CN116384709B - Enterprise management system, medium and electronic equipment based on digital enabling - Google Patents

Enterprise management system, medium and electronic equipment based on digital enabling Download PDF

Info

Publication number
CN116384709B
CN116384709B CN202310650256.6A CN202310650256A CN116384709B CN 116384709 B CN116384709 B CN 116384709B CN 202310650256 A CN202310650256 A CN 202310650256A CN 116384709 B CN116384709 B CN 116384709B
Authority
CN
China
Prior art keywords
data
matrix
enterprise
module
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310650256.6A
Other languages
Chinese (zh)
Other versions
CN116384709A (en
Inventor
陈旭
蔡佩薇
陈华英
王思婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Management and Training Center of State Grid Fujian Electric Power Co Ltd
Original Assignee
Management and Training Center of State Grid Fujian Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Management and Training Center of State Grid Fujian Electric Power Co Ltd filed Critical Management and Training Center of State Grid Fujian Electric Power Co Ltd
Priority to CN202310650256.6A priority Critical patent/CN116384709B/en
Publication of CN116384709A publication Critical patent/CN116384709A/en
Application granted granted Critical
Publication of CN116384709B publication Critical patent/CN116384709B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Educational Administration (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • Game Theory and Decision Science (AREA)
  • Computing Systems (AREA)
  • Operations Research (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides an enterprise management system based on digital enabling, wherein the enterprise terminal comprises a data acquisition module, an operation analysis module and a storage module; the data acquisition module acquires basic data and enterprise operation data; the operation analysis module captures the basic data and the sampling frequency information in the enterprise operation data and provides an influence factor to generate operation verification information; the storage module is used for storing the basic data and the enterprise operation data; the server side comprises a decision module and a blockchain; and the decision module provides decisions for the enterprise terminal according to the information increasing and decreasing verification of the block chain, and the analysis and control can improve the efficiency of enterprise operation stability according to influence factors.

Description

Enterprise management system, medium and electronic equipment based on digital enabling
Technical Field
The application belongs to the technical field of blockchain, and particularly relates to an enterprise management system, a medium and electronic equipment based on digital enabling.
Background
The digital management is a process of realizing enterprise management modernization by driving industrialization through informatization, which is a process of integrating modern digital technology with advanced management ideas, converting enterprise production modes, operation modes, business processes, traditional management modes and organization modes, re-integrating internal and external resources of an enterprise, improving enterprise efficiency and benefit and enhancing enterprise competitiveness. However, the existing enterprise management system cannot accurately acquire the factors of the enterprise operation state, so that the management efficiency of the enterprise is low.
Therefore, the enterprise management system, the method, the medium and the electronic equipment based on digital enabling are provided, and the efficiency of enterprise operation management is improved.
Disclosure of Invention
Therefore, the enterprise management system, the method, the medium and the electronic equipment based on digital enabling carry out decision making on all information of an enterprise terminal through the block chain and the decision making from the server, so that the management operation efficiency of the enterprise is improved.
The technical aim of the application is realized by the following technical scheme:
the enterprise management system based on digital enabling comprises an enterprise end and a server end;
the enterprise terminal comprises a data acquisition module, an operation analysis module and a storage module;
the data acquisition module acquires basic data and enterprise operation data;
the operation analysis module captures the basic data and the sampling frequency information in the enterprise operation data and provides an influence factor to generate operation verification information;
the storage module is used for storing the basic data and the enterprise operation data;
the server side comprises a decision module and a blockchain;
and the decision module provides decisions for the enterprise terminal according to the information adding and subtracting verification of the block chain.
Further, the sampling layer samples basic data and operation data transmitted by enterprises, and pre-processes the basic data and the operation data to obtain digitized original data;
the digitizing includes inverting the bytes in 64 scale;
a receiving layer, the receiving layer constructs hierarchical data from the original data,
when hierarchical data is built, backup data of the hierarchical data is built, and the hierarchical data and the backup data are transmitted in different protocol types;
the hierarchical data construction process comprises the following steps:
constructing an operation matrix Aij by using the basic data and the operation data;
wherein i is basic data, j is operation data, and the operation data are arranged according to byte order;
adding noise values into the matrix to obtain hierarchical data;
a direct access layer for acquiring backup data;
and indirectly accessing the layer to acquire hierarchical data.
Further, the header byte difference of the protocol is converted into a number and then converted into a noise adding value.
Further, in the operation analysis module,
the influence factor is 1 initially, backup data from a direct access layer are obtained each time, enterprise information is grabbed from the backup data, and then the sampling times initiated to a sampling layer in preset time are increased by a preset amount according to enterprises;
when the enterprise is not sampled within a preset time, reducing the influence factors by a preset amount;
each time the sample is updated, the impact factor is written to each value of the operation matrix corresponding to the hierarchical data in the indirect access layer.
Further, the blockchain is provided with a plurality of nodes, and each node is correspondingly connected with the indirect access layer of the enterprise terminal;
and the decision module is connected to each node of each blockchain, acquires shared data from the blockchain, acquires influence factors of the shared data from the data, and initiates a management request to an enterprise terminal according to the influence factors.
A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, performs functions as a system.
Compared with the prior art, the technical scheme provided by the application has the following advantages:
the application monitors the operation state of the analysis object in real time, and performs analysis and judgment when the operation state of the analysis object is abnormal, so that enterprise management and control are performed according to the analysis and judgment, the influence of the operation state on the enterprise is reduced, and the improvement of the enterprise management efficiency is facilitated; the method has the advantages that the operation abnormal object is subjected to influence factor analysis, the cause of abnormal operation of the operation abnormal object is judged through influence factor analysis, the management and control efficiency of an abnormal operation enterprise is improved, and the normal recovery efficiency and accuracy of an abnormal operation state are facilitated; and the corresponding operation abnormal object is subjected to internal analysis control according to the corresponding influence factors, and the efficiency of enterprise operation stability can be improved by carrying out analysis control according to the influence factors.
Drawings
FIG. 1 is a schematic diagram of the modular connections of a system provided by an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
So that the manner in which the features and techniques of the disclosed embodiments can be understood in more detail, a more particular description of the embodiments of the disclosure, briefly summarized below, may be had by reference to the appended drawings, which are not intended to be limiting of the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may still be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawing.
The following description and the drawings sufficiently illustrate specific embodiments of the application to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and acts are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. The scope of embodiments of the application encompasses the full ambit of the claims, as well as all available equivalents of the claims. Embodiments may be referred to herein, individually or collectively, by the term "application" merely for convenience and without intending to voluntarily limit the scope of this application to any single application or inventive concept if more than one is in fact disclosed. Relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. Various embodiments are described herein in a progressive manner, each embodiment focusing on differences from other embodiments, and identical and similar parts between the various embodiments are sufficient to be seen with each other. The method, product and the like disclosed in the examples are relatively simple to describe because they correspond to the method parts disclosed in the examples, and the relevant points are only referred to the description of the method parts.
In addition, the terms "disposed," "connected," "secured" and "affixed" are to be construed broadly. For example, "connected" may be in a fixed connection, a removable connection, or a unitary construction; may be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements, or components. The specific meaning of the above terms in the embodiments of the present disclosure may be understood by those of ordinary skill in the art according to specific circumstances.
The present embodiment provides a digital-enablement-based enterprise management system, as shown in fig. 1, including an enterprise side and a server side.
The enterprise terminal comprises a data acquisition module, an operation analysis module and a storage module.
As a preferred mode of this embodiment, the data acquisition module includes a sampling layer, a containing layer, a direct access layer and an indirect access layer, where the sampling layer samples basic data and operation data from enterprise transmission, the basic data and operation data are preprocessed to obtain digitalized original data, and the sampled basic data and operation data are composed of characters and numbers, and because the 64-system algorithm includes all english characters and two basic operation characters, when performing reverse conversion, the english and two basic characters are directly converted into numbers based on the 64-system algorithm, for codes that cannot be directly converted into numbers, such as other operation characters and digital text, characters larger than 64 are directly added 65 on the basis of original text for all the digital text, and the other operation characters are accumulated 66 according to the character standard sequence table, so as to obtain a 0-positive infinite number table. After sampling by the sampling layer, an array which is distinguished by bytes and is equal to the byte length is obtained, and the array is used as the original data.
And then constructing the hierarchical data by the original data obtained by the sampling layer through the accommodating layer, and when constructing the hierarchical data, establishing the backup data of the hierarchical data, wherein the hierarchical data and the backup data are transmitted by using different protocol types.
The basic data is used as an array i, the operation data is used as an array j, a matrix Aij related to ij is constructed, and then a noise value is added into the matrix to obtain hierarchical data.
As a preferred mode of this embodiment, when noise is added, the byte difference between the protocol packet headers used between the hierarchical data and the backup data is converted into a number and then converted into a noise adding value,
the number of the byte lengths of the packet header protocol is direct noise adding, and the other noise adding mode is to use byte difference codes of the protocol as noise adding values, and the byte difference is English characters, so that the byte difference codes are converted into numbers by adopting a base64 algorithm or an SHA-256 algorithm and then the numbers are added with the noise values.
In this embodiment, the noise adding value is always a number, and when noise is added, the noise adding value is always accumulated into the matrix, so as to obtain the encryption matrix B.
And generates a second matrix upon encryption, each element length of the second matrix always being the same as the encryption matrix.
Taking row 1 and column 1 as examples when encryption is performed, if the length of A11 is smaller than the noise adding length, moving bytes from A12 to A11 until the bytes A11 are equal to the length of the bytes B11 of the noise adding matrix;
all the unit lengths from analogy to the second proof are the same as the encryption matrix length;
each matrix unit moves one byte, then adding a random number at the end of the unit byte, wherein the random number is the decimal number of the moving byte; if the missing unit exists in the matrix after the matrix is moved, the original unit corresponding to the encryption matrix is filled in the unit.
The second matrix is encrypted data, the encrypted matrix is used as a key, and only the enterprise side which simultaneously acquires the key and the encrypted data can decrypt the data.
As a further preferable mode of this embodiment, the operation analysis module is. The method comprises the steps that an influence factor is 1 initially, backup data from a direct access layer are obtained each time, enterprise information is captured from the backup data, an influence factor variable is provided according to sampling frequency information, and the influence factor is increased by a preset amount according to sampling frequency initiated by an enterprise in a preset time; when the enterprise is not sampled within a preset time, reducing the influence factors by a preset amount; after each updating and sampling, the influence factors are written into each value of the operation matrix corresponding to the hierarchical data in the indirect access layer, specifically, the influence factors are written into the second matrix to obtain a third matrix, so that specific data of the influence factors can be obtained through the third matrix.
In this embodiment, the blockchain has a plurality of nodes, and the nodes are correspondingly connected with the indirect access layer of the enterprise terminal;
and the decision module is connected to each node of each blockchain, acquires shared data from the blockchain, acquires influence factors of the shared data from the data, and initiates a management request to an enterprise terminal according to the influence factors.
According to the embodiment, the data sharing of the enterprise basic data and the operation data in the blockchain is realized, the data can be decrypted according to the held secret key to judge whether the data is changed between shared data when the data is interacted between the enterprise terminals according to the non-tamperable characteristic of the blockchain, the data can be scheduled, the safety of the data is ensured, meanwhile, the blockchain and the decision module can judge the trusted degree of the blockchain in the system according to the influence factor because the influence factor is in a plaintext, and meanwhile, the trusted degree of an enterprise can be known in the process of not exchanging the secret key when the interaction between other enterprise terminals is facilitated.
Therefore, the block chain provides the information increasing verification and the information decreasing verification for the operation verification information, and the decision module provides decisions for the enterprise terminal according to the information increasing and the information decreasing verification of the block chain.
As shown in connection with fig. 2, embodiments of the present disclosure provide an electronic device for enterprise management based on a digital enabled platform, including a processor (processor) 30 and a memory (memory) 31. Optionally, the electronic device may also include a communication interface (communication interface) 32 and a bus 33. The processor 30, the communication interface 32, and the memory 31 may communicate with each other via the bus 33. The communication interface 32 may be used for information transfer. Processor 30 may invoke logic instructions in memory 31 to perform the digital-enabled platform based enterprise management methods of the above-described embodiments.
Embodiments of the present disclosure provide a storage medium storing computer-executable instructions configured to perform the above-described digital-enablement platform-based enterprise management method.
The storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium. A non-transitory storage medium comprising: a plurality of media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or a transitory storage medium.
The above description and the drawings illustrate embodiments of the disclosure sufficiently to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and acts are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. Moreover, the terminology used in the present application is for the purpose of describing embodiments only and is not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a," "an," and "the" (the) are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this disclosure is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, when used in the present disclosure, the terms "comprises," "comprising," and/or variations thereof, mean that the recited features, integers, steps, operations, elements, and/or components are present, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising one …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. In this context, each embodiment may be described with emphasis on the differences from the other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the methods, products, etc. disclosed in the embodiments, if they correspond to the method sections disclosed in the embodiments, the description of the method sections may be referred to for relevance.

Claims (6)

1. The enterprise management system based on digital enabling is characterized by comprising an enterprise end and a server end;
the enterprise terminal comprises a data acquisition module, an operation analysis module and a storage module;
the data acquisition module acquires basic data and enterprise operation data;
the data acquisition module comprises
The sampling layer samples basic data and operation data transmitted by enterprises, and preprocesses the basic data and the operation data to obtain digitized original data; the digitizing includes inverting the bytes in 64 scale;
a receiving layer, the receiving layer constructs hierarchical data from the original data,
when hierarchical data is built, backup data of the hierarchical data is built, and the hierarchical data and the backup data are transmitted in different protocol types;
the hierarchical data construction process comprises the following steps:
constructing an operation matrix Aij by using the basic data and the operation data;
wherein i is basic data, j is operation data, and the operation data are arranged according to byte order;
adding a noise value into the operation matrix to obtain hierarchical data;
adding the noise value into the operation matrix to obtain a noise adding matrix B;
encrypting to generate a second matrix, wherein the length of each unit of the second matrix is always the same as the length of the unit corresponding to the noise adding matrix;
when the second matrix is generated by encryption, taking the 1 st row and the 1 st column as examples, if the length of A11 is smaller than the unit length of a unit corresponding to the noise adding matrix, moving bytes from A12 to A11 until the unit A11 is equal to the unit length of the noise adding matrix B11;
all the unit lengths from the analogy to the second matrix are the same as the corresponding unit lengths of the noise adding matrix;
adding a random number at the tail of each unit byte when the matrix unit of each second matrix moves once, wherein the random number is the decimal number of the moving byte; if the second matrix has missing units after the matrix is moved, filling original units corresponding to the noise adding matrix at the units;
the second matrix is encrypted data, and the noise adding matrix is a key of the second matrix;
a direct access layer for acquiring backup data;
an indirect access layer for obtaining hierarchical data;
the operation analysis module captures the basic data and the sampling frequency information in the enterprise operation data and provides an influence factor to generate operation verification information;
the storage module is used for storing the basic data and the enterprise operation data;
the server side comprises a decision module and a blockchain;
and the decision module provides decisions for the enterprise terminal according to the information adding and subtracting verification of the block chain.
2. The digitally-enabled enterprise management system of claim 1, wherein the header byte difference value of the protocol is converted to a digital value followed by a noise value.
3. The digitally-enabled enterprise management system of claim 1, wherein,
in the operation analysis module,
the influence factor is 1 initially, backup data from a direct access layer is obtained each time, basic data and operation data are grabbed from the backup data, and then sampling times initiated to a sampling layer in preset time of an enterprise are increased by a preset amount;
when the enterprise is not sampled within a preset time, reducing the influence factors by a preset amount;
each time the sample is updated, the impact factor is written to each value of the operation matrix corresponding to the hierarchical data in the indirect access layer.
4. The digitally-enabled enterprise management system of claim 3, wherein the blockchain has a plurality of nodes, each node corresponding to an indirect access layer connection with the enterprise side;
and the decision module is connected to each node of each blockchain, acquires shared data from the blockchain, acquires influence factors of the shared data from the data, and initiates a management request to an enterprise terminal according to the influence factors.
5. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the functions of the system of any one of claims 1 to 4 when the program is executed.
6. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, realizes the functions of the system according to any one of claims 1 to 4.
CN202310650256.6A 2023-06-02 2023-06-02 Enterprise management system, medium and electronic equipment based on digital enabling Active CN116384709B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310650256.6A CN116384709B (en) 2023-06-02 2023-06-02 Enterprise management system, medium and electronic equipment based on digital enabling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310650256.6A CN116384709B (en) 2023-06-02 2023-06-02 Enterprise management system, medium and electronic equipment based on digital enabling

Publications (2)

Publication Number Publication Date
CN116384709A CN116384709A (en) 2023-07-04
CN116384709B true CN116384709B (en) 2023-11-07

Family

ID=86971473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310650256.6A Active CN116384709B (en) 2023-06-02 2023-06-02 Enterprise management system, medium and electronic equipment based on digital enabling

Country Status (1)

Country Link
CN (1) CN116384709B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861262A (en) * 2020-07-30 2020-10-30 国网山东省电力公司寿光市供电公司 Enterprise perspective portrait method and terminal based on energy big data
CN113642922A (en) * 2021-08-30 2021-11-12 天元大数据信用管理有限公司 Small and medium-sized micro enterprise credit evaluation method and device
CN113793091A (en) * 2021-08-10 2021-12-14 湖南工商大学 Credible monitoring and cold-chain storage intelligent decision-making method for cold-chain supply chain
CN114638547A (en) * 2022-04-21 2022-06-17 平安国际智慧城市科技股份有限公司 Enterprise strategy intelligent early warning method and device, electronic equipment and storage medium
CN115577386A (en) * 2022-10-09 2023-01-06 湖北普联东文信息科技有限公司 Enterprise credit increase service method and system based on XBRL and block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11374746B2 (en) * 2020-05-31 2022-06-28 AT&T Global Network Services Hong Kong LTD Time-aware blockchain staged regulatory control of internet of things data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861262A (en) * 2020-07-30 2020-10-30 国网山东省电力公司寿光市供电公司 Enterprise perspective portrait method and terminal based on energy big data
CN113793091A (en) * 2021-08-10 2021-12-14 湖南工商大学 Credible monitoring and cold-chain storage intelligent decision-making method for cold-chain supply chain
CN113642922A (en) * 2021-08-30 2021-11-12 天元大数据信用管理有限公司 Small and medium-sized micro enterprise credit evaluation method and device
CN114638547A (en) * 2022-04-21 2022-06-17 平安国际智慧城市科技股份有限公司 Enterprise strategy intelligent early warning method and device, electronic equipment and storage medium
CN115577386A (en) * 2022-10-09 2023-01-06 湖北普联东文信息科技有限公司 Enterprise credit increase service method and system based on XBRL and block chain

Also Published As

Publication number Publication date
CN116384709A (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN102291268B (en) Safety domain name server and hostile domain name monitoring system and method based on same
JP4972067B2 (en) User query processing apparatus and method using encrypted modulation of queries in a database containing encrypted columns
US11368446B2 (en) Trusted account revocation in federated identity management
CN105049425A (en) Physical isolation transmission method based on two-dimension code
US20120134491A1 (en) Cloud Storage Data Encryption Method, Apparatus and System
US8332655B2 (en) Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects
CN110830442A (en) Message processing method, device and gateway
CN103561033B (en) User remotely accesses the device and method of HDFS cluster
US11695740B2 (en) Anonymization method and apparatus, device, and storage medium
CN116015767A (en) Data processing method, device, equipment and medium
CN113507483A (en) Instant messaging method, device, server and storage medium
CN110266653B (en) Authentication method, system and terminal equipment
CN116384709B (en) Enterprise management system, medium and electronic equipment based on digital enabling
CN102546293B (en) High speed network flow network address measuring method based on Hash bit string multiplexing
CN114615031A (en) File storage method and device, electronic equipment and storage medium
US9288116B2 (en) System and method for NAS server test load generation
US20090254637A1 (en) Coding method of vector network address
CN115858322A (en) Log data processing method and device and computer equipment
CN115017523A (en) Distributed data security encryption method, transmission method and related device
CN105530327A (en) DNS (domain name system) key information processing method and system
CN111950031A (en) Block chain-based distributed data management method, terminal device and storage medium
CN113127109A (en) Interface calling method and device, electronic equipment and readable storage medium
Grimm et al. Flow-based aggregation of CAN frames with compressed payload
CN115152180A (en) Improved packet transmission
CN117614607B (en) Information security transmission system and method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant