[go: up one dir, main page]

CN113362042B - Government affair service integrated management workflow design modeling method - Google Patents

Government affair service integrated management workflow design modeling method Download PDF

Info

Publication number
CN113362042B
CN113362042B CN202110756234.9A CN202110756234A CN113362042B CN 113362042 B CN113362042 B CN 113362042B CN 202110756234 A CN202110756234 A CN 202110756234A CN 113362042 B CN113362042 B CN 113362042B
Authority
CN
China
Prior art keywords
data
protection
model
safety
decoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110756234.9A
Other languages
Chinese (zh)
Other versions
CN113362042A (en
Inventor
周宏文
李柏林
马小明
周安强
李晶
张建
刘佳川
黎欢
万斯奇
胡源
侯伟
戴一明
赵根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Planning And Natural Resources Information Center
Original Assignee
Chongqing Planning And Natural Resources Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Planning And Natural Resources Information Center filed Critical Chongqing Planning And Natural Resources Information Center
Priority to CN202110756234.9A priority Critical patent/CN113362042B/en
Publication of CN113362042A publication Critical patent/CN113362042A/en
Application granted granted Critical
Publication of CN113362042B publication Critical patent/CN113362042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a government affair service integrated management workflow design modeling method, which comprises the following steps: s1, customizing a workflow model; the model is exported after being constructed, and can be used for quickly establishing a workflow model in other environments; s2, setting basic attributes of the workflow link, setting process node attributes and determining a working link; s3, setting a work link distribution strategy, formulating non-topological multi-factor government affair service processing workflow circulation conditions, and completing informatization modeling required by each link of government affair service processing; and S4, completing the establishment of the workflow model, creating a flow example in the business, and completing the actual government business processing according to the workflow model path and the rules. The invention can integrate the non-topological multi-factor government affair service processing workflow into the system construction model, ensure the safety of the derived model and improve the user experience.

Description

Government affair service integrated management workflow design modeling method
Technical Field
The invention relates to the technical field of electronic government affairs, in particular to a design modeling method for an integrated management workflow of government affair business.
Background
Due to the application of electronic government affairs is deepened and popularized continuously, a business processing model in the government affair business processing process changes a lot, especially in the aspect of non-topological multi-factor government affair business processing, an effective mode for solving business logic and business circulation modes in the business processing model cannot be found all the time, and the business logic and business circulation modes are difficult points and pain points of electronic government affair application. In order to effectively comb complex government affair business logic, technical personnel are urgently needed to solve the technical problem of non-topological multi-factor government affair business processing.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a government affair business integrated management workflow design modeling method.
In order to achieve the above object, the present invention provides a government affair business integrated management workflow design modeling method, which includes the following steps:
s1, customizing a workflow model, dragging a process node and a process line workflow link, and constructing a non-topological multi-factor government affair service processing workflow in the system according to an actual process; the model is exported after being constructed, and can be used for quickly establishing a workflow model in other environments;
s2, setting basic attributes of the workflow link, setting process node attributes and determining a working link; setting flow line attributes and determining the trend and direction of the flow; the informatization modeling of the requirements of each link of government affair business processing is completed through the self-defined setting of the flow nodes and the flow lines;
s3, setting a work link distribution strategy, making a non-topological multi-factor government affair service processing workflow circulation condition, and completing informatization modeling required by each link of government affair service processing;
and S4, completing the establishment of the workflow model, creating a flow example in the business, and completing the actual government business processing according to the workflow model path and the rules.
In a preferred embodiment of the present invention, the S1 includes:
s1-1, the flow nodes of the user-defined workflow page comprise one or any combination of a start node, an end node, a task node, a joint node, a branch node and a compound node, and related nodes are dragged to finish node drawing;
s1-2, dragging the process node to an edit page, connecting the nodes by a process line, and completing the association between the nodes;
and S1-3, dragging the process nodes and changing the trend and direction of the process line to complete the adjustment of the process execution sequence.
In a preferred embodiment of the present invention, the S2 process node attribute includes a process node basic attribute and/or a process node extended attribute, where the process node basic attribute includes one or any combination of a link name, a link number, a transaction number, a service role, and a visible form, and the process node extended attribute includes one or any combination of an opinion filling column, a link group name, a primary ring node transactor, a role node belonging, an opinion column, a toolbar, and a default receiver;
or/and the flow line attributes include: one or any combination of flow direction name, flow number, starting node, terminating node, service state, operation type and arrangement sequence;
or/and said S3 comprises:
s3-1, selecting a first distribution strategy and a subsequent distribution strategy to complete the setting of the selection mode of the procedure tie;
s3-2, setting flow direction logic conditions and determining flow execution rules;
s3-3, setting an event expression and customizing a flow direction logic condition;
and/or said S4 includes: in the process example creation, business circulation is carried out according to the model, and the actual government business processing is completed; the workflow instance is presented in the system in the form of a form flow.
In a preferred embodiment of the present invention, the branch node: when the branch sending is set, the task receivers comprise multiple persons and one person; according to the branch polymerization condition, the method comprises two conditions of multi-division single polymerization and single division single polymerization;
in a preferred embodiment of the present invention, the allocation policy includes: assigned to a specific person, assigned to a transacted person, prioritized in-role occupation, prioritized by multiple persons, collaborated transacting by multiple persons, transacted by multiple persons, or any combination thereof.
In a preferred embodiment of the present invention, in step S1, model security protection is performed on the built model before derivation, and the method for model security protection includes the following steps:
s11, performing primary safety protection on the constructed model to obtain primary safety protection data;
s12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data;
s13, the enhanced protection data A obtained in the step S122Carrying out data protection safety protection to obtain protection safety protection data;
and S14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method adopted is implemented by an encryption code of a model user to be exported and constructed;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the built model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encrypted code of a user of the model to be exported and built;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by a system;
or, in step S11, performing primary security protection on the constructed model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the constructed model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code of a model user to be exported and constructed;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection safety protection is realized by adopting an encryption code of a model user to be exported and constructed;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection safety protection is realized by adopting an encryption code preset by the system.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if it storesIf the keyword exists in the cloud, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is equal to 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or/and step S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the following operations are performed on the downloaded data:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, 1421, decode the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or S1421, the downloaded data is implemented by using the decryption code of the model user to be exported and constructed, so as to obtain the first decoded data;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the second decoded data obtained in the step S1422 by using a decryption code preset by the system, so as to obtain the decoded data.
In a preferred embodiment of the invention, the following operations are performed on the decoded data:
s14231, performing comparison code calculation on the decoded data;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data to form a constructed model;
and if the comparison code is inconsistent with the search word, re-decoding the downloaded data.
In conclusion, due to the adoption of the technical scheme, the non-topological multi-factor government affair service processing workflow can be merged into the system construction model, the safety of the exported model can be ensured, and the user experience is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
FIG. 2 is a schematic diagram showing a two-dimensional code of a search term according to the present invention.
FIG. 3 is a schematic diagram showing a one-dimensional array according to the present invention.
Fig. 4 is a schematic illustration of the present invention.
Fig. 5 is a schematic illustration of the present invention.
FIG. 6 is a schematic diagram of a fill-in array according to the present invention.
FIG. 7 is a schematic diagram illustrating two-dimensional code display of filled-in characters according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a government affair business integrated management workflow design modeling method, which comprises the following steps as shown in figure 1:
s1, customizing a workflow model, dragging flow nodes and flow line workflow links, and constructing a non-topological multi-factor government affair service processing workflow in the system according to an actual flow; the model is exported after being constructed, and can be used for quickly establishing a workflow model in other environments;
s2, setting basic attributes of the workflow link, setting process node attributes and determining a working link; setting flow line attributes and determining the trend and direction of the flow; the informatization modeling of the requirement of each link of government affair business processing is completed through the self-defined setting of flow nodes and flow lines;
s3, setting a work link distribution strategy, making a non-topological multi-factor government affair service processing workflow circulation condition, and completing informatization modeling required by each link of government affair service processing;
and S4, completing the establishment of the workflow model, creating a flow example in the business, and completing the actual government business processing according to the workflow model path and the rules.
In a preferred embodiment of the present invention, the S1 includes:
s1-1, the flow nodes of the user-defined workflow page comprise one or any combination of a start node, an end node, a task node, a joint node, a branch node and a compound node, and related nodes are dragged to finish node drawing;
s1-2, dragging the flow nodes to an editing page, connecting the nodes by flow lines, and completing the association between the nodes;
s1-3, dragging the process nodes and changing the trend and direction of the process line to complete the adjustment of the process execution sequence;
or/and the flow node attribute of S2 includes flow node basic attribute or/and flow node extended attribute, the flow node basic attribute includes one or any combination of link name, link number, handling days, service role and visible form, the flow node extended attribute includes one or any combination of opinion filling column, link group name, original ring handling person, role node belonging, opinion column, toolbar and default receiver;
or/and the flow line attributes include: one or any combination of flow direction name, flow number, starting node, terminating node, service state, operation type and arrangement sequence;
or/and said S3 comprises:
s3-1, selecting a first distribution strategy and a subsequent distribution strategy to complete the setting of the selection mode of the procedure tie;
s3-2, setting flow direction logic conditions and determining flow execution rules;
s3-3, setting an event expression and customizing a flow direction logic condition;
or/and said S4 comprises: in the process example creation, business circulation is carried out according to the model, and the actual government business processing is completed; the workflow instance is presented in the system in the form of a form flow.
In a preferred embodiment of the present invention, the branch node: when the branch sending is set, the task receivers comprise multiple persons and one person; according to the branch polymerization condition, the method comprises two conditions of multi-division single polymerization and single division single polymerization;
or/and the allocation policy comprises: assigned to a specific person, assigned to a transacted person, prioritized in-role occupation, prioritized by multiple persons, collaborated transacting by multiple persons, transacted by multiple persons, or any combination thereof.
In a preferred embodiment of the present invention, in step S1, model security protection is performed on the built model before derivation, and the method for model security protection includes the following steps:
s11, carrying out first safety protection on the constructed model to obtain first safety protection data thereof, and recording the first safety protection data as A1(ii) a The model which is constructed for the first security protection is recorded as A0
S12, the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data; record its enhanced protection data as A2
S13, the enhanced protection data A obtained in the step S122Performing data protection and safety protection to obtain protection and safety protection data, and recording the protection and safety protection data as A3(ii) a Its protection safety protection data A3Namely the security data to be exported;
s14, exporting the safety data to be exported in the step S13.
In a preferred embodiment of the present invention, in step S11, performing first security protection on the built model to obtain first security protection data thereof, where the first security protection method is implemented by an encryption code of a user of the model to be derived;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the built model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encrypted code of a user of the model to be exported and built;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection safety protection is realized by adopting an encryption code preset by the system;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code received by a system;
or, in step S11, performing primary security protection on the constructed model to obtain primary security protection data thereof, where the primary security protection method is implemented by an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code of a model user to be exported and constructed;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code of a model user to be exported and constructed;
or, in step S11, performing first security protection on the constructed model to obtain first security protection data thereof, where the first security protection method is implemented by the encryption code received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by the system.
In a preferred embodiment of the present invention, in step S14, the security data to be exported in step S13 is exported and stored in the desktop, and the following operations are performed on the security data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop, wherein the method for keyword calculation comprises the following steps:
Key words=MD mathematical(Security data),
wherein, the Security data represents the Security data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
the MD physical () represents a keyword operation function using one of MD5, sha1, sha256, sha 512;
keywords represent keywords calculated by using a keyword operation function;
s142, uploading the keyword obtained by the calculation in the step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; the process returns to step S143.
In a preferred embodiment of the present invention, in step S142 or/and step S144, the secure data uploaded to the storage cloud is downloaded by the search word, and the following operations are performed on the downloaded data:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, S1421, decoding the downloaded data by using the encryption code received by the system, to obtain the decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using a decryption code preset by the system to obtain decoded data thereof;
or, S1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, the decoding data II obtained in the step S1422 is realized by using the decryption code of the model user to be exported and constructed, and the decoding data is obtained;
or, 1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, decoding the decoded data II obtained in the step S1422 by using the encryption code received by the system to obtain the decoded data;
or, S1421, the downloaded data is implemented by using the decryption key of the model user to be exported and constructed, so as to obtain the decoding data I;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof. In the embodiment, the encryption code of the model user to be exported and constructed is the public key of the operation user, the encryption code preset by the system is the private key of the system, the decryption code preset by the system is the public key of the system, and the decryption code of the model user to be exported and constructed is the private key of the operation user; the encryption code received by the system is obtained by inputting a public key of an operating user or a public key of the system into a keyword operation function of one of MD5, sha1, sha256 and sha512, the public key of the operating user and a private key of the operating user are a pair of asymmetric keys, the public key of the system and the private key of the system are a pair of asymmetric keys, the data encrypted by the private key can only be decoded by the public key, the data encrypted by the public key can only be decoded by the private key, and the encryption code received by the system is a symmetric encryption algorithm.
In a preferred embodiment of the invention, the following operations are performed on the decoded data:
s14231, performing comparison code calculation on the decoded data, where the comparison code calculation method is as follows:
Figure BDA0003147611100000141
wherein, the Decoded data represents the Decoded data of the keyword operation function of one of the input MD5, sha1, sha256 and sha 512;
n represents the total number of times the keyword operation function is performed at step S142 or S144;
the Contrast code represents a comparison code calculated by a keyword operation function;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data to form a constructed model;
and if the comparison code is inconsistent with the search word, re-decoding the downloaded data.
In a preferred embodiment of the present invention, in step S142 or S144, the search term is obtained in the following manner:
s1441, converting the search term through a two-dimensional code converter to obtain a two-dimensional code of the search term;
s1442, converting the search term two-dimensional code obtained in the step S1441 into a two-dimensional code array, namely
Figure BDA0003147611100000151
Wherein,
Figure BDA0003147611100000152
x is a positive integer less than or equal to X, Y is a positive integer less than or equal to Y, X represents the total number of rows in the two-dimensional code array, Y represents the total number of columns in the two-dimensional code array, PX,YRepresenting a two-dimensional code array when px,yWhen the number is equal to 1, the two-dimensional code of the search word is a black square, and when the number is p, the two-dimensional code of the search word is a black squarex,yWhen the number is equal to 0, the two-dimensional code of the search word is a white square, Qx,yRepresenting a search term two-dimensional code;
s1443, converting the two-dimensional code array into a one-dimensional array, PX*Y′=(p1′ p2′ p3′ … pX*Y') denotes a one-dimensional array, i.e. p1′=p1,1,p2′=p1,2,p3′=p1,3,……,pY′=p1,Y
pY+1′=p2,1,pY+2′=p2,2,pY+3′=p2,3,……,p2*Y′=p2,Y
p2*Y+1′=p3,1,p2*Y+2′=p3,2,p2*Y+3′=p3,3,……,p3*Y′=p3,Y
p3*Y+1′=p4,1,p3*Y+2′=p4,2,p3*Y+3′=p4,3,……,p4*Y′=p4,Y
Figure BDA0003147611100000153
p(X-1)*Y+1′=pX,1,p(X-1)*Y+2′=pX,2,p(X-1)*Y+3′=pX,3,……,pX*Y′=pX,Y(ii) a Wherein p isX′' denotes the X ' th element from left to right in the one-dimensional array, X ' being a positive integer less than or equal to X Y;
p1' means a one-dimensional arrayFrom left to right of the 1 st element, p2' denotes the 2 nd element from left to right in a one-dimensional array, p3' denotes the 3 rd element from left to right in a one-dimensional array, pY' denotes the Y-th element from left to right in a one-dimensional array, pY+1' denotes the Y +1 th element from left to right in a one-dimensional array, pY+2' denotes the Y +2 th element from left to right in the one-dimensional array, pY+3' denotes the Y +3 th element from left to right in a one-dimensional array, p2*Y' denotes the 2 x Y-th element from left to right in a one-dimensional array, p2*Y+1' denotes the 2 x Y +1 th element from left to right in the one-dimensional array, p2*Y+2' denotes the 2 x Y +2 th element from left to right in the one-dimensional array, p2*Y+3' denotes the 2 x Y +3 th element from left to right in the one-dimensional array, p3*Y' denotes the 3 x Y-th element from left to right in a one-dimensional array, p(X-1)*Y+1' denotes the left-to-right (X-1) × Y +1 elements, p, in a one-dimensional array(X-1)*Y+2' denotes the left-to-right (X-1) × Y +2 elements, p, in a one-dimensional array(X-1)*Y+3' denotes the left-to-right (X-1) × Y +3 elements, p, in a one-dimensional arrayX*Y' denotes the left-to-right, X Y elements in the one-dimensional array;
s1444, sequentially filling the search words into element positions which are equal to 0 in the one-dimensional array, and after filling, randomly filling characters into the element positions which are equal to 1 among the filled search words; the characters comprise numeric characters 0-9, or/and upper-case characters A-Z, or/and lower-case characters a-Z.
S1445, extracting the filled characters in sequence to obtain the filled characters and filling arrays corresponding to the filled characters; converting the filled characters through a two-dimensional code converter to obtain filled character two-dimensional codes; filling the characters into the two-dimensional code and displaying the two-dimensional code on a download page. For example, assume its term http:// www.cnipa.gov.cn; the search term http:// www.cnipa.gov.cn is converted by a two-dimensional code converter to obtain the search term two-dimensional code shown in FIG. 2, wherein the search term two-dimensional code is 29 × 29 squares. The two-dimensional code array shown in fig. 2 is converted into a one-dimensional array, and since one row of the one-dimensional array has 841 squares, only the first two rows of the two-dimensional code of the search term shown in fig. 2 form the one-dimensional array shown in fig. 3. Sequentially filling the search word http:// www.cnipa.gov.cn into the element positions equal to 0 in the one-dimensional array shown in FIG. 3; after filling as shown in fig. 4. Then randomly filling the numeric characters 0-9, the capital characters A-Z and the small characters a-Z into element positions which are filled among the search terms and equal to 1; as shown in fig. 5. The filled characters are extracted in turn to obtain the filling array corresponding to the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn and the filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovp 1.cn, as shown in FIG. 6. The filled character a09mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnispnMqa3. rrdYgdovv 1.cn is converted by a two-dimensional code converter, and the filled character two-dimensional code shown in FIG. 7 is obtained. The character-filled two-dimensional code shown in fig. 7 is displayed on a download page.
S1446, scanning the two-dimensional code displayed on the downloaded page through the two-dimensional code scanner to obtain scanned characters of the two-dimensional code;
s1447, sequentially filling the scanned characters into the filling array, and extracting the characters filled in the white squares to obtain a search term;
and S1448, rapidly retrieving the storage position of the safety data from the storage cloud according to the search word, and downloading the storage position. Scanning the two-dimensional code shown in the figure 7 and displayed on the download page by using a two-dimensional code scanner to obtain a scanning character a09 mAeHhtTtp:/xXe/wGIwSFLwswjj7w.cnispnMqa 3. rrdYgdovv 1. cn; filling the scanning character a09 mAeHhtTtp:/xXe/wgIwSFLwswj7w.cnisnMqa3. rrdYgdovv 1.cn into the filling array in sequence as shown in FIG. 6, extracting the characters filled in the white squares as shown in FIG. 5, and obtaining the search word http:// www.cnipa.gov.cn; and rapidly retrieving the storage position of the safety data from the storage cloud according to the retrieval word http:// www.cnipa.gov.cn for downloading.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (21)

1. A government affair service integrated management workflow design modeling method is characterized by comprising the following steps:
s1, customizing a workflow model, dragging a process node and a process line workflow link, and constructing a non-topological multi-factor government affair service processing workflow in the system according to an actual process; the model is exported after being constructed, and can be used for quickly establishing a workflow model in other environments; in step S1, model security protection is performed on the built model before derivation, and the method for model security protection includes the following steps:
s11, performing primary safety protection on the constructed model to obtain primary safety protection data;
s12, for the first safety protection data A obtained in the step S111Carrying out data enhancement protection to obtain enhanced protection data of the data;
s13, the enhanced protection data A obtained in the step S122Carrying out data protection safety protection to obtain protection safety protection data;
s14, exporting the security data to be exported in the step S13; exporting the safety data to be exported and storing the safety data in the desktop, and executing the following operations on the safety data stored in the desktop:
s141, performing keyword calculation on the safety data stored on the desktop;
s142, uploading the keyword obtained by calculation in step S141 to a storage cloud, and determining whether the storage cloud has the keyword:
if the keyword does not exist in the storage cloud, the safety data corresponding to the keyword are uploaded to the storage cloud, the keyword and the safety data are bound to be used as a search word, and the keyword and the safety data can be quickly searched from the storage cloud to a storage position of the safety data for downloading;
if the keyword exists in the storage cloud end, order a0Key words; if i is 0, executing the next step;
S143,ai+1=MD mathematical(ai),
wherein, ai+1Represents the i +1 th repeated word;
airepresenting the ith repeated word; when i is 0, a0Represents a0 th repeated word;
s144, uploading the i +1 th repeated word calculated in step S143 to a cloud storage, and determining whether the i +1 th repeated word exists in the cloud storage:
if the (i + 1) th repeated word does not exist in the storage cloud, the safety data corresponding to the (i + 1) th repeated word is uploaded to the storage cloud, the (i + 1) th repeated word and the safety data are bound to be used as a search word, and the search word can be quickly retrieved from the storage cloud to the storage position of the safety data for downloading;
if the i +1 th repeated word exists in the storage cloud, i is equal to i + 1; returning to step S143;
s2, setting basic attributes of the workflow link, setting process node attributes and determining a working link; setting flow line attributes, and determining the trend and direction of the flow; the informatization modeling of the requirements of each link of government affair business processing is completed through the self-defined setting of the flow nodes and the flow lines;
s3, setting a work link distribution strategy, making a non-topological multi-factor government affair service processing workflow circulation condition, and completing informatization modeling required by each link of government affair service processing;
and S4, completing the establishment of the workflow model, creating a flow example in the business, and completing the actual government business processing according to the workflow model path and the rules.
2. The modeling method for government affair business integrated management workflow design according to claim 1, wherein the S1 includes:
s1-1, the flow nodes of the user-defined workflow page comprise one or any combination of a start node, an end node, a task node, a joint node, a branch node and a compound node, and related nodes are dragged to finish node drawing;
s1-2, dragging the process node to an edit page, connecting the nodes by a process line, and completing the association between the nodes;
and S1-3, dragging the process nodes and changing the trend and direction of the process line to complete the adjustment of the process execution sequence.
3. The method for modeling government affair service integrated management workflow design according to claim 1, wherein the S2 process node attributes include process node basic attributes including one or any combination of link name, link number, handling days, service role and visible form or process node extended attributes including one or any combination of opinion filling column, link group name, original link handling person, role node belonging, opinion column, toolbar and default receiver.
4. The method for modeling government affair service integrated management workflow design according to claim 1, wherein the flow line attributes include: flow name, flow number, starting node, terminating node, service state, operation type, and arrangement order, or any combination thereof.
5. The modeling method for government affair business integrated management workflow design according to claim 1, wherein the S3 includes:
s3-1, selecting a first distribution strategy and a subsequent distribution strategy to complete the setting of the selection mode of the procedure tie;
s3-2, setting flow direction logic conditions and determining flow execution rules;
and S3-3, setting an event expression and customizing a flow logic condition.
6. The modeling method for government affair business integrated management workflow design according to claim 1, wherein the S4 includes: in the process example creation, business circulation is carried out according to the model, and the actual government business processing is completed; the workflow instance is presented in the system in the form of a form flow.
7. The government affair service integrated management workflow design modeling method according to claim 2, wherein the branch node: when the branch sending is set, the task receivers comprise multiple persons and one person; according to the branched polymerization, the method comprises two cases of multi-division single polymerization and single division single polymerization.
8. The method for modeling government affair business integrated management workflow design according to claim 1, wherein the allocation policy includes: assigned to a specific person, assigned to a transacted person, prioritized in-role occupation, prioritized by multiple persons, collaborated transacting by multiple persons, transacted by multiple persons, or any combination thereof.
9. The government affair business integrated management workflow design modeling method according to claim 1, wherein in step S11, the built model is subjected to first security protection to obtain first security protection data thereof, and the first security protection method adopted by the method is implemented by using the encrypted codes of the user who wants to derive the built model;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting the encryption codes received by the system.
10. The government affair service integrated management workflow design modeling method according to claim 1, wherein in step S11, the built model is subjected to first security protection to obtain first security protection data thereof, and the first security protection method adopted by the method is implemented by using an encryption code of a user of the built model to be exported;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data;the data protection and safety protection are realized by adopting an encryption code preset by the system.
11. The government affair service integrated management workflow design modeling method according to claim 1, wherein in step S11, the constructed model is subjected to first security protection to obtain first security protection data thereof, and the first security protection method adopted by the method is implemented by preset encryption codes of the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting the encryption codes received by the system.
12. The government affair service integrated management workflow design modeling method according to claim 1, wherein in step S11, the constructed model is subjected to primary security protection to obtain primary security protection data thereof, and the primary security protection method is implemented by using an encryption code preset by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code received by a system;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting the encryption codes of the model users to be exported and constructed.
13. The government affair service integrated management workflow design modeling method according to claim 1, wherein in step S11, the built model is subjected to first security protection to obtain first security protection data thereof, and the first security protection method is implemented by using the encryption codes received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code preset by a system;
in step S13, the resulting enhanced protection data a is transmitted2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting the encryption codes of the model users to be exported and constructed.
14. The government affair service integrated management workflow design modeling method according to claim 1, wherein in step S11, the built model is subjected to first security protection to obtain first security protection data thereof, and the first security protection method is implemented by using the encryption codes received by the system;
in step S12, the obtained first security protection data a is subjected to1Carrying out data enhancement protection to obtain enhanced protection data of the data; the data enhancement protection is realized by adopting an encryption code of a model user to be exported and constructed;
in step S13, the obtained enhanced protection data a2Carrying out data protection safety protection to obtain protection safety protection data; the data protection and safety protection are realized by adopting an encryption code preset by the system.
15. The modeling method for government affair business integrated management workflow design according to claim 1, wherein in step S142 or/and S144, the secure data uploaded to the storage cloud is downloaded through the search term, and the downloaded data is subjected to the following operations:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
and S1423, implementing the decoding data II obtained in the step S1422 by using the decryption code of the model user to be exported and constructed, and obtaining the decoding data.
16. The modeling method for government affair business integrated management workflow design according to claim 1, wherein in step S142 or/and S144, the secure data uploaded to the storage cloud is downloaded through the search term, and the downloaded data is subjected to the following operations:
s1421, decoding the downloaded data by using the encryption code received by the system to obtain decoded data I;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof.
17. The modeling method for government affair business integrated management workflow design according to claim 1, wherein in step S142 or/and S144, the secure data uploaded to the storage cloud is downloaded through the search term, and the downloaded data is subjected to the following operations:
s1421, decoding the downloaded data by using a decryption code preset by the system to obtain decoded data I;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
and S1423, implementing the decoding data II obtained in the step S1422 by using the decryption code of the model user to be exported and constructed, and obtaining the decoding data.
18. The modeling method for government affair business integrated management workflow design according to claim 1, wherein in step S142 or/and S144, the secure data uploaded to the storage cloud is downloaded through the search term, and the downloaded data is subjected to the following operations:
1421, decoding the downloaded data by using a decryption key preset by the system, to obtain decoded data one;
s1422, the decoding data I obtained in the step S1421 is realized by using the decryption code of the model user to be exported and constructed, and decoding data II of the decoding data I is obtained;
s1423, the decoding data II obtained in the step S1422 is decoded by using the encryption code received by the system, so as to obtain the decoding data.
19. The modeling method for government affair business integrated management workflow design according to claim 1, wherein in step S142 or/and S144, the secure data uploaded to the storage cloud is downloaded through the search term, and the downloaded data is subjected to the following operations:
s1421, the downloaded data is decrypted by using the model user to be exported and constructed, and decoded data I of the downloaded data is obtained;
s1422, decoding the first decoded data obtained in the step S1421 by using a decryption code preset by the system to obtain second decoded data;
s1423, the decoded data II obtained in the step S1422 is decoded by using the encryption code received by the system, so as to obtain the decoded data.
20. The modeling method for government affair business integrated management workflow design according to claim 1, wherein in step S142 or/and S144, the secure data uploaded to the storage cloud is downloaded through the search term, and the downloaded data is subjected to the following operations:
s1421, the downloaded data is realized by using the decryption code of the model user to be exported and constructed, and decoding data I of the downloaded data is obtained;
s1422, decoding the first decoded data obtained in the step S1421 by using the encryption code received by the system to obtain second decoded data;
s1423, decoding the decoded data two obtained in step S1422 by using a decryption key preset by the system, so as to obtain decoded data thereof.
21. A government affair service integrated management workflow design modeling method according to any one of claims 15-20, wherein the following is performed on decoded data:
s14231, performing comparison code calculation on the decoded data;
s14232, comparing whether the comparison code is consistent with the search word:
if the comparison code is consistent with the search word, decoding the data to form a constructed model;
if the comparison code is not consistent with the search word, the downloaded data is re-decoded.
CN202110756234.9A 2021-07-05 2021-07-05 Government affair service integrated management workflow design modeling method Active CN113362042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110756234.9A CN113362042B (en) 2021-07-05 2021-07-05 Government affair service integrated management workflow design modeling method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110756234.9A CN113362042B (en) 2021-07-05 2021-07-05 Government affair service integrated management workflow design modeling method

Publications (2)

Publication Number Publication Date
CN113362042A CN113362042A (en) 2021-09-07
CN113362042B true CN113362042B (en) 2022-06-17

Family

ID=77538164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110756234.9A Active CN113362042B (en) 2021-07-05 2021-07-05 Government affair service integrated management workflow design modeling method

Country Status (1)

Country Link
CN (1) CN113362042B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1978468A1 (en) * 2007-04-04 2008-10-08 Sap Ag A method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system
WO2017156160A1 (en) * 2016-03-08 2017-09-14 PeerNova, Inc. Management of workflows

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082970A (en) * 2007-07-05 2007-12-05 山东浪潮齐鲁软件产业股份有限公司 Method for realizing government affairs examination and approval workflow engines system
CN103593476B (en) * 2013-11-28 2017-01-25 中国科学院信息工程研究所 Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage
CN109389299B (en) * 2018-09-26 2023-10-31 中国平安人寿保险股份有限公司 Workflow process deployment method, workflow process deployment device, computer equipment and storage medium
CN111382214B (en) * 2018-12-11 2023-07-07 星际空间(天津)科技发展有限公司 Comprehensive pipe rack operation and maintenance management system based on 3DGIS BIM
CN111221606A (en) * 2019-12-29 2020-06-02 苏州宏软信息技术有限公司 Device management workflow service control method based on Activiti control
CN112329820B (en) * 2020-10-21 2022-12-27 北京邮电大学 Method and device for sampling unbalanced data under federal learning

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1978468A1 (en) * 2007-04-04 2008-10-08 Sap Ag A method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system
WO2017156160A1 (en) * 2016-03-08 2017-09-14 PeerNova, Inc. Management of workflows

Also Published As

Publication number Publication date
CN113362042A (en) 2021-09-07

Similar Documents

Publication Publication Date Title
EP2202912A1 (en) Method and apparatus for camouflaging of data, information and functional transformations
EP2154878A1 (en) Image encyption device, image decyption device, method, and program
EP1374464A1 (en) Method and apparatus for camouflaging of data, information and functional transformations
CN111192187B (en) Decryption method and system
CN116015982B (en) Encryption and decryption methods and equipment for network security data transmission
CN117440101A (en) Image encryption algorithm and electronic equipment based on multi-chaotic system and circular DNA operation
CN113362042B (en) Government affair service integrated management workflow design modeling method
CN112733169A (en) Data management method, system and terminal equipment based on block chain
CN112115811A (en) Image processing method and device based on privacy protection and electronic equipment
CN113377352B (en) Big data form modeling generation method for government affair business
CN113377351B (en) Model construction work system for large-scale government affair business
Kumar et al. Secured Cloud Application for Detection of Brain Tumor using Deep Learning Algorithms
CN115001690B (en) Encryption method, device, equipment and storage medium based on magic cube
CN113765650A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN116089984B (en) A leak-proof management method and system for administrative documents
US20200058096A1 (en) Image data encryption and rendering system
CN110414243B (en) Two-dimensional code encryption method and device and two-dimensional code decryption method and device
Jabbar et al. Adaptive Hiding Algorithm Based on Mapping Database.
CN112184841B (en) Block replacement generation type information hiding and recovering method, equipment and medium
KR101751971B1 (en) Image processing method and apparatus for encoded image
Blahová et al. UTILIZATION OF FRACTAL GEOMETRY POSSIBILITIES FOR INFORMATION SYSTEMS SECURITY.
CN112613055A (en) Image processing system and method based on distributed cloud server and digital-image conversion
US20040120515A1 (en) Method and system for solving the word problem in braid group cryptosystems
CN113704725A (en) Key storing and reading method
Farea et al. AI-powered Integrated with Encoding Mechanism Enhancing Privacy, Security, and Performance for IoT Ecosystem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant