CN110430250A - A kind of propulsion management method, storage medium and the device of Project of Computer System Integration - Google Patents

A kind of propulsion management method, storage medium and the device of Project of Computer System Integration Download PDF

Info

Publication number
CN110430250A
CN110430250A CN201910675525.8A CN201910675525A CN110430250A CN 110430250 A CN110430250 A CN 110430250A CN 201910675525 A CN201910675525 A CN 201910675525A CN 110430250 A CN110430250 A CN 110430250A
Authority
CN
China
Prior art keywords
management
data
management end
key
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910675525.8A
Other languages
Chinese (zh)
Other versions
CN110430250B (en
Inventor
李伟清
张亚革
李兵强
刘春阳
李建超
李正茂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEBEI ICT NETWORK INFORMATION TECHNOLOGY Co Ltd
Original Assignee
HEBEI ICT NETWORK INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HEBEI ICT NETWORK INFORMATION TECHNOLOGY Co Ltd filed Critical HEBEI ICT NETWORK INFORMATION TECHNOLOGY Co Ltd
Priority to CN201910675525.8A priority Critical patent/CN110430250B/en
Publication of CN110430250A publication Critical patent/CN110430250A/en
Application granted granted Critical
Publication of CN110430250B publication Critical patent/CN110430250B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Medical Informatics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to field of computer technology, and in particular to a kind of propulsion project management method, storage medium and the device of Computer systems.The method executes following steps: step 1: using VPN network link cost management end, time management end, construction management end, data safety management end, management database and risk management end, establishing block chain network;Step 2: being separately connected a block catenary system functional module at cost management end, time management end, construction management end, data safety management end, management database and risk management end, which realizes that node is added, key management and access limit distribute;Has the advantages that efficiency of management height and highly-safe.

Description

A kind of propulsion management method, storage medium and the device of Project of Computer System Integration
Technical field
The invention belongs to field of computer technology, a kind of specific propulsion management method of Project of Computer System Integration is deposited Storage media and device.
Background technique
Computer systems technology is the challenging and creative industry of a gate pole, it is generally the case that the system integration Project needs under limited resources supplIes, in shorter and shorter time range, provides personalization level according to customer requirement High information products and technological service.Wherein, the project implementation progress in Computer systems is the bottle for restricting enterprise development How neck effectively promotes project management, has great importance to project management efficiency is improved.
Project management in Computer information system integration is a kind of high efficiency model of project management based on information technology, The characteristics of according to engineering project and project management, pass through each element correlation and the project implementation in project management Dynamic effects relationship in journey between each participant makes projects element optimization group using the administrative skill and means of modernization It closes, reasonable disposition, and by based on the manager responsibility system of a key project under construction, to realize efficient project objective.Wherein, in trusted computer It ceases in the system integration, it is contemplated that the necessity and comprehensive that project management is implemented specifies each participant, especially various supplies Quotient, subcontractor etc. are included in integration of information system project management system, form dynamic high efficiency by perfect information technology The project organization, to realize project objective and enterprise made to obtain good, maximized comprehensive benefit.It is known that information system The object of system integrated project management is project, since project implementation usually has disposable feature, is defined to project management Need to follow " control, is coordinated management " mechanism, i.e. progress monitoring, quality control, Payment control, contract when project management task Management and is organized and coordinated information management.Complete project management system needs each functional department, respectively participates in unit, each stage Property be in progress to form organic whole, for this purpose, to realize comprehensive project management, at least need to carry out body from the following aspects It is existing: 1) it is systemic, i.e., it is made of subitem, subitem;2) Process Character includes prediction, decision, plan, control, feedback etc.;3) appoint Business property, i.e. project duration, the project organization, Project Cost, project resource etc..
Summary of the invention
Of the invention provides propulsion management method, storage medium and the device of a kind of Project of Computer System Integration, has Efficiency of management height and highly-safe advantage.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of propulsion management method of Project of Computer System Integration, the method execute following steps:
Step 1: using VPN network link cost management end, time management end, construction management end, data safety management end, Database and risk management end are managed, block chain network is established;
Step 2: cost management end, time management end, construction management end, data safety management end, management database and Risk management end is separately connected a block catenary system functional module, which realizes that node is added, key management and read-write are weighed Limit distribution;Wherein, the method for key management executes following steps:
Step 2.1: using following formula, continuous data key is mapped as to discrete data key, then will be discrete Data key storage is individually stored into a subelement, when needing to call, using the inverse process of following formula, is taken out Key:Wherein, N is discrete dimension;xnFor the data key of multidimensional In the first dimension data key;ynTie up the two-dimensional data key in the data key of multidimensional;
Step 2.1: carrying out the distribution management of key in real time.
Further, the cost management end carries out cost management for being supplied to administrative staff, comprising: cost budgeting Administrative unit and cost monitoring administrative unit;The cost budgeting administrative unit, it is pre- for being supplied to administrative staff's progress cost Calculate management;The cost monitoring administrative unit carries out cost monitoring for being supplied to administrative staff.
Further, the time management end carries out time management for being supplied to administrative staff, comprising: time budget Administrative unit and time monitoring administrative unit;The time budget administrative unit, it is pre- for being supplied to administrative staff's progress time Calculate management;The time monitoring administrative unit carries out time monitoring management for being supplied to administrative staff.
Further, the risk management end carries out risk management for being supplied to administrative staff, comprising: risk closes rule Property administrative unit and Risk-warning administrative unit;The risk compliance administrative unit carries out wind for being supplied to administrative staff Dangerous compliance management;The Risk-warning administrative unit carries out the management of risk compliance for being supplied to administrative staff.
Further, the construction management end carries out construction management for being supplied to administrative staff, comprising: construction personnel Administrative unit and construction project time management unit;Construction personnel's administrative unit carries out constructor for being supplied to administrative staff Member's management;The construction project time management unit carries out construction project time management for being supplied to administrative staff.
A kind of propulsion management storage medium of Project of Computer System Integration is stored with computer journey on the storage medium Sequence;Described program includes: using VPN network link cost management end, time management end, construction management end, data safety management End, management database and risk management end, establish the code segment of block chain network;In cost management end, time management end, construction Management end, data safety management end, management database and risk management end are separately connected a block catenary system functional module, should Module realizes the code segment of node addition, key management and access limit distribution.
Further, described device includes: cost management end, time management end, construction management end, data safety management End, management database, risk management end and VPN network;The cost management end, time management end, construction management end, data peace Data communication is realized as end node, by VPN network in full management end, management database and risk management end, meanwhile, constitute one A block chain network;The cost management end carries out cost management for being supplied to administrative staff, comprising: cost budgeting management With cost monitoring management;The time management end carries out time management for being supplied to administrative staff, comprising: time budget pipe Reason and time monitoring management;The risk management end carries out risk management for being supplied to administrative staff, comprising: risk closes rule Property management and Risk-warning management;The construction management end carries out construction management for being supplied to administrative staff, comprising: construction Personal management and construction project time management;The data safety management end includes: data encryption management and backup data management;It is described Database is managed, for storing the data of whole device, comprising: primary database and several subdata bases.
Further, further include in the block chain network cost management end, time management end, construction management end, Data safety management end, management database and risk management end are connected separately with a block catenary system functional module;It is described Block catenary system functional module includes but is not limited to node addition module, cipher key module and access limit distribution module;It is described close Key module is unsymmetrical key system, and public key is present in each node, for identifying node identities;Private key is present in USB-key In, it is used for encryption data and signature;Module is added in node, for realizing the addition of new shareholder's node;Access limit point With module, for being written and read the distribution of permission.
Further, the access limit distribution module be written and read permission distribution the following steps are included:
Step 1: carrying out the distribution of read right, comprising:
Step 1.1: by cost management end, time management end, construction management end, data safety library management end, management data When needing to carry out write-in data, block catenary system functional module, which sends to count at random, needs that data are written for library and risk management end End node, random number use the end node public key encryption, which generates new block, and passes through the Hash of a upper block Value, this block theme, random number and timestamp generate verifying cryptographic Hash h;
Step 1.2: newly-generated block and verifying cryptographic Hash h are sent block catenary system functional module, h by the end node Using the public key encryption of block catenary system functional module, block catenary system functional module verification verifying cryptographic Hash h, and by new area Block chain and data signature are broadcast to block chain network;
Step 1.3: when end node is autonomously generated new block in violation of rules and regulations, because of random number and timestamp difference, therefore verifying Hash Value h1 is different, and block catenary system functional module is responsible for the validity of verification verifying cryptographic Hash;If verifying cryptographic Hash is invalid breathe out Uncommon value, then determine that newly-generated block chain is invalid;
Step 2: carrying out the distribution of write permission, comprising:
Step 2.1: the content of each end node write area block in block chain is held exclusive symmetrical using end node Key encryption, exclusive symmetric key are stored in USB-key, and the content of block body is retrieved using this block theme;When it When his shareholder's end node needs access region block content, need to hold the USB-key for being stored with the exclusive symmetric key, The content of block body could be decrypted;
Step 2.2: center end node according to engineering construction process analysis end node it should be appreciated that block chain content, i.e., The read right of end node realizes point of read right according to read right to end node USB-key of the distribution comprising exclusive symmetric key Match.
Further, the data safety management end executes following steps in the method for carrying out data encryption management:
Step 1: obtaining the data in management database in real time, the data managed in database are regarded under binary condition It is handled for image data, these data smoothings is filtered, obtained class image data g (x), set a smoothing filter Impulse Response Function is h (x), and former data are f (x), then data g (x)=f (x) * h (x) after being filtered;
Step 2: edge detection is carried out to filtered data;
Step 3: binary conversion treatment is carried out according to following formula:
Wherein, b (x, y) is binaryzation data, and i (x, y) is the data carried out after edge detection;
Step 4: the data after storage binary conversion treatment.
Propulsion management method, storage medium and the device of a kind of Project of Computer System Integration of the invention have as follows The utility model has the advantages that realizing the communication between each unit by block chain network, the efficiency of management is improved;Meanwhile in data management On, multiple data encryption and key encryption handling are carried out, there is very high safety.Therefore, have the efficiency of management high and safety The high advantage of property.
Detailed description of the invention
Fig. 1 is that the method flow of the propulsion project management method for the Computer systems that the embodiment of the present invention provides shows It is intended to;
Fig. 2 is a kind of device knot of the propulsion management device for Project of Computer System Integration that the embodiment of the present invention provides Structure schematic diagram.
Fig. 3 is a kind of propulsion management method for Project of Computer System Integration that the embodiment of the present invention provides, storage Jie The experimental result schematic diagram of matter and device.
Specific embodiment
With reference to the accompanying drawing and the embodiment of the present invention is described in further detail method of the invention.
Embodiment 1
A kind of propulsion management method of Project of Computer System Integration, the method execute following steps:
Step 1: using VPN network link cost management end, time management end, construction management end, data safety management end, Database and risk management end are managed, block chain network is established;
Step 2: cost management end, time management end, construction management end, data safety management end, management database and Risk management end is separately connected a block catenary system functional module, which realizes that node is added, key management and read-write are weighed Limit distribution;Wherein, the method for key management executes following steps:
Step 2.1: using following formula, continuous data key is mapped as to discrete data key, is retell discrete Data key storage is individually stored into a subelement, when needing to call, using the inverse process of following formula, is taken out Key:Wherein, N is discrete dimension;xnFor the data key of multidimensional In the first dimension data key;ynTie up the data key of the dimension in the data key of multidimensional;Step 2.2: carrying out in real time close The distribution management of key.
Specifically, implementing to dispose according to project management cost comprehensively control scheme, need to carry out Cost Control Target Draft, such as individual event formulated according to material, artificial, mechanical equipment and controls target, to the complicated link changed greatly such as weather, The uncertain factors such as market environment carry out dynamic management control, to human resources consumed in the project implementation, physical resources It timely instructed, supervised, adjusted and is limited with expenses, realize the purpose for reducing cost.
Embodiment 2
On the basis of a upper embodiment, the cost management end carries out cost management, packet for being supplied to administrative staff It includes: cost budgeting administrative unit and cost monitoring administrative unit;The cost budgeting administrative unit, for being supplied to administrative staff Carry out cost budgeting management;The cost monitoring administrative unit carries out cost monitoring for being supplied to administrative staff.
Embodiment 3
On the basis of a upper embodiment, the time management end carries out time management, packet for being supplied to administrative staff It includes: time budget administrative unit and time monitoring administrative unit;The time budget administrative unit, for being supplied to administrative staff Carry out time budget management;The time monitoring administrative unit carries out time monitoring management for being supplied to administrative staff.
Specifically, analysis time management is to ensure to complete management brought by a certain work in the limited time Benefit, in department of computer science's integration of information system project management, project manager is related to entire item to the reasonable arrangement of time Purpose tempo, therefore, how by the system of independent dispersion, database etc. in whole system integrated project be integrated into one it is comprehensive Information system is closed, reasonable work sequence is adjusted and the duty cycle is that each project manager people guarantees before being timely completed project It mentions and guarantees.Arranging PROJECT TIME is a key content in project management, it not only includes estimating that each is movable rationally Duration carries out pool distribution to resource, and the moment monitors development of projects progress, adjusts item in real time according to activity, the sequence of task Mesh completes timetable.
Computer information system integration because of project broad covered area, be related to subject high concentration, each section cooperation relation is crisscross Complexity just can be to project according to the schedule of certain scientific method and program composition in PROJECT TIME planning work Period, which is made, more accurately to be predicted, it should be noted that the existing general character between the project control and the project plan is again variant, It needs to carry out rational evaluation according to different schemes, be optimized so that project resource be made to realize.
Embodiment 4
On the basis of a upper embodiment, the risk management end carries out risk management, packet for being supplied to administrative staff It includes: risk compliance administrative unit and Risk-warning administrative unit;The risk compliance administrative unit, for being supplied to management Personnel carry out the management of risk compliance;The Risk-warning administrative unit carries out risk compliance for being supplied to administrative staff Management.
Embodiment 5
On the basis of a upper embodiment, the construction management end carries out construction management, packet for being supplied to administrative staff It includes: construction personnel's administrative unit and construction project time management unit;Construction personnel's administrative unit, for being supplied to administrative staff Carry out construction personnel's management;The construction project time management unit carries out construction project time management for being supplied to administrative staff.
Specifically, intelligent building provides wide application field for integration of information system project management, in building intelligence Change in work progress, since civil engineering, decoration, installation etc. participate in shared time and space resource in many ways, so that integration of information system Project should more reinforce related management in practice of construction, mutually shift responsibility onto others to evade in construction, cooperate imbalance.To intelligent building Carry out the integrated planning design phase, top priority be according to building requirement, using function, service function etc. as far as possible Deep analysis and discussion is done, synthesis includes that applicability, economy and advance etc. make reasonable entirety to class factor Planning, cooperation Construction Party and design side carry out system structure and layout with regard to subsystems, and tissue demonstration to monitored object, is set Standby quantity, orientation feature, as in construction spool, wire casing and water, electricity, the spool in wind system, wire casing, pipeline arrangement should It is harmonious.
Project manager is first owner in the entire project implementation process, is not only needed in implementation method, implementation machine Active adoption new technology improves efficiency in the selection of tool, in the arrangement of implementation sequence, should also in the entire project management and When analyze break even, such as supervise the implementation and management of contract, supervise and manage declaring and money being urged to work for progress payment, and according to point Analyse financial revenue and expenditure situation, the work progress of the well-organized program member of rational management fund, requirement of actively doing one's duty.Reinforcing In the management that weak electricity system and civil engineering, decoration cooperate, to underground, spool through walls, along column metope pre-embedded, wire casing engineering, need Cooperation is timely and effectively linked up, constructs for light current and reserves time enough and space.
Embodiment 6
A kind of propulsion management storage medium of Project of Computer System Integration is stored with computer journey on the storage medium Sequence;Described program includes: using VPN network link cost management end, time management end, construction management end, data safety management End, management database and risk management end, establish the code segment of block chain network;In cost management end, time management end, construction Management end, data safety management end, management database and risk management end are separately connected a block catenary system functional module, should Module realizes the code segment of node addition, key management and access limit distribution.
Embodiment 7
On the basis of a upper embodiment, described device includes: cost management end, time management end, construction management end, number According to safety management end, management database, risk management end and VPN network;The cost management end, time management end, construction pipe End, data safety management end, management database and risk management end are managed as end node, data communication is realized by VPN network, Meanwhile constituting a block chain network;The cost management end carries out cost management for being supplied to administrative staff, comprising: at This budget management and cost monitoring management;The time management end carries out time management for being supplied to administrative staff, comprising: Time budget management and time monitoring management;The risk management end carries out risk management, packet for being supplied to administrative staff It includes: the management of risk compliance and Risk-warning management;The construction management end carries out construction pipe for being supplied to administrative staff Reason, comprising: construction personnel's management and construction project time management;The data safety management end includes: data encryption management and data Backup management;The management database, for storing the data of whole device, comprising: primary database and several subdata bases.
Specifically, systematically solving problem often encountered in project management process, need to establish project operation system development Line map, existing long-term goal, and have immediate objective, existing common-denominator target also has interim auxiliary mark, even for same Traffic issues, it is also possible to be solved using different tool or method.Under normal conditions, there is a little problems in management It is all mutually related, only there are the orders of importance and emergency when implementing for some projects.
Variation in view of organization is limited, can only be own according to its in specific time in project management implementation Quantitative to change, this just needs for focus to be placed on the main of projects task for needing to implement in time in project management process In element.Correct decisions of the propulsion of scientific project management dependent on manager, continuous renewal idea, paces of keeping pace with the times, The philosophical thinking for establishing project management, it is to the assessment that strategic realization of goal is shown great foresight, the understanding of oneself and market is close The problems such as combining, tissue, the planning, coordination of project held from management height.
Embodiment 8
On the basis of a upper embodiment, further include in the block chain network cost management end, time management end, Construction management end, data safety management end, management database and risk management end are connected separately with a block catenary system function It can module;The block catenary system functional module includes but is not limited to node addition module, cipher key module and access limit distribution Module;The cipher key module is unsymmetrical key system, and public key is present in each node, for identifying node identities;Private key is deposited It is in USB-key, is used for encryption data and signature;Module is added in node, for realizing the addition of new shareholder's node; Access limit distribution module, for being written and read the distribution of permission.
Embodiment 9
Specifically, risk is ubiquitous, it is especially rich in creative and challenge system integration industry, in the project implementation Process risk is still worth manager to pay much attention to.Compared with traditional industries, System Integration Project has multi-crossed disciplines, wealth Power, intelligence-intensive feature, so that more " uncertain factors " is brought, if manager lacks calm planning and is likely to Lead to the failure of target.For this purpose, the moment keeps the sense of risk of System Integration Project management, unite with Probability and mathematics The tools such as meter go risk present in research project progress, find the good plan controlled risk.
Project risk feature in the combining information system integration is refined as following several classes: i.e. conceptual design risk, equipment choosing Type risk, new-old system risk of handover, loss of data risk, network security risk, project process risk, institutional framework risk Deng.For the above Risk characteristics, planning replying risk is worked out actively to change or reduce the probability or hazard analysis and HACCP of risk generation, And identified risk is reinforced monitoring, stage by stage, incrementally lower the risk damage in project management.
On the basis of a upper embodiment, the distribution that the access limit distribution module is written and read permission includes following step It is rapid:
Step 1: carrying out the distribution of read right, comprising:
Step 1.1: by cost management end, time management end, construction management end, data safety library management end, management data When needing to carry out write-in data, block catenary system functional module, which sends to count at random, needs that data are written for library and risk management end End node, random number use the end node public key encryption, which generates new block, and passes through the Hash of a upper block Value, this block theme, random number and timestamp generate verifying cryptographic Hash h;
Step 1.2: newly-generated block and verifying cryptographic Hash h are sent block catenary system functional module, h by the end node Using the public key encryption of block catenary system functional module, block catenary system functional module verification verifying cryptographic Hash h, and by new area Block chain and data signature are broadcast to block chain network;
Step 1.3: when end node is autonomously generated new block in violation of rules and regulations, because of random number and timestamp difference, therefore verifying Hash Value h1 is different, and block catenary system functional module is responsible for the validity of verification verifying cryptographic Hash;If verifying cryptographic Hash is invalid breathe out Uncommon value, then determine that newly-generated block chain is invalid;
Step 2: carrying out the distribution of write permission, comprising:
Step 2.1: the content of each end node write area block in block chain is held exclusive symmetrical using end node Key encryption, exclusive symmetric key are stored in USB-key, and the content of block body is retrieved using this block theme;When it When his shareholder's end node needs access region block content, need to hold the USB-key for being stored with the exclusive symmetric key, The content of block body could be decrypted;
Step 2.2: center end node according to engineering construction process analysis end node it should be appreciated that block chain content, i.e., The read right of end node realizes point of read right according to read right to end node USB-key of the distribution comprising exclusive symmetric key Match.
Embodiment 10
On the basis of a upper embodiment, the data safety management end carry out data encryption management method execute with Lower step:
Step 1: obtaining the data in management database in real time, the data managed in database are regarded under binary condition It is handled for image data, these data smoothings is filtered, obtained class image data g (x), set a smoothing filter Impulse Response Function is h (x), and former data are f (x), then data g (x)=f (x) * h (x) after being filtered;
Step 2: edge detection is carried out to filtered data;
Step 3: binary conversion treatment is carried out according to following formula:
Wherein, b (x, y) is binaryzation data, and i (x, y) is the data carried out after edge detection;
Step 4: the data after storage binary conversion treatment.
It is sub that the foregoing is merely one embodiment of the present of invention, but the range that the present invention cannot be limited in this way, all according to this Invent the variation in done structure, if where not losing main idea of the invention, be regarded as falling into the scope of the present invention it Inside it is restricted.
Person of ordinary skill in the field can be understood that, for convenience and simplicity of description, foregoing description The specific work process of system and related explanation, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
It should be noted that system provided by the above embodiment, only illustrate with the division of above-mentioned each functional module It is bright, in practical applications, it can according to need and complete above-mentioned function distribution by different functional modules, i.e., it will be of the invention Module or step in embodiment are decomposed or are combined again, for example, the module of above-described embodiment can be merged into a module, It can also be further split into multiple submodule, to complete all or part of the functions described above.The present invention is implemented Module, the title of step involved in example, it is only for distinguish modules or step, be not intended as to of the invention improper It limits.
Person of ordinary skill in the field can be understood that, for convenience and simplicity of description, foregoing description The specific work process and related explanation of storage device, processing unit, can refer to corresponding processes in the foregoing method embodiment, Details are not described herein.
Those skilled in the art should be able to recognize that, mould described in conjunction with the examples disclosed in the embodiments of the present disclosure Block, method and step, can be realized with electronic hardware, computer software, or a combination of the two, software module, method and step pair The program answered can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electric erasable and can compile Any other form of storage well known in journey ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field is situated between In matter.In order to clearly demonstrate the interchangeability of electronic hardware and software, in the above description according to function generally Describe each exemplary composition and step.These functions are executed actually with electronic hardware or software mode, depend on technology The specific application and design constraint of scheme.Those skilled in the art can carry out using distinct methods each specific application Realize described function, but such implementation should not be considered as beyond the scope of the present invention.
Term " first ", " second " etc. are to be used to distinguish similar objects, rather than be used to describe or indicate specific suitable Sequence or precedence.
Term " includes " or any other like term are intended to cover non-exclusive inclusion, so that including a system Process, method, article or equipment/device of column element not only includes those elements, but also including being not explicitly listed Other elements, or further include the intrinsic element of these process, method, article or equipment/devices.
So far, it has been combined preferred embodiment shown in the drawings and describes technical solution of the present invention, still, this field Technical staff is it is easily understood that protection scope of the present invention is expressly not limited to these specific embodiments.Without departing from this Under the premise of the principle of invention, those skilled in the art can make equivalent change or replacement to the relevant technologies feature, these Technical solution after change or replacement will fall within the scope of protection of the present invention.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (10)

1. a kind of propulsion management method of Project of Computer System Integration, which is characterized in that the method executes following steps:
Step 1: using VPN network link cost management end, time management end, construction management end, data safety management end, management Database and risk management end, establish block chain network;
Step 2: in cost management end, time management end, construction management end, data safety management end, management database and risk Management end is separately connected a block catenary system functional module, which realizes that node is added, key management and access limit divide Match;Wherein, the method for key management executes following steps:
Step 2.1: using following formula, continuous data key is mapped as to discrete data key, then by discrete data Key storage is individually stored into a subelement, when needing to call, using the inverse process of following formula, is taken out close Key:;Wherein, N is discrete dimension;xnFor the first dimension data key in the data key of multidimensional;ynTie up the data key of multidimensional In two-dimensional data key;
Step 2.1: carrying out the distribution management of key in real time.
2. the method as described in claim 1, which is characterized in that the cost management end is carried out for being supplied to administrative staff Cost management, comprising: cost budgeting administrative unit and cost monitoring administrative unit;The cost budgeting administrative unit, for mentioning Supply management personnel carry out cost budgeting management;The cost monitoring administrative unit carries out cost for being supplied to administrative staff Monitoring.
3. the method as described in claim 1, which is characterized in that the time management end is carried out for being supplied to administrative staff Time management, comprising: time budget administrative unit and time monitoring administrative unit;The time budget administrative unit, for mentioning Supply management personnel carry out time budget management;The time monitoring administrative unit carries out the time for being supplied to administrative staff Monitoring management.
4. the method as described in claim 1, which is characterized in that the risk management end is carried out for being supplied to administrative staff Risk management, comprising: risk compliance administrative unit and Risk-warning administrative unit;The risk compliance administrative unit is used The management of risk compliance is carried out in being supplied to administrative staff;The Risk-warning administrative unit, for be supplied to administrative staff into Row risk compliance management.
5. the method as described in claim 1, which is characterized in that the construction management end is carried out for being supplied to administrative staff Construction management, comprising: construction personnel's administrative unit and construction project time management unit;Construction personnel's administrative unit, for mentioning Supply management personnel carry out construction personnel's management;The construction project time management unit, constructs for being supplied to administrative staff Progress control.
6. a kind of propulsion management storage medium of Project of Computer System Integration, which is characterized in that stored on the storage medium There is computer program;Described program includes: using VPN network link cost management end, time management end, construction management end, number According to safety management end, management database and risk management end, the code segment of block chain network is established;At cost management end, time Management end, construction management end, data safety management end, management database and risk management end are separately connected a block catenary system Functional module, the module realize the code segment of node addition, key management and access limit distribution.
7. a kind of propulsion management device of Project of Computer System Integration, which is characterized in that described device includes: cost management End, time management end, construction management end, data safety management end, management database, risk management end and VPN network;It is described at This management end, time management end, construction management end, data safety management end, management database and risk management end are as end segment Point realizes data communication by VPN network, meanwhile, constitute a block chain network;The cost management end, for being supplied to Administrative staff carry out cost management, comprising: cost budgeting management and cost monitoring management;The time management end, for providing Time management is carried out to administrative staff, comprising: time budget management and time monitoring management;The risk management end, for mentioning Supply management personnel carry out risk management, comprising: the management of risk compliance and Risk-warning management;The construction management end is used Construction management is carried out in being supplied to administrative staff, comprising: construction personnel's management and construction project time management;The data safety management End includes: data encryption management and backup data management;The management database, for storing the data of whole device, comprising: Primary database and several subdata bases.
8. device as claimed in claim 7, which is characterized in that further include in the block chain network cost management end, Time management end, construction management end, data safety management end, management database and risk management end are connected separately with an area Block catenary system functional module;The block catenary system functional module includes but is not limited to node addition module, cipher key module and reading Write permission distribution module;The cipher key module is unsymmetrical key system, and public key is present in each node, for identifying node body Part;Private key is present in USB-key, is used for encryption data and signature;Module is added in node, for realizing new shareholder section The addition of point;Access limit distribution module, for being written and read the distribution of permission.
9. device as claimed in claim 8, which is characterized in that the access limit distribution module is written and read the distribution of permission The following steps are included:
Step 1: carrying out the distribution of read right, comprising:
Step 1.1: by cost management end, time management end, construction management end, data safety library management end, management database and When needing to carry out write-in data, block catenary system functional module is sent counts to the end for needing to be written data at random at risk management end Node, random number use the end node public key encryption, which generates new block, and by the cryptographic Hash of a upper block, This block theme, random number and timestamp generate verifying cryptographic Hash h;
Step 1.2: newly-generated block and verifying cryptographic Hash h are sent block catenary system functional module by the end node, and h is used The public key encryption of block catenary system functional module, block catenary system functional module verification verifying cryptographic Hash h, and by new block chain Block chain network is broadcast to data signature;
Step 1.3: when end node is autonomously generated new block in violation of rules and regulations, because of random number and timestamp difference, therefore verifying cryptographic Hash h1 Difference, block catenary system functional module are responsible for the validity of verification verifying cryptographic Hash;If verifying cryptographic Hash is invalid cryptographic Hash, Then determine that newly-generated block chain is invalid;
Step 2: carrying out the distribution of write permission, comprising:
Step 2.1: the exclusive symmetric key that the content of each end node write area block in block chain uses end node to hold Encryption, exclusive symmetric key are stored in USB-key, and the content of block body is retrieved using this block theme;When other benefits When beneficial related side's end node needs access region block content, need to hold the USB-key for being stored with the exclusive symmetric key, ability Decrypt the content of block body;
Step 2.2: center end node according to engineering construction process analysis end node it should be appreciated that block chain content, i.e. end segment The read right of point realizes the distribution of read right according to read right to end node USB-key of the distribution comprising exclusive symmetric key.
10. device as claimed in claim 9, which is characterized in that the data safety management end is carrying out data encryption management Method execute following steps:
Step 1: obtaining the data in management database in real time, the data managed in database are considered as figure under binary condition As data are handled, these data smoothings are filtered, obtains class image data g (x), sets the impact of a smoothing filter Receptance function is h (x), and former data are f (x), the then data after being filtered;
Step 2: edge detection is carried out to filtered data;
Step 3: binary conversion treatment is carried out according to following formula:
Wherein, b (x, y) is binaryzation data, and i (x, y) is the data carried out after edge detection;
Step 4: the data after storage binary conversion treatment.
CN201910675525.8A 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device Active CN110430250B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910675525.8A CN110430250B (en) 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910675525.8A CN110430250B (en) 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device

Publications (2)

Publication Number Publication Date
CN110430250A true CN110430250A (en) 2019-11-08
CN110430250B CN110430250B (en) 2022-04-05

Family

ID=68412377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910675525.8A Active CN110430250B (en) 2019-07-25 2019-07-25 Computer system integrated push project management method, storage medium and device

Country Status (1)

Country Link
CN (1) CN110430250B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110880069A (en) * 2019-11-12 2020-03-13 深圳市建筑科学研究院股份有限公司 Engineering settlement traceability method and device based on block chain technology
CN111159769A (en) * 2019-12-31 2020-05-15 杭州产链数字科技有限公司 Building engineering cost supervision system and method based on block chain
CN112884264A (en) * 2019-11-30 2021-06-01 南京苏德创新科技有限公司 Process management method based on information system integration
CN112907077A (en) * 2021-02-20 2021-06-04 一智科技(成都)有限公司 Construction task order dispatching method and system
CN115222241A (en) * 2022-07-15 2022-10-21 实链检测(浙江)有限公司 Engineering quality detection method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503875A (en) * 2015-09-05 2017-03-15 哈尔滨卓晋科技有限公司 A kind of propulsion project management method of Computer systems
US20170213209A1 (en) * 2016-01-21 2017-07-27 International Business Machines Corporation Enterprise blockchains and transactional systems
CN108629564A (en) * 2018-04-28 2018-10-09 中国船舶重工集团公司第七〇九研究所 A kind of Management in Large Scale Project system and method based on block chain technology
US20180294955A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. System for processing data based on blockchain and operating method thereof
CN109039606A (en) * 2018-08-22 2018-12-18 上海循态信息科技有限公司 Same frequency sampling method and circuit in continuous variable quantum key distribution system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503875A (en) * 2015-09-05 2017-03-15 哈尔滨卓晋科技有限公司 A kind of propulsion project management method of Computer systems
US20170213209A1 (en) * 2016-01-21 2017-07-27 International Business Machines Corporation Enterprise blockchains and transactional systems
US20180294955A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. System for processing data based on blockchain and operating method thereof
CN108629564A (en) * 2018-04-28 2018-10-09 中国船舶重工集团公司第七〇九研究所 A kind of Management in Large Scale Project system and method based on block chain technology
CN109039606A (en) * 2018-08-22 2018-12-18 上海循态信息科技有限公司 Same frequency sampling method and circuit in continuous variable quantum key distribution system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
VLADYSLAV USENKO等: "Continuous- and Discrete-Variable Quantum Key Distribution with Nonclassical Light Over Noisy Channels", 《IEEE》 *
刘维琪等: "连续变量量子密钥分发技术研究进展", 《信息安全研究》 *
钱旭东等: "连续变量量子密钥分发协商过程的优化实现", 《中国科学》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110880069A (en) * 2019-11-12 2020-03-13 深圳市建筑科学研究院股份有限公司 Engineering settlement traceability method and device based on block chain technology
CN112884264A (en) * 2019-11-30 2021-06-01 南京苏德创新科技有限公司 Process management method based on information system integration
CN111159769A (en) * 2019-12-31 2020-05-15 杭州产链数字科技有限公司 Building engineering cost supervision system and method based on block chain
CN112907077A (en) * 2021-02-20 2021-06-04 一智科技(成都)有限公司 Construction task order dispatching method and system
CN115222241A (en) * 2022-07-15 2022-10-21 实链检测(浙江)有限公司 Engineering quality detection method

Also Published As

Publication number Publication date
CN110430250B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN110430250A (en) A kind of propulsion management method, storage medium and the device of Project of Computer System Integration
O’Connell Towards adaptation of water resource systems to climatic and socio-economic change
Harrison et al. Foundations for smarter cities
Sergi et al. Smart cities and economic growth in Russia
Ohab-Yazdi et al. Using the agent-based model to simulate and evaluate the interaction effects of agent behaviors on groundwater resources, a case study of a sub-basin in the Zayandehroud River basin
Soin et al. Management control and uncertainty: Risk management in universities
Mao et al. Resilience‐Based Optimization of Postdisaster Restoration Strategy for Road Networks
Ferreira et al. Managing interdependencies in critical infrastructures—a cornerstone for system resilience
Banciu et al. Digital transformation impact on organization management and several necessary protective actions
Mattila et al. Blockchain for environmentally sustainable economies: Case study on 5irechain
Seddighi et al. A sustainable risk-averse approach to power generation planning with disruption risk and social responsibility considerations
Yazan et al. Decision-support tools for smart transition to circular economy
Lind et al. Policies to avoid cost overruns in infrastructure projects: Critical evaluation and recommendations
Durden et al. Report on the Managing Impacts of Deep-seA reSource exploitation (MIDAS) workshop on environmental management of deep-sea mining
Amine Smart Cities: Development and Benefits
El Ghorfi et al. A modeling approach for IT governance basics application on IT projects and IT goals
El Khatib et al. Collaborative Business Intelligence A Case Study of the Dubai Smart City Strategy
Stout et al. Lao Power Sector Vulnerability Assessment and Resilience Action Plan
Mubiru et al. Investment Decision Modeling for Transboundary Project Portfolio Selection
Bethlehem et al. The bottom line: Industry and the environment in South Africa
Sukarman et al. Green Information Technology Policy in Indonesia
Putri et al. A literature review of research between supply chain constraits issues and decree of the government of Indonesia during Covid-19
Seok et al. Decision support protocol for sustainability issues in supply networks
Rosenberg et al. A systems-based approach to creating value from infrastructure interdependencies
Saputra et al. Networks in the Implementation of Illegal Gold Mining Countermeasure Policy in Kuantan Singingi Regency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant