CN110430250A - A kind of propulsion management method, storage medium and the device of Project of Computer System Integration - Google Patents
A kind of propulsion management method, storage medium and the device of Project of Computer System Integration Download PDFInfo
- Publication number
- CN110430250A CN110430250A CN201910675525.8A CN201910675525A CN110430250A CN 110430250 A CN110430250 A CN 110430250A CN 201910675525 A CN201910675525 A CN 201910675525A CN 110430250 A CN110430250 A CN 110430250A
- Authority
- CN
- China
- Prior art keywords
- management
- data
- management end
- key
- risk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Medical Informatics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to field of computer technology, and in particular to a kind of propulsion project management method, storage medium and the device of Computer systems.The method executes following steps: step 1: using VPN network link cost management end, time management end, construction management end, data safety management end, management database and risk management end, establishing block chain network;Step 2: being separately connected a block catenary system functional module at cost management end, time management end, construction management end, data safety management end, management database and risk management end, which realizes that node is added, key management and access limit distribute;Has the advantages that efficiency of management height and highly-safe.
Description
Technical field
The invention belongs to field of computer technology, a kind of specific propulsion management method of Project of Computer System Integration is deposited
Storage media and device.
Background technique
Computer systems technology is the challenging and creative industry of a gate pole, it is generally the case that the system integration
Project needs under limited resources supplIes, in shorter and shorter time range, provides personalization level according to customer requirement
High information products and technological service.Wherein, the project implementation progress in Computer systems is the bottle for restricting enterprise development
How neck effectively promotes project management, has great importance to project management efficiency is improved.
Project management in Computer information system integration is a kind of high efficiency model of project management based on information technology,
The characteristics of according to engineering project and project management, pass through each element correlation and the project implementation in project management
Dynamic effects relationship in journey between each participant makes projects element optimization group using the administrative skill and means of modernization
It closes, reasonable disposition, and by based on the manager responsibility system of a key project under construction, to realize efficient project objective.Wherein, in trusted computer
It ceases in the system integration, it is contemplated that the necessity and comprehensive that project management is implemented specifies each participant, especially various supplies
Quotient, subcontractor etc. are included in integration of information system project management system, form dynamic high efficiency by perfect information technology
The project organization, to realize project objective and enterprise made to obtain good, maximized comprehensive benefit.It is known that information system
The object of system integrated project management is project, since project implementation usually has disposable feature, is defined to project management
Need to follow " control, is coordinated management " mechanism, i.e. progress monitoring, quality control, Payment control, contract when project management task
Management and is organized and coordinated information management.Complete project management system needs each functional department, respectively participates in unit, each stage
Property be in progress to form organic whole, for this purpose, to realize comprehensive project management, at least need to carry out body from the following aspects
It is existing: 1) it is systemic, i.e., it is made of subitem, subitem;2) Process Character includes prediction, decision, plan, control, feedback etc.;3) appoint
Business property, i.e. project duration, the project organization, Project Cost, project resource etc..
Summary of the invention
Of the invention provides propulsion management method, storage medium and the device of a kind of Project of Computer System Integration, has
Efficiency of management height and highly-safe advantage.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of propulsion management method of Project of Computer System Integration, the method execute following steps:
Step 1: using VPN network link cost management end, time management end, construction management end, data safety management end,
Database and risk management end are managed, block chain network is established;
Step 2: cost management end, time management end, construction management end, data safety management end, management database and
Risk management end is separately connected a block catenary system functional module, which realizes that node is added, key management and read-write are weighed
Limit distribution;Wherein, the method for key management executes following steps:
Step 2.1: using following formula, continuous data key is mapped as to discrete data key, then will be discrete
Data key storage is individually stored into a subelement, when needing to call, using the inverse process of following formula, is taken out
Key:Wherein, N is discrete dimension;xnFor the data key of multidimensional
In the first dimension data key;ynTie up the two-dimensional data key in the data key of multidimensional;
Step 2.1: carrying out the distribution management of key in real time.
Further, the cost management end carries out cost management for being supplied to administrative staff, comprising: cost budgeting
Administrative unit and cost monitoring administrative unit;The cost budgeting administrative unit, it is pre- for being supplied to administrative staff's progress cost
Calculate management;The cost monitoring administrative unit carries out cost monitoring for being supplied to administrative staff.
Further, the time management end carries out time management for being supplied to administrative staff, comprising: time budget
Administrative unit and time monitoring administrative unit;The time budget administrative unit, it is pre- for being supplied to administrative staff's progress time
Calculate management;The time monitoring administrative unit carries out time monitoring management for being supplied to administrative staff.
Further, the risk management end carries out risk management for being supplied to administrative staff, comprising: risk closes rule
Property administrative unit and Risk-warning administrative unit;The risk compliance administrative unit carries out wind for being supplied to administrative staff
Dangerous compliance management;The Risk-warning administrative unit carries out the management of risk compliance for being supplied to administrative staff.
Further, the construction management end carries out construction management for being supplied to administrative staff, comprising: construction personnel
Administrative unit and construction project time management unit;Construction personnel's administrative unit carries out constructor for being supplied to administrative staff
Member's management;The construction project time management unit carries out construction project time management for being supplied to administrative staff.
A kind of propulsion management storage medium of Project of Computer System Integration is stored with computer journey on the storage medium
Sequence;Described program includes: using VPN network link cost management end, time management end, construction management end, data safety management
End, management database and risk management end, establish the code segment of block chain network;In cost management end, time management end, construction
Management end, data safety management end, management database and risk management end are separately connected a block catenary system functional module, should
Module realizes the code segment of node addition, key management and access limit distribution.
Further, described device includes: cost management end, time management end, construction management end, data safety management
End, management database, risk management end and VPN network;The cost management end, time management end, construction management end, data peace
Data communication is realized as end node, by VPN network in full management end, management database and risk management end, meanwhile, constitute one
A block chain network;The cost management end carries out cost management for being supplied to administrative staff, comprising: cost budgeting management
With cost monitoring management;The time management end carries out time management for being supplied to administrative staff, comprising: time budget pipe
Reason and time monitoring management;The risk management end carries out risk management for being supplied to administrative staff, comprising: risk closes rule
Property management and Risk-warning management;The construction management end carries out construction management for being supplied to administrative staff, comprising: construction
Personal management and construction project time management;The data safety management end includes: data encryption management and backup data management;It is described
Database is managed, for storing the data of whole device, comprising: primary database and several subdata bases.
Further, further include in the block chain network cost management end, time management end, construction management end,
Data safety management end, management database and risk management end are connected separately with a block catenary system functional module;It is described
Block catenary system functional module includes but is not limited to node addition module, cipher key module and access limit distribution module;It is described close
Key module is unsymmetrical key system, and public key is present in each node, for identifying node identities;Private key is present in USB-key
In, it is used for encryption data and signature;Module is added in node, for realizing the addition of new shareholder's node;Access limit point
With module, for being written and read the distribution of permission.
Further, the access limit distribution module be written and read permission distribution the following steps are included:
Step 1: carrying out the distribution of read right, comprising:
Step 1.1: by cost management end, time management end, construction management end, data safety library management end, management data
When needing to carry out write-in data, block catenary system functional module, which sends to count at random, needs that data are written for library and risk management end
End node, random number use the end node public key encryption, which generates new block, and passes through the Hash of a upper block
Value, this block theme, random number and timestamp generate verifying cryptographic Hash h;
Step 1.2: newly-generated block and verifying cryptographic Hash h are sent block catenary system functional module, h by the end node
Using the public key encryption of block catenary system functional module, block catenary system functional module verification verifying cryptographic Hash h, and by new area
Block chain and data signature are broadcast to block chain network;
Step 1.3: when end node is autonomously generated new block in violation of rules and regulations, because of random number and timestamp difference, therefore verifying Hash
Value h1 is different, and block catenary system functional module is responsible for the validity of verification verifying cryptographic Hash;If verifying cryptographic Hash is invalid breathe out
Uncommon value, then determine that newly-generated block chain is invalid;
Step 2: carrying out the distribution of write permission, comprising:
Step 2.1: the content of each end node write area block in block chain is held exclusive symmetrical using end node
Key encryption, exclusive symmetric key are stored in USB-key, and the content of block body is retrieved using this block theme;When it
When his shareholder's end node needs access region block content, need to hold the USB-key for being stored with the exclusive symmetric key,
The content of block body could be decrypted;
Step 2.2: center end node according to engineering construction process analysis end node it should be appreciated that block chain content, i.e.,
The read right of end node realizes point of read right according to read right to end node USB-key of the distribution comprising exclusive symmetric key
Match.
Further, the data safety management end executes following steps in the method for carrying out data encryption management:
Step 1: obtaining the data in management database in real time, the data managed in database are regarded under binary condition
It is handled for image data, these data smoothings is filtered, obtained class image data g (x), set a smoothing filter
Impulse Response Function is h (x), and former data are f (x), then data g (x)=f (x) * h (x) after being filtered;
Step 2: edge detection is carried out to filtered data;
Step 3: binary conversion treatment is carried out according to following formula:
Wherein, b (x, y) is binaryzation data, and i (x, y) is the data carried out after edge detection;
Step 4: the data after storage binary conversion treatment.
Propulsion management method, storage medium and the device of a kind of Project of Computer System Integration of the invention have as follows
The utility model has the advantages that realizing the communication between each unit by block chain network, the efficiency of management is improved;Meanwhile in data management
On, multiple data encryption and key encryption handling are carried out, there is very high safety.Therefore, have the efficiency of management high and safety
The high advantage of property.
Detailed description of the invention
Fig. 1 is that the method flow of the propulsion project management method for the Computer systems that the embodiment of the present invention provides shows
It is intended to;
Fig. 2 is a kind of device knot of the propulsion management device for Project of Computer System Integration that the embodiment of the present invention provides
Structure schematic diagram.
Fig. 3 is a kind of propulsion management method for Project of Computer System Integration that the embodiment of the present invention provides, storage Jie
The experimental result schematic diagram of matter and device.
Specific embodiment
With reference to the accompanying drawing and the embodiment of the present invention is described in further detail method of the invention.
Embodiment 1
A kind of propulsion management method of Project of Computer System Integration, the method execute following steps:
Step 1: using VPN network link cost management end, time management end, construction management end, data safety management end,
Database and risk management end are managed, block chain network is established;
Step 2: cost management end, time management end, construction management end, data safety management end, management database and
Risk management end is separately connected a block catenary system functional module, which realizes that node is added, key management and read-write are weighed
Limit distribution;Wherein, the method for key management executes following steps:
Step 2.1: using following formula, continuous data key is mapped as to discrete data key, is retell discrete
Data key storage is individually stored into a subelement, when needing to call, using the inverse process of following formula, is taken out
Key:Wherein, N is discrete dimension;xnFor the data key of multidimensional
In the first dimension data key;ynTie up the data key of the dimension in the data key of multidimensional;Step 2.2: carrying out in real time close
The distribution management of key.
Specifically, implementing to dispose according to project management cost comprehensively control scheme, need to carry out Cost Control Target
Draft, such as individual event formulated according to material, artificial, mechanical equipment and controls target, to the complicated link changed greatly such as weather,
The uncertain factors such as market environment carry out dynamic management control, to human resources consumed in the project implementation, physical resources
It timely instructed, supervised, adjusted and is limited with expenses, realize the purpose for reducing cost.
Embodiment 2
On the basis of a upper embodiment, the cost management end carries out cost management, packet for being supplied to administrative staff
It includes: cost budgeting administrative unit and cost monitoring administrative unit;The cost budgeting administrative unit, for being supplied to administrative staff
Carry out cost budgeting management;The cost monitoring administrative unit carries out cost monitoring for being supplied to administrative staff.
Embodiment 3
On the basis of a upper embodiment, the time management end carries out time management, packet for being supplied to administrative staff
It includes: time budget administrative unit and time monitoring administrative unit;The time budget administrative unit, for being supplied to administrative staff
Carry out time budget management;The time monitoring administrative unit carries out time monitoring management for being supplied to administrative staff.
Specifically, analysis time management is to ensure to complete management brought by a certain work in the limited time
Benefit, in department of computer science's integration of information system project management, project manager is related to entire item to the reasonable arrangement of time
Purpose tempo, therefore, how by the system of independent dispersion, database etc. in whole system integrated project be integrated into one it is comprehensive
Information system is closed, reasonable work sequence is adjusted and the duty cycle is that each project manager people guarantees before being timely completed project
It mentions and guarantees.Arranging PROJECT TIME is a key content in project management, it not only includes estimating that each is movable rationally
Duration carries out pool distribution to resource, and the moment monitors development of projects progress, adjusts item in real time according to activity, the sequence of task
Mesh completes timetable.
Computer information system integration because of project broad covered area, be related to subject high concentration, each section cooperation relation is crisscross
Complexity just can be to project according to the schedule of certain scientific method and program composition in PROJECT TIME planning work
Period, which is made, more accurately to be predicted, it should be noted that the existing general character between the project control and the project plan is again variant,
It needs to carry out rational evaluation according to different schemes, be optimized so that project resource be made to realize.
Embodiment 4
On the basis of a upper embodiment, the risk management end carries out risk management, packet for being supplied to administrative staff
It includes: risk compliance administrative unit and Risk-warning administrative unit;The risk compliance administrative unit, for being supplied to management
Personnel carry out the management of risk compliance;The Risk-warning administrative unit carries out risk compliance for being supplied to administrative staff
Management.
Embodiment 5
On the basis of a upper embodiment, the construction management end carries out construction management, packet for being supplied to administrative staff
It includes: construction personnel's administrative unit and construction project time management unit;Construction personnel's administrative unit, for being supplied to administrative staff
Carry out construction personnel's management;The construction project time management unit carries out construction project time management for being supplied to administrative staff.
Specifically, intelligent building provides wide application field for integration of information system project management, in building intelligence
Change in work progress, since civil engineering, decoration, installation etc. participate in shared time and space resource in many ways, so that integration of information system
Project should more reinforce related management in practice of construction, mutually shift responsibility onto others to evade in construction, cooperate imbalance.To intelligent building
Carry out the integrated planning design phase, top priority be according to building requirement, using function, service function etc. as far as possible
Deep analysis and discussion is done, synthesis includes that applicability, economy and advance etc. make reasonable entirety to class factor
Planning, cooperation Construction Party and design side carry out system structure and layout with regard to subsystems, and tissue demonstration to monitored object, is set
Standby quantity, orientation feature, as in construction spool, wire casing and water, electricity, the spool in wind system, wire casing, pipeline arrangement should
It is harmonious.
Project manager is first owner in the entire project implementation process, is not only needed in implementation method, implementation machine
Active adoption new technology improves efficiency in the selection of tool, in the arrangement of implementation sequence, should also in the entire project management and
When analyze break even, such as supervise the implementation and management of contract, supervise and manage declaring and money being urged to work for progress payment, and according to point
Analyse financial revenue and expenditure situation, the work progress of the well-organized program member of rational management fund, requirement of actively doing one's duty.Reinforcing
In the management that weak electricity system and civil engineering, decoration cooperate, to underground, spool through walls, along column metope pre-embedded, wire casing engineering, need
Cooperation is timely and effectively linked up, constructs for light current and reserves time enough and space.
Embodiment 6
A kind of propulsion management storage medium of Project of Computer System Integration is stored with computer journey on the storage medium
Sequence;Described program includes: using VPN network link cost management end, time management end, construction management end, data safety management
End, management database and risk management end, establish the code segment of block chain network;In cost management end, time management end, construction
Management end, data safety management end, management database and risk management end are separately connected a block catenary system functional module, should
Module realizes the code segment of node addition, key management and access limit distribution.
Embodiment 7
On the basis of a upper embodiment, described device includes: cost management end, time management end, construction management end, number
According to safety management end, management database, risk management end and VPN network;The cost management end, time management end, construction pipe
End, data safety management end, management database and risk management end are managed as end node, data communication is realized by VPN network,
Meanwhile constituting a block chain network;The cost management end carries out cost management for being supplied to administrative staff, comprising: at
This budget management and cost monitoring management;The time management end carries out time management for being supplied to administrative staff, comprising:
Time budget management and time monitoring management;The risk management end carries out risk management, packet for being supplied to administrative staff
It includes: the management of risk compliance and Risk-warning management;The construction management end carries out construction pipe for being supplied to administrative staff
Reason, comprising: construction personnel's management and construction project time management;The data safety management end includes: data encryption management and data
Backup management;The management database, for storing the data of whole device, comprising: primary database and several subdata bases.
Specifically, systematically solving problem often encountered in project management process, need to establish project operation system development
Line map, existing long-term goal, and have immediate objective, existing common-denominator target also has interim auxiliary mark, even for same
Traffic issues, it is also possible to be solved using different tool or method.Under normal conditions, there is a little problems in management
It is all mutually related, only there are the orders of importance and emergency when implementing for some projects.
Variation in view of organization is limited, can only be own according to its in specific time in project management implementation
Quantitative to change, this just needs for focus to be placed on the main of projects task for needing to implement in time in project management process
In element.Correct decisions of the propulsion of scientific project management dependent on manager, continuous renewal idea, paces of keeping pace with the times,
The philosophical thinking for establishing project management, it is to the assessment that strategic realization of goal is shown great foresight, the understanding of oneself and market is close
The problems such as combining, tissue, the planning, coordination of project held from management height.
Embodiment 8
On the basis of a upper embodiment, further include in the block chain network cost management end, time management end,
Construction management end, data safety management end, management database and risk management end are connected separately with a block catenary system function
It can module;The block catenary system functional module includes but is not limited to node addition module, cipher key module and access limit distribution
Module;The cipher key module is unsymmetrical key system, and public key is present in each node, for identifying node identities;Private key is deposited
It is in USB-key, is used for encryption data and signature;Module is added in node, for realizing the addition of new shareholder's node;
Access limit distribution module, for being written and read the distribution of permission.
Embodiment 9
Specifically, risk is ubiquitous, it is especially rich in creative and challenge system integration industry, in the project implementation
Process risk is still worth manager to pay much attention to.Compared with traditional industries, System Integration Project has multi-crossed disciplines, wealth
Power, intelligence-intensive feature, so that more " uncertain factors " is brought, if manager lacks calm planning and is likely to
Lead to the failure of target.For this purpose, the moment keeps the sense of risk of System Integration Project management, unite with Probability and mathematics
The tools such as meter go risk present in research project progress, find the good plan controlled risk.
Project risk feature in the combining information system integration is refined as following several classes: i.e. conceptual design risk, equipment choosing
Type risk, new-old system risk of handover, loss of data risk, network security risk, project process risk, institutional framework risk
Deng.For the above Risk characteristics, planning replying risk is worked out actively to change or reduce the probability or hazard analysis and HACCP of risk generation,
And identified risk is reinforced monitoring, stage by stage, incrementally lower the risk damage in project management.
On the basis of a upper embodiment, the distribution that the access limit distribution module is written and read permission includes following step
It is rapid:
Step 1: carrying out the distribution of read right, comprising:
Step 1.1: by cost management end, time management end, construction management end, data safety library management end, management data
When needing to carry out write-in data, block catenary system functional module, which sends to count at random, needs that data are written for library and risk management end
End node, random number use the end node public key encryption, which generates new block, and passes through the Hash of a upper block
Value, this block theme, random number and timestamp generate verifying cryptographic Hash h;
Step 1.2: newly-generated block and verifying cryptographic Hash h are sent block catenary system functional module, h by the end node
Using the public key encryption of block catenary system functional module, block catenary system functional module verification verifying cryptographic Hash h, and by new area
Block chain and data signature are broadcast to block chain network;
Step 1.3: when end node is autonomously generated new block in violation of rules and regulations, because of random number and timestamp difference, therefore verifying Hash
Value h1 is different, and block catenary system functional module is responsible for the validity of verification verifying cryptographic Hash;If verifying cryptographic Hash is invalid breathe out
Uncommon value, then determine that newly-generated block chain is invalid;
Step 2: carrying out the distribution of write permission, comprising:
Step 2.1: the content of each end node write area block in block chain is held exclusive symmetrical using end node
Key encryption, exclusive symmetric key are stored in USB-key, and the content of block body is retrieved using this block theme;When it
When his shareholder's end node needs access region block content, need to hold the USB-key for being stored with the exclusive symmetric key,
The content of block body could be decrypted;
Step 2.2: center end node according to engineering construction process analysis end node it should be appreciated that block chain content, i.e.,
The read right of end node realizes point of read right according to read right to end node USB-key of the distribution comprising exclusive symmetric key
Match.
Embodiment 10
On the basis of a upper embodiment, the data safety management end carry out data encryption management method execute with
Lower step:
Step 1: obtaining the data in management database in real time, the data managed in database are regarded under binary condition
It is handled for image data, these data smoothings is filtered, obtained class image data g (x), set a smoothing filter
Impulse Response Function is h (x), and former data are f (x), then data g (x)=f (x) * h (x) after being filtered;
Step 2: edge detection is carried out to filtered data;
Step 3: binary conversion treatment is carried out according to following formula:
Wherein, b (x, y) is binaryzation data, and i (x, y) is the data carried out after edge detection;
Step 4: the data after storage binary conversion treatment.
It is sub that the foregoing is merely one embodiment of the present of invention, but the range that the present invention cannot be limited in this way, all according to this
Invent the variation in done structure, if where not losing main idea of the invention, be regarded as falling into the scope of the present invention it
Inside it is restricted.
Person of ordinary skill in the field can be understood that, for convenience and simplicity of description, foregoing description
The specific work process of system and related explanation, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
It should be noted that system provided by the above embodiment, only illustrate with the division of above-mentioned each functional module
It is bright, in practical applications, it can according to need and complete above-mentioned function distribution by different functional modules, i.e., it will be of the invention
Module or step in embodiment are decomposed or are combined again, for example, the module of above-described embodiment can be merged into a module,
It can also be further split into multiple submodule, to complete all or part of the functions described above.The present invention is implemented
Module, the title of step involved in example, it is only for distinguish modules or step, be not intended as to of the invention improper
It limits.
Person of ordinary skill in the field can be understood that, for convenience and simplicity of description, foregoing description
The specific work process and related explanation of storage device, processing unit, can refer to corresponding processes in the foregoing method embodiment,
Details are not described herein.
Those skilled in the art should be able to recognize that, mould described in conjunction with the examples disclosed in the embodiments of the present disclosure
Block, method and step, can be realized with electronic hardware, computer software, or a combination of the two, software module, method and step pair
The program answered can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electric erasable and can compile
Any other form of storage well known in journey ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field is situated between
In matter.In order to clearly demonstrate the interchangeability of electronic hardware and software, in the above description according to function generally
Describe each exemplary composition and step.These functions are executed actually with electronic hardware or software mode, depend on technology
The specific application and design constraint of scheme.Those skilled in the art can carry out using distinct methods each specific application
Realize described function, but such implementation should not be considered as beyond the scope of the present invention.
Term " first ", " second " etc. are to be used to distinguish similar objects, rather than be used to describe or indicate specific suitable
Sequence or precedence.
Term " includes " or any other like term are intended to cover non-exclusive inclusion, so that including a system
Process, method, article or equipment/device of column element not only includes those elements, but also including being not explicitly listed
Other elements, or further include the intrinsic element of these process, method, article or equipment/devices.
So far, it has been combined preferred embodiment shown in the drawings and describes technical solution of the present invention, still, this field
Technical staff is it is easily understood that protection scope of the present invention is expressly not limited to these specific embodiments.Without departing from this
Under the premise of the principle of invention, those skilled in the art can make equivalent change or replacement to the relevant technologies feature, these
Technical solution after change or replacement will fall within the scope of protection of the present invention.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (10)
1. a kind of propulsion management method of Project of Computer System Integration, which is characterized in that the method executes following steps:
Step 1: using VPN network link cost management end, time management end, construction management end, data safety management end, management
Database and risk management end, establish block chain network;
Step 2: in cost management end, time management end, construction management end, data safety management end, management database and risk
Management end is separately connected a block catenary system functional module, which realizes that node is added, key management and access limit divide
Match;Wherein, the method for key management executes following steps:
Step 2.1: using following formula, continuous data key is mapped as to discrete data key, then by discrete data
Key storage is individually stored into a subelement, when needing to call, using the inverse process of following formula, is taken out close
Key:;Wherein, N is discrete dimension;xnFor the first dimension data key in the data key of multidimensional;ynTie up the data key of multidimensional
In two-dimensional data key;
Step 2.1: carrying out the distribution management of key in real time.
2. the method as described in claim 1, which is characterized in that the cost management end is carried out for being supplied to administrative staff
Cost management, comprising: cost budgeting administrative unit and cost monitoring administrative unit;The cost budgeting administrative unit, for mentioning
Supply management personnel carry out cost budgeting management;The cost monitoring administrative unit carries out cost for being supplied to administrative staff
Monitoring.
3. the method as described in claim 1, which is characterized in that the time management end is carried out for being supplied to administrative staff
Time management, comprising: time budget administrative unit and time monitoring administrative unit;The time budget administrative unit, for mentioning
Supply management personnel carry out time budget management;The time monitoring administrative unit carries out the time for being supplied to administrative staff
Monitoring management.
4. the method as described in claim 1, which is characterized in that the risk management end is carried out for being supplied to administrative staff
Risk management, comprising: risk compliance administrative unit and Risk-warning administrative unit;The risk compliance administrative unit is used
The management of risk compliance is carried out in being supplied to administrative staff;The Risk-warning administrative unit, for be supplied to administrative staff into
Row risk compliance management.
5. the method as described in claim 1, which is characterized in that the construction management end is carried out for being supplied to administrative staff
Construction management, comprising: construction personnel's administrative unit and construction project time management unit;Construction personnel's administrative unit, for mentioning
Supply management personnel carry out construction personnel's management;The construction project time management unit, constructs for being supplied to administrative staff
Progress control.
6. a kind of propulsion management storage medium of Project of Computer System Integration, which is characterized in that stored on the storage medium
There is computer program;Described program includes: using VPN network link cost management end, time management end, construction management end, number
According to safety management end, management database and risk management end, the code segment of block chain network is established;At cost management end, time
Management end, construction management end, data safety management end, management database and risk management end are separately connected a block catenary system
Functional module, the module realize the code segment of node addition, key management and access limit distribution.
7. a kind of propulsion management device of Project of Computer System Integration, which is characterized in that described device includes: cost management
End, time management end, construction management end, data safety management end, management database, risk management end and VPN network;It is described at
This management end, time management end, construction management end, data safety management end, management database and risk management end are as end segment
Point realizes data communication by VPN network, meanwhile, constitute a block chain network;The cost management end, for being supplied to
Administrative staff carry out cost management, comprising: cost budgeting management and cost monitoring management;The time management end, for providing
Time management is carried out to administrative staff, comprising: time budget management and time monitoring management;The risk management end, for mentioning
Supply management personnel carry out risk management, comprising: the management of risk compliance and Risk-warning management;The construction management end is used
Construction management is carried out in being supplied to administrative staff, comprising: construction personnel's management and construction project time management;The data safety management
End includes: data encryption management and backup data management;The management database, for storing the data of whole device, comprising:
Primary database and several subdata bases.
8. device as claimed in claim 7, which is characterized in that further include in the block chain network cost management end,
Time management end, construction management end, data safety management end, management database and risk management end are connected separately with an area
Block catenary system functional module;The block catenary system functional module includes but is not limited to node addition module, cipher key module and reading
Write permission distribution module;The cipher key module is unsymmetrical key system, and public key is present in each node, for identifying node body
Part;Private key is present in USB-key, is used for encryption data and signature;Module is added in node, for realizing new shareholder section
The addition of point;Access limit distribution module, for being written and read the distribution of permission.
9. device as claimed in claim 8, which is characterized in that the access limit distribution module is written and read the distribution of permission
The following steps are included:
Step 1: carrying out the distribution of read right, comprising:
Step 1.1: by cost management end, time management end, construction management end, data safety library management end, management database and
When needing to carry out write-in data, block catenary system functional module is sent counts to the end for needing to be written data at random at risk management end
Node, random number use the end node public key encryption, which generates new block, and by the cryptographic Hash of a upper block,
This block theme, random number and timestamp generate verifying cryptographic Hash h;
Step 1.2: newly-generated block and verifying cryptographic Hash h are sent block catenary system functional module by the end node, and h is used
The public key encryption of block catenary system functional module, block catenary system functional module verification verifying cryptographic Hash h, and by new block chain
Block chain network is broadcast to data signature;
Step 1.3: when end node is autonomously generated new block in violation of rules and regulations, because of random number and timestamp difference, therefore verifying cryptographic Hash h1
Difference, block catenary system functional module are responsible for the validity of verification verifying cryptographic Hash;If verifying cryptographic Hash is invalid cryptographic Hash,
Then determine that newly-generated block chain is invalid;
Step 2: carrying out the distribution of write permission, comprising:
Step 2.1: the exclusive symmetric key that the content of each end node write area block in block chain uses end node to hold
Encryption, exclusive symmetric key are stored in USB-key, and the content of block body is retrieved using this block theme;When other benefits
When beneficial related side's end node needs access region block content, need to hold the USB-key for being stored with the exclusive symmetric key, ability
Decrypt the content of block body;
Step 2.2: center end node according to engineering construction process analysis end node it should be appreciated that block chain content, i.e. end segment
The read right of point realizes the distribution of read right according to read right to end node USB-key of the distribution comprising exclusive symmetric key.
10. device as claimed in claim 9, which is characterized in that the data safety management end is carrying out data encryption management
Method execute following steps:
Step 1: obtaining the data in management database in real time, the data managed in database are considered as figure under binary condition
As data are handled, these data smoothings are filtered, obtains class image data g (x), sets the impact of a smoothing filter
Receptance function is h (x), and former data are f (x), the then data after being filtered;
Step 2: edge detection is carried out to filtered data;
Step 3: binary conversion treatment is carried out according to following formula:
Wherein, b (x, y) is binaryzation data, and i (x, y) is the data carried out after edge detection;
Step 4: the data after storage binary conversion treatment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910675525.8A CN110430250B (en) | 2019-07-25 | 2019-07-25 | Computer system integrated push project management method, storage medium and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910675525.8A CN110430250B (en) | 2019-07-25 | 2019-07-25 | Computer system integrated push project management method, storage medium and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110430250A true CN110430250A (en) | 2019-11-08 |
CN110430250B CN110430250B (en) | 2022-04-05 |
Family
ID=68412377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910675525.8A Active CN110430250B (en) | 2019-07-25 | 2019-07-25 | Computer system integrated push project management method, storage medium and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110430250B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110880069A (en) * | 2019-11-12 | 2020-03-13 | 深圳市建筑科学研究院股份有限公司 | Engineering settlement traceability method and device based on block chain technology |
CN111159769A (en) * | 2019-12-31 | 2020-05-15 | 杭州产链数字科技有限公司 | Building engineering cost supervision system and method based on block chain |
CN112884264A (en) * | 2019-11-30 | 2021-06-01 | 南京苏德创新科技有限公司 | Process management method based on information system integration |
CN112907077A (en) * | 2021-02-20 | 2021-06-04 | 一智科技(成都)有限公司 | Construction task order dispatching method and system |
CN115222241A (en) * | 2022-07-15 | 2022-10-21 | 实链检测(浙江)有限公司 | Engineering quality detection method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503875A (en) * | 2015-09-05 | 2017-03-15 | 哈尔滨卓晋科技有限公司 | A kind of propulsion project management method of Computer systems |
US20170213209A1 (en) * | 2016-01-21 | 2017-07-27 | International Business Machines Corporation | Enterprise blockchains and transactional systems |
CN108629564A (en) * | 2018-04-28 | 2018-10-09 | 中国船舶重工集团公司第七〇九研究所 | A kind of Management in Large Scale Project system and method based on block chain technology |
US20180294955A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | System for processing data based on blockchain and operating method thereof |
CN109039606A (en) * | 2018-08-22 | 2018-12-18 | 上海循态信息科技有限公司 | Same frequency sampling method and circuit in continuous variable quantum key distribution system |
-
2019
- 2019-07-25 CN CN201910675525.8A patent/CN110430250B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503875A (en) * | 2015-09-05 | 2017-03-15 | 哈尔滨卓晋科技有限公司 | A kind of propulsion project management method of Computer systems |
US20170213209A1 (en) * | 2016-01-21 | 2017-07-27 | International Business Machines Corporation | Enterprise blockchains and transactional systems |
US20180294955A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | System for processing data based on blockchain and operating method thereof |
CN108629564A (en) * | 2018-04-28 | 2018-10-09 | 中国船舶重工集团公司第七〇九研究所 | A kind of Management in Large Scale Project system and method based on block chain technology |
CN109039606A (en) * | 2018-08-22 | 2018-12-18 | 上海循态信息科技有限公司 | Same frequency sampling method and circuit in continuous variable quantum key distribution system |
Non-Patent Citations (3)
Title |
---|
VLADYSLAV USENKO等: "Continuous- and Discrete-Variable Quantum Key Distribution with Nonclassical Light Over Noisy Channels", 《IEEE》 * |
刘维琪等: "连续变量量子密钥分发技术研究进展", 《信息安全研究》 * |
钱旭东等: "连续变量量子密钥分发协商过程的优化实现", 《中国科学》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110880069A (en) * | 2019-11-12 | 2020-03-13 | 深圳市建筑科学研究院股份有限公司 | Engineering settlement traceability method and device based on block chain technology |
CN112884264A (en) * | 2019-11-30 | 2021-06-01 | 南京苏德创新科技有限公司 | Process management method based on information system integration |
CN111159769A (en) * | 2019-12-31 | 2020-05-15 | 杭州产链数字科技有限公司 | Building engineering cost supervision system and method based on block chain |
CN112907077A (en) * | 2021-02-20 | 2021-06-04 | 一智科技(成都)有限公司 | Construction task order dispatching method and system |
CN115222241A (en) * | 2022-07-15 | 2022-10-21 | 实链检测(浙江)有限公司 | Engineering quality detection method |
Also Published As
Publication number | Publication date |
---|---|
CN110430250B (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110430250A (en) | A kind of propulsion management method, storage medium and the device of Project of Computer System Integration | |
O’Connell | Towards adaptation of water resource systems to climatic and socio-economic change | |
Harrison et al. | Foundations for smarter cities | |
Sergi et al. | Smart cities and economic growth in Russia | |
Ohab-Yazdi et al. | Using the agent-based model to simulate and evaluate the interaction effects of agent behaviors on groundwater resources, a case study of a sub-basin in the Zayandehroud River basin | |
Soin et al. | Management control and uncertainty: Risk management in universities | |
Mao et al. | Resilience‐Based Optimization of Postdisaster Restoration Strategy for Road Networks | |
Ferreira et al. | Managing interdependencies in critical infrastructures—a cornerstone for system resilience | |
Banciu et al. | Digital transformation impact on organization management and several necessary protective actions | |
Mattila et al. | Blockchain for environmentally sustainable economies: Case study on 5irechain | |
Seddighi et al. | A sustainable risk-averse approach to power generation planning with disruption risk and social responsibility considerations | |
Yazan et al. | Decision-support tools for smart transition to circular economy | |
Lind et al. | Policies to avoid cost overruns in infrastructure projects: Critical evaluation and recommendations | |
Durden et al. | Report on the Managing Impacts of Deep-seA reSource exploitation (MIDAS) workshop on environmental management of deep-sea mining | |
Amine | Smart Cities: Development and Benefits | |
El Ghorfi et al. | A modeling approach for IT governance basics application on IT projects and IT goals | |
El Khatib et al. | Collaborative Business Intelligence A Case Study of the Dubai Smart City Strategy | |
Stout et al. | Lao Power Sector Vulnerability Assessment and Resilience Action Plan | |
Mubiru et al. | Investment Decision Modeling for Transboundary Project Portfolio Selection | |
Bethlehem et al. | The bottom line: Industry and the environment in South Africa | |
Sukarman et al. | Green Information Technology Policy in Indonesia | |
Putri et al. | A literature review of research between supply chain constraits issues and decree of the government of Indonesia during Covid-19 | |
Seok et al. | Decision support protocol for sustainability issues in supply networks | |
Rosenberg et al. | A systems-based approach to creating value from infrastructure interdependencies | |
Saputra et al. | Networks in the Implementation of Illegal Gold Mining Countermeasure Policy in Kuantan Singingi Regency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |