, a library returning application is sent to the resource library module 120 through the report information input module 130; after receiving the sample returned based on the database returning application, the resource database module 120 confirms the sample form and records the database returning time stamp of the sample based on the Beidou satellite time point.
Further, the repository module 120 determines whether the sample needs to be streamed to the next department; if the flow is required to be transferred to the next department, the system makes a sample ex-warehouse action; and if the sample does not need to be circulated to the next department, finishing the sample warehousing action. If the panelist of the target detection department determines that a re-run of the test is required, a re-sampling may be applied and the repository module 120 automatically issues a shipment instruction for the sample. After all the tests corresponding to the detection tasks are completed, the resource library module 120 submits a sample returning application, and after entrusting enterprises receive sample returning applications, whether the samples need returning or not is judged; if the sample does not need to be returned, declaring to be discarded; if the sample needs to be returned, receiving the returned sample and ending the flow.
Further, as some optional embodiments of the present invention, the system further includes a fee management module 180 for settling the fee of the detection task. As shown in fig. 4 and fig. 6, the standard library included in the repository module 120 is pre-stored with a rule of the cost of the detection task, and the cost management module 180 is connected with the repository module 120, where the cost management module 180 is configured to determine the offer information of the detection task according to the rule of the cost of the detection task, and instruct the target detection department to start detection after receiving a confirmation instruction based on the offer information.
Optionally, the fee management module 180 is configured to calculate the fee of each detection test after the detection task is completed, and generate total fee information of the detection task; and after the total cost information is processed, the total cost information is sent to a financial system for subsequent payment operation.
Specifically, the staff member writes and prepares the details of the cost of the detection task according to laws and regulations, implementation rules, standard terms, and cost management methods, and stores the details in a standard library included in the repository module 120. Before initiating a test flow of a detection task for a target detection department, the cost management module 180 determines quotation information of the detection task according to the detection task cost rule and carries out test quotation on a entrusted enterprise; and after receiving a confirmation instruction based on the quotation information, the entrusting enterprise instructs the target detection department to start detection.
Optionally, after the staff of the target detection department performs the test, the cost management module 180 automatically calculates the cost of each test, and generates the total cost information of the detection task; after determining the total cost information, the cost management module 180 may process the total cost information according to attribute information of the entrusted enterprise. For example, if the entrusted enterprise is a target enterprise enjoying discounts, the discount coefficient can be multiplied on the basis of the total price to obtain the processed total cost information; if the entrusted enterprise is a prepaid client, the total price can be subtracted on the basis of the prepaid fee to obtain the processed total cost information. And after the total cost information is processed, the total cost information is sent to a financial system for subsequent payment operation.
The financial system generates a bill, selects payment information and calls a third party payment system to initiate a payment flow; after entrusting enterprises to pay fees, financial staff issues invoices; and sending or sending the invoice to the entrusting enterprise, and ending the flow after the entrusting enterprise confirms the receipt.
As some alternative embodiments of the present invention, a scheme for generating structured reports is disclosed. Specifically, as shown in fig. 7, the configuration management module 140 stores a report node library, a report template component library, and a report template logic library in advance; the report template component library is updated based on the template component unit, and the report template logic library is updated based on the template logic.
In order to improve the report generation efficiency and enable the report content to be more structured, before the embodiment of the invention is used for providing the structured report, on one hand, the structured report meeting the standard in the past is split and stored according to the report chapter and the performance to obtain a report node library, and report key information and corresponding detection task information of each node are stored in the report node library in an associated manner; on the other hand, a report template component library and a report template logic library are developed, wherein the report template component library comprises a plurality of component units for generating reports, the report template logic library comprises writing template logic, typesetting template logic and the like of reports of different detection tasks, the report template component library is updated based on the template component units, and the report template logic library is updated based on the template logic.
Further, the configuration management module 140 determines whether a matching first target report template exists in the report node library based on the key information; if so, generating the structured report according to the detection data and the first target report template; if not, judging whether a matched target report template component and target report template logic exist in the report template component library and the report template logic library; if so, creating a second target report template, and generating the structured report according to the detection data and the second target report template; if the target report template unit does not exist, developing a new template component unit and new template logic according to the detection task, and generating a new target report template component and new target report template logic based on the new template component unit and the new template logic.
Specifically, the configuration management module 140 analyzes a report to be generated based on key information (detection target, sample model, sample key component, description text of sample) of a detection task and the like, judges whether a plurality of matched report nodes exist in a report node library, and synthesizes the plurality of report nodes as a first target report template; if so, generating the structured report by using the first target report template; if not, a target report template needs to be created.
Further, judging whether a matched target report template component and target report template logic exist in the report template component library and the report template logic library; if the target report template exists, the existing component library and the logic library meet the new template requirement, a plurality of report nodes are formed according to the matched target report template components and the target report template logic, and a second target report template is created based on the plurality of report nodes; if the target report template is not available, developing a new template assembly unit and new template logic according to the detection task, generating a new target report template assembly and new target report template logic based on the new template assembly unit and the new template logic, and then creating the second z-target report template according to the new target report template assembly and the new report template logic.
It should be noted that, during the process of filling the detection data into the target report template, the configuration management module 140 may automatically encrypt the detection data, so as to ensure the security of the data.
Further, the configuration management module 140 is configured to determine each item of the detection data based on standard terms of the detection task, and generate a determination result; and generating the structured report according to the judging result and the target report template.
Specifically, the configuration management module 140 gives a determination result for each test item as required by standard terms; filling the judging result into the corresponding position of the target report template to generate a structured report; the structured report is issued outwards after being signed and sealed by the data certificate. In the report generation process, the Beidou timestamp can conduct tamper-proof encryption actions on the key nodes, and the whole process is guaranteed to be traceable.
The combined use of the functions of the report node library, the report template component library, the report template logic library and the like can effectively improve the report issuing efficiency of a test detection laboratory and reduce the human error probability.
The embodiment of the invention can realize the integrated management of the detection task, the sample and the cost, record the original data of the detection task and accurately grasp the working progress. In the whole process before report issuing, the report data and the intermediate form are encrypted to generate a non-tamperable and traceable work record. According to the embodiment of the invention, manual calculation is reduced, errors in aspects of data interval selection, numerical calculation, data iteration and the like are effectively avoided, and the structured filling, storage and application of the report and automatic generation of the report format file are remarkably realized besides meeting the basic requirements of informatization management. Meanwhile, the electronic signature of the trusted digital authentication technology is applied to realize tamper resistance of a report and traceability of a test flow. The invention can obviously improve the working efficiency of the detection department and the accuracy of the report content, and can effectively store the detection data in a structured way, thereby being convenient for searching, statistics, analysis and utilization.
Optionally, the embodiment of the invention uses the SpringBoot framework to intercept, verify and register all requests, carries out logic processing according to actual service judgment, provides support for realizing service functions and general technical processing without service meanings, and provides standard, unified and quick support for the system. The embodiment of the invention adopts a layered design mode, and each layer of call is adjacent to the lower layer to realize the function of the layer, so that cross-layer call is not allowed.
The invention uses MyBatis as a component for accessing the relational database, and adopts a Java interface and XML development mode to realize the separation of the database access interface and the realization. Java code at this layer is only allowed to be interface and method declarations, and is not allowed to write class and method implementations. The implementation of the method in the interface is written in a corresponding XML file, in which there is a corresponding XML fragment for each method in the interface.
The invention is written according to an interface and implementation mode, and uses Spring to uniformly manage all the component services of a business logic layer, wherein the implementation class declares itself as a component through component annotation, references to other components are injected through resource annotation, and the injectable components comprise MyBatis components and other service components.
The invention uses the SpringMVC framework to develop the web page application of the access control layer, and the core is a controller which is responsible for coordinating the front-end request and the back-end service processing, namely receiving the parameters transferred by the page, calling the service logic of the service layer, and returning the processing result to the page for displaying.
In some embodiments, the terminals, servers, etc. may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), etc., and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments of the present invention may be implemented in software or in hardware. Where the names of the units do not constitute a limitation of the module itself in some cases.
The above description is only illustrative of the preferred embodiments of the present invention and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in the present invention is not limited to the specific combinations of technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the spirit of the disclosure. Such as the above-mentioned features and the technical features disclosed in the present invention (but not limited to) having similar functions are replaced with each other.
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the invention. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims.

Claims (8)

1. A detection task traceability management system based on timestamp encryption, comprising: the system comprises a task management module, a resource library module, a report information input module, a configuration management module and a signature management module; wherein,,
the task management module is used for creating a detection task, recording a creation time stamp of the detection task and key information corresponding to the detection task, and distributing the detection task to a target detection department;
the report information input module is connected with the configuration management module and is used for inputting the original data of the detection task, calling a digital certificate to encrypt the original data and sending the encrypted original data to the configuration management module;
the resource library module comprises a standard library and a sample database; the resource library module is connected with the configuration management module so that the configuration management module can perform data query in the standard library and the sample database;
the configuration management module is connected with the signature management module and is used for inquiring in the standard library and the sample database based on the key information to determine a matched data processing algorithm; calculating the encrypted original data according to the data processing algorithm, generating detection data and a structured report, and recording a generation time stamp of the structured report; encrypting the structured report, and sending the encrypted structured report to the signature management module;
the signature management module is used for retrieving the organization data certificate, performing signature authorization on the encrypted report, recording a signature authorization time stamp and generating a detection report of the detection task;
the configuration management module is pre-stored with a report node library, a report template component library and a report template logic library; the report node library is provided with nodes for structured reports which are stored in a split mode according to report chapters and performances, and report key information of each report node and key information corresponding to detection tasks are stored in a correlated mode; the report template component library comprises a plurality of template components for generating reports, the report template logic library comprises template logic for reporting different detection tasks, the report template component library is updated based on the template components, and the report template logic library is updated based on the template logic;
the configuration management module is configured to: searching whether a plurality of matched report nodes exist in the report node library based on key information corresponding to the detection task, if so, synthesizing the plurality of report nodes into a first target report template, generating the structured report according to detection data and the first target report template, and if not, judging whether matched target report template components and target report template logic exist in the report template component library and the report template logic library; if the matched target report template component and the target report template logic exist, generating a plurality of report nodes according to the matched target report template component and the target report template logic, creating a second target report template based on the plurality of report nodes, generating the structured report according to the detection data and the second target report template, if the matched target report template component and the target report template logic do not exist, developing a new template component and the new template logic according to key information corresponding to the detection task, generating a new target report template component and the new target report template logic based on the new template component and the new template logic, creating a third target report template according to the new target report template component and the new report template logic, and generating the structured report according to the detection data and the third target report template.
2. The system of claim 1, further comprising an audit module comprising a primary audit sub-module and a final audit sub-module connected, the primary audit sub-module being connected to the configuration management module, the final audit sub-module being connected to the signature management module;
the primary auditing submodule is used for auditing the received structured report once, and if the auditing is qualified, the structured report is sent to the final auditing submodule; and the final audit sub-module is used for conducting secondary audit on the received structured report, and if the audit is qualified, the structured report is sent to the signature management module.
3. The system of claim 1, further comprising a base resource management module including at least department information, the base resource management module being coupled to the task management module; and the task management module determines at least one target detection department corresponding to the detection task according to the key information and department information in the basic resource management module.
4. The system of claim 1, wherein the resource library module is connected to the task management module, and the resource library module is configured to number the received samples and record a warehouse entry timestamp, and send a warehouse entry instruction of the samples to the task management module; the task management module is used for associating the sample with the detection task and recording an associated time module stamp after receiving the warehousing instruction, and generating a warehousing instruction and sending the warehousing instruction to the resource library module after determining the target detection department; and the resource library module is used for recording the ex-warehouse time stamp of the sample after receiving the ex-warehouse instruction.
5. The system of claim 4, wherein the report information entry module is coupled to the repository module for validating a sample morphology of the sample, recording a receipt timestamp of the sample; after the detection task is completed, a library returning application is sent to the resource library module; and after receiving the sample returned based on the database returning application, the resource database module records the database returning time stamp of the sample.
6. The system of claim 1, further comprising a cost management module, wherein the repository module includes a standard repository in which details of a cost of the detection task are pre-stored, the cost management module is connected to the repository module, and the cost management module is configured to determine quotation information of the detection task according to the details of the cost of the detection task, and instruct the target detection department to start detection after receiving a confirmation instruction based on the quotation information.
7. The system of claim 6, wherein the fee management module is configured to calculate a fee for each test after the test task is completed, and generate total fee information for the test task; and after the total cost information is processed, the total cost information is sent to a financial system for subsequent payment operation.
8. The system of claim 1, wherein the configuration management module has a knowledge base of reporting criteria terms pre-stored, the configuration management module for determining target criteria terms that match the detection task; judging the detection data of each item based on the target standard clause to generate a judging result; and generating the structured report according to the judging result and the target report template.
CN202310041780.3A 2023-01-28 2023-01-28 Detection task traceable management system based on timestamp encryption Active CN116049901B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310041780.3A CN116049901B (en) 2023-01-28 2023-01-28 Detection task traceable management system based on timestamp encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310041780.3A CN116049901B (en) 2023-01-28 2023-01-28 Detection task traceable management system based on timestamp encryption

Publications (2)

Publication Number Publication Date
CN116049901A CN116049901A (en) 2023-05-02
CN116049901B true CN116049901B (en) 2023-06-20

Family

ID=86116059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310041780.3A Active CN116049901B (en) 2023-01-28 2023-01-28 Detection task traceable management system based on timestamp encryption

Country Status (1)

Country Link
CN (1) CN116049901B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116383859B (en) * 2023-06-06 2023-08-22 四川省建筑科学研究院有限公司 Detection report generation method and device, electronic equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150294245A1 (en) * 2014-04-14 2015-10-15 Ajay R Nagar Method and system for handling program, project and asset scheduling management with reserves management and application integration
CN110348865A (en) * 2019-07-11 2019-10-18 黑龙江农垦垦通信息通信有限公司 A kind of accurate traceability system of agriculture industrial chain quality safety entirely and retroactive method
CN111626709B (en) * 2020-05-28 2023-06-30 东方蓝天钛金科技有限公司 Aerospace fastener product detection management system and method
CN112861101A (en) * 2021-03-05 2021-05-28 链晟数科(成都)科技有限公司 High-reliability inspection detection data processing method and device
CN113487275B (en) * 2021-06-29 2022-02-11 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain

Also Published As

Publication number Publication date
CN116049901A (en) 2023-05-02

Similar Documents

Publication Publication Date Title
US10430740B2 (en) Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
US10705801B2 (en) Data processing systems for identity validation of data subject access requests and related methods
US11409908B2 (en) Data processing systems and methods for populating and maintaining a centralized database of personal data
US10346637B2 (en) Data processing systems for the identification and deletion of personal data in computer systems
US11063744B2 (en) Document flow tracking using blockchain
US10776518B2 (en) Consent receipt management systems and related methods
US10678945B2 (en) Consent receipt management systems and related methods
US20220237325A1 (en) Consent receipt management systems and related methods
US20200410117A1 (en) Consent receipt management systems and related methods
US20190096020A1 (en) Consent receipt management systems and related methods
US20080235041A1 (en) Enterprise data management
CN111639914A (en) Block chain case information management method and device, electronic equipment and storage medium
CN112883116A (en) Supply chain finance AI DaaS algorithm warehouse platform based on block chain
US10776514B2 (en) Data processing systems for the identification and deletion of personal data in computer systems
US20050065839A1 (en) Methods, systems and computer program products for generating an aggregate report to provide a certification of controls associated with a data set
US10776517B2 (en) Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
CN116049901B (en) Detection task traceable management system based on timestamp encryption
WO2019028405A1 (en) Data processing systems for the identification and deletion of personal data in computer systems
CN111143391A (en) Data sharing exchange method and system
CN114897596A (en) Letter service platform and electronic equipment
CN115952220A (en) Bill processing method and device based on block chain, electronic equipment and medium
US12033196B2 (en) Accelerated invoicing using predictive freight events
US11625502B2 (en) Data processing systems for identifying and modifying processes that are subject to data subject access requests
Gupta et al. Determining Delay Accountability, Compensation, and Price Variation Using Computable Smart Contracts in Construction
KR20120036523A (en) Method and system for certificating data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant