[go: up one dir, main page]

CN115081391A - Technical scheme for converting information into character strings by adopting software - Google Patents

Technical scheme for converting information into character strings by adopting software Download PDF

Info

Publication number
CN115081391A
CN115081391A CN202210740462.1A CN202210740462A CN115081391A CN 115081391 A CN115081391 A CN 115081391A CN 202210740462 A CN202210740462 A CN 202210740462A CN 115081391 A CN115081391 A CN 115081391A
Authority
CN
China
Prior art keywords
information
module
enterprise
character string
personal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210740462.1A
Other languages
Chinese (zh)
Inventor
王波涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210740462.1A priority Critical patent/CN115081391A/en
Publication of CN115081391A publication Critical patent/CN115081391A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/126Character encoding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • G06Q10/1053Employment or hiring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a technical scheme for converting information into character strings by adopting software, which comprises a registration module, a conversion module and a conversion module, wherein the registration module is used for registering account information; the login module is used for logging in the software platform; the information input module is used for inputting personal information, enterprise information or related information needing to be transmitted; the character string digit setting module is used for setting the digit of the character string; the generating module converts the input personal information or enterprise information into one or more character strings; the checking module is used for checking the information corresponding to the character strings; and the importing module is used for importing the corresponding table.

Description

Technical scheme for converting information into character strings by adopting software
Technical Field
The invention relates to a technical scheme for converting information into character strings by adopting software, belonging to the technical field of information conversion.
Background
The method solves the problems that the time spent on recording the personal information is inconvenient and quick in social activities, and the confidentiality is poor or no confidentiality exists when information which is needed or not needed by individuals and enterprises is transmitted. Such as: the privacy information of the individual or the enterprise needs to be kept secret, and the information content of the privacy nature such as the address of the individual or the enterprise, the contact information of the individual or the enterprise, the medical information of the individual doctor and the like.
The technical scheme provides a technical scheme for converting information into character strings by adopting software, no software for directly or indirectly converting the information into the information codes of the characters exists at present, although the software of the two-dimensional codes exists, the two-dimensional codes are inconvenient to transmit in some occasions, and the information codes in the form of the characters need to be formed, so that the method is more suitable for information transmission of part of industries. Such as: map navigation, logistics express transportation, confidentiality maintenance of an information transfer process, missing people searching, medical first aid and other industries or production lives.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a technical scheme for converting information into character strings by adopting software.
In order to achieve the purpose, the invention adopts the following technical scheme:
a technical scheme for converting information into character strings by adopting software comprises
The registration module is used for registering account information;
the login module is used for logging in the software platform;
the information input module is used for inputting personal information and enterprise information or related information needing to be transmitted;
the character string digit setting module is used for setting the digit of the character string;
the generating module converts the input personal information or enterprise information into one or more character strings;
the checking module is used for checking the information corresponding to the character string;
and the importing module is used for importing the corresponding table.
Preferably, a personal information input unit and a business information input unit are included, which include a modification sub-unit, an encryption unit and a decryption unit.
Preferably, the personal information input unit is used for inputting and filling personal information, wherein the personal information comprises names, contact information, family addresses, company addresses, personal resumes, medical information and other information.
Preferably, the enterprise information input unit is used for inputting enterprise information, and the enterprise information includes an enterprise name, a contact address, an enterprise introduction, and other information.
Preferably, the modification unit is used for modifying the stored personal information or the enterprise information, and the encryption unit is used for selectively keeping secret or disclosing the input personal information or the enterprise information.
The invention has the following beneficial effects:
the software platform for converting the information into the character string not only can convert the content belonging to the personal information or the enterprise information into the character string, but also can convert other information which is associated with the personal information or the enterprise information and expressed by characters, numbers and letters into the character string, can effectively protect the privacy of an information holder and quickly, effectively and accurately carry out the convenience of information transmission, and comprehensively realizes an information transmission mode combining the convenience and timeliness of the information, the information accuracy and the information privacy.
The business model innovation applied by the technical scheme can show that the method has little effect on improving convenient communication and efficiency among businesses, saving social cost of related industries, improving the health and welfare of people and adapting to the increasing demand of social citizens on information privacy.
Drawings
FIG. 1 is a block diagram illustrating a technical solution of converting information into a character string by using software according to the present invention;
fig. 2 is a flow chart of converting information into character strings according to a technical scheme of converting information into character strings by using software according to the present invention.
Detailed Description
The invention is illustrated by the following specific examples, which are not intended to be limiting.
Referring to fig. 1-2, a technical solution for converting information into a character string by using software includes a registration module, configured to register account information;
the login module is used for logging in the software platform;
the information input module is used for inputting personal information and enterprise information or related information required to be transmitted, and comprises a personal information input unit and an enterprise information input unit, wherein the personal information input unit and the enterprise information input unit comprise a modification subunit, an encryption unit and a decryption unit;
the personal information input unit is used for inputting and filling personal information, wherein the personal information comprises names, contact ways, family addresses, company addresses, personal resumes, medical information and other information;
the enterprise information input unit is used for inputting enterprise information, wherein the enterprise information comprises an enterprise name, a contact way, an enterprise address, an enterprise introduction and other information;
the modification unit is used for modifying the stored personal information or the enterprise information, and the encryption unit is used for selectively keeping secret or disclosing the input personal information or the enterprise information.
The character string digit setting module is used for setting the digit of the character string and setting the digit according to the actual needs of a registrant during specific use;
the generating module converts the input personal information or enterprise information into one or more character strings;
the checking module is used for checking the information corresponding to the character string;
the import module is used for importing a corresponding table, the corresponding table records characters, numbers and letters corresponding to each character string, the corresponding relations between the characters, numbers and characters on the corresponding table and the character strings are in one-to-one correspondence and are fixed, if the corresponding relations between the characters, numbers and characters on the corresponding table are replaced by letters A, the characters of plum are replaced by numbers 091 in the corresponding table, and the characters of week are mixed 4+ A of the numbers and the letters in the corresponding table and correspond to each other, namely A is the characters of king, 091 is the characters of plum, and 4+ A is the characters of week, wherein the one-to-one correspondence relations are invariable since the corresponding table is established. After the corresponding table is imported into the software through the import module, the personal information or the enterprise information can use the software to export a string of characters consisting of numbers, letters and special symbols according to the corresponding table, and the first generated character of the string is represented by f (1);
according to the amount of personal information or enterprise information literal information, f (1) can be known to be a very long character string in advance, so that in order to conveniently enter f (2) into software for subsequent use, the software is used for randomly generating a character string with at least 1 digit number or n (n >1) digit number, the character string generated for the second time is represented by f (2), and f (2) is also a number/letter/special coincidence which can be input by the software; under the same f (1) condition, a character string is randomly generated every time, and different character strings can be generated by randomly generating for many times: f (2), f
(3) … … f (n); but f (2), f (3) … … f (n) need to be set in software without any relationship or logical relationship between them.
The commonality of f (1) and f (2) is: the character strings which are formed by combining numbers/letters/special symbols or singly combining the numbers/letters/special symbols can be input by software; the difference between f (1) and f (2) is: f (1) is a character string generated by a one-to-one correspondence table which is set in advance and is imported into software, if the characters of the personal information or the enterprise information are not changed, the f (1) character string is a fixed character string value, and if the information changes, f
(1) Will change correspondingly, f (1) is a string of character with very long digits; f (2) is generated randomly by software, and in special case, it can also be a character string which is not repeated but not repeated, the number of bits of the character string for setting up f (2) is few bits, even only 1 digit number or letter or special symbol.
After f (2) in the software is randomly generated, the software autonomously establishes a relationship of f (1) ═ f (2), which is a corresponding relationship but not a one-to-one relationship, because the software can randomly generate f (3) again, f (3) and f (2) are both randomly generated under the condition of f (1), the character strings represented by f (3) and f (2) are different, but the relationship of f (1) ═ f (2) and f (1) ═ f (3) is required to be set in the software, but any logical relationship cannot be generated between f (2) and f (3) (note: the expression in the sentence means that f (2) can replace f (1), f (3) can replace f (1), but f (2) and f (2) are randomly generated
(3) Not mutually substitutable), so that f (1), i.e. f (2), can be substituted by a character string denoted by f (1)
(2) Personal information or enterprise information content can be replaced;
inputting the character string expressed by f (2) into software, and converting into corresponding information content.
The invention relates to a technical scheme use case for converting information into character strings by adopting software, which comprises the following steps:
1. missing the person searching: using the information conversion character string software, inputting names, contact ways and specific addresses on a personal information interface of the software, clicking to form a string of characters which are set to be confidential and not public, and then printing or embroidering character strings on the bodies or clothes of persons (such as old people, children and mental disease patients) who may be lost; after relatives of old people, children and mental disease patients know that the old people, the children and the mental disease patients are lost, the relatives can operate software to design specific address module information represented by the character strings to be public at the first time, and other people or policemen can input the character strings to obtain the address of the lost person at the first time according to the technical software.
2. Timely medical rescue of emergent emergency patients: for emergent emergency patients, the gold time for saving life is strived for every minute and every second. Like set up the character string that the information module of diagnosing of seeking medical advice formed on the patient body as above, the patient takes place such as suddenly falling over to save emergency such as personnel, and the doctor that the very first time was rescued can look over the character string on the patient body, inputs the character string through this technical software and looks over information, knows the patient's past state of an illness, and the very first time is carried out accurate treatment with pertinence. Or when the patient has an acute disease, relatives of the patient can conveniently provide the character strings generated in the past to the clinician at the first time, so that the clinician can input the character strings to check information through the technical software, and can accurately know the past medical history and the treatment history of the patient at the first time (the physician does not need to inquire the unskilled, inaccurate and rapid past treatment history expression of the family members of the patient), so that an effective correct treatment method and medicine for the disease can be adopted at the first time.
3. Company information provision: the method can convert company name, address, contact person, contact way and business range information into a character string (the character string can be specially called as an address code), directly provides the address code or directly prints the address code on a logo of the company in practical application, and enables a person in need to use the technical software to check the address code at the first time, thereby conveniently obtaining the related accurate information of the company and promoting the communication of business information.
4. Map and navigation: the arrangement of the address code can be also applied to marking the enterprise location on the map, and after the address code is fused with map software, the address code is directly input, so that the enterprise address can be accurately searched, and particularly for companies with a plurality of addresses, one address code can correspond to one branch company, and the required company positioning address can be accurately navigated.
5. Logistics transportation: the method comprises the steps that a recipient, a contact way and a recipient address module are generated into a character string (which can be called as an address code) by using the technical software, and when the recipient has express transportation requirements, only the address code is provided for an express company or an online shopping mall, so that receipts can be filled quickly and conveniently, and privacy is kept; meanwhile, the address code is set to be public in the transportation process, and is set to be secret after the transportation is finished, so that the leakage of privacy information such as contact ways and addresses of recipients can be effectively protected.
6. Third party linking between different software: for example, there are dozens or even dozens of different systems related to patient treatment adopted by domestic hospitals, and it is difficult to compatibly share the treatment information of the patient in each past hospital, which brings inconvenience to the patient in treatment, transfer and remote treatment among different hospitals. The technical software can be linked in each hospital system through the technical scheme of converting the information into the character strings, and the information of the previous diagnosis of the subsequent patient is converted into a simple character string (which can be called as a diagnosis information code in practical application) and is directly provided for the system of the hospital for diagnosis, so that a doctor can know the diagnosis and treatment conditions of the patient in other hospitals very accurately, and the patient can carry medical record information to transmit among hospitals conveniently. Meanwhile, after the patient is in a visit, the visit information code can be set to be secret at any time according to the self intention of the patient, and the disease privacy information of the patient can be protected to the maximum extent.
7. Delivering the resume: the resume information is directly perfected on software, then the generated character string (which can be called resume code in practical application) is directly sent to the HR of the enterprise needing the resume, and the HR can directly use the resume code to check the resume of the job seeker. When the job seeker does not need any more, the resume module can be directly set to be secret or the resume code can be closed, so that the confidentiality of personal resume information is protected.
8. And other related industries require applications or the like that convert personal or business information into character strings.
The technical scheme of converting the information into the character string by adopting the software not only can convert the content belonging to the personal information or the enterprise information into the character string, but also can convert other information which is associated with the personal information or the enterprise information and is expressed by characters, numbers and letters into the character string, can effectively protect the privacy of an information holder and can quickly, effectively and accurately carry out the convenience of information transmission, and comprehensively realizes the information transmission mode of combining the convenience, timeliness, information accuracy and information privacy.
Finally, it should be noted that the above embodiments are only used for illustrating and not limiting the technical solutions of the present invention, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made to the present invention without departing from the spirit and scope of the present invention, and all modifications or partial substitutions should be covered by the scope of the claims of the present invention.

Claims (5)

1. A technical scheme for converting information into character strings by adopting software is characterized by comprising a registration module, a conversion module and a conversion module, wherein the registration module is used for registering account information;
the login module is used for logging in the software platform;
the information input module is used for inputting personal information and enterprise information or related information needing to be transmitted;
the character string digit setting module is used for setting the digit of the character string;
the generating module converts the input personal information or enterprise information into one or more character strings;
the checking module is used for checking the information corresponding to the character string;
and the importing module is used for importing the corresponding table.
2. The technical scheme for converting information into character strings by adopting software according to claim 1 is characterized by comprising a personal information input unit and an enterprise information input unit, wherein the personal information input unit and the enterprise information input unit comprise a modification subunit, an encryption unit and a decryption unit.
3. The technical solution of claim 2, wherein the personal information input unit is used for inputting and filling personal information, and the personal information includes name, contact address, home address, company address, personal resume, doctor and diagnosis information and other information.
4. The technical solution of claim 3, wherein the enterprise information input unit is used for inputting enterprise information, and the enterprise information includes enterprise name, contact information, enterprise address, enterprise introduction, and other information.
5. The technical solution of claim 4, wherein the modification unit is configured to modify the stored personal information or business information, and the encryption unit is configured to selectively keep secret or disclose the input personal information or business information.
CN202210740462.1A 2022-06-27 2022-06-27 Technical scheme for converting information into character strings by adopting software Pending CN115081391A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210740462.1A CN115081391A (en) 2022-06-27 2022-06-27 Technical scheme for converting information into character strings by adopting software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210740462.1A CN115081391A (en) 2022-06-27 2022-06-27 Technical scheme for converting information into character strings by adopting software

Publications (1)

Publication Number Publication Date
CN115081391A true CN115081391A (en) 2022-09-20

Family

ID=83256250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210740462.1A Pending CN115081391A (en) 2022-06-27 2022-06-27 Technical scheme for converting information into character strings by adopting software

Country Status (1)

Country Link
CN (1) CN115081391A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
CN108229205A (en) * 2018-01-05 2018-06-29 东北大学 A kind of medical information system and medical information guard method
CN109993502A (en) * 2019-04-01 2019-07-09 北京网聘咨询有限公司 Cross-platform intelligent terminal resume delivery system and method
CN111382978A (en) * 2019-08-14 2020-07-07 刘军 Paperless express logistics takeout working method capable of protecting customer information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
CN108229205A (en) * 2018-01-05 2018-06-29 东北大学 A kind of medical information system and medical information guard method
CN109993502A (en) * 2019-04-01 2019-07-09 北京网聘咨询有限公司 Cross-platform intelligent terminal resume delivery system and method
CN111382978A (en) * 2019-08-14 2020-07-07 刘军 Paperless express logistics takeout working method capable of protecting customer information

Similar Documents

Publication Publication Date Title
Rainbow Presenteeism: Nurse perceptions and consequences
CN101334815B (en) Medical data system
Wilson et al. General practitioner–hospital communications: a review of discharge summaries
CA2604019A1 (en) Medical information system
CN106027248B (en) A kind of medical data encryption method
Meyers et al. Physician orders for life-sustaining treatment form: honoring end-of-life directives for nursing home residents
Fortuna et al. Certified peer specialists and older adults with serious mental illness' perspectives of the impact of a peer-delivered and technology-supported self-management intervention
O'Grady What is knowledge and when should it be implemented?
CN115033917A (en) Medical data processing system based on privacy protection
Vatsa et al. Estonia’s e-governance and digital public service delivery solutions
Hayes et al. Cross-sectional survey of sexual health professionals’ experiences and perceptions of the 2022 mpox outbreak in the UK
Kunduru et al. Applications of Blockchain Technology for Secure Transaction of Electronic Health Records
Snezana et al. Cloud based personal health records data exchange in the age of IoT: the Cross4all project
Kijsanayotin et al. eHealth in Thailand: the current status
CN115081391A (en) Technical scheme for converting information into character strings by adopting software
Sivakumar et al. Secured Normalized Tagged Response for Patient Critical Care Monitoring System: A Unified approach
Cha et al. Information flow and nursing care during the early phase of the COVID‐19 pandemic
Ohsaka et al. A computer‐assisted transfusion management system and changed transfusion practices contribute to appropriate management of blood components
WO2004090747A1 (en) Method of uniquely associating transaction data with a particular individual, and computer-based messaging system for communicating such associated data
CA2675492A1 (en) Method, system, and computer program for providing patient-driven electronic health records
Blobel Clinical record systems in oncology. experiences and developments on cancer registers in eastern germany
Chu et al. Emergency physicians' role in telemedicine care during the coronavirus disease pandemic: Experiences from Taiwan
Andiani et al. Future of telemedicine in Indonesia during covid-19 pandemic era:“Literature review
US20200043099A1 (en) Health insurance claim coding system
Vigneshwari et al. Design of Cloud Computing based Digital Inventory for Administration and Supervision of Hospices Patient Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination