CN115392810A - Block chain-based full-process environment detection system and method thereof - Google Patents

Block chain-based full-process environment detection system and method thereof Download PDF

Info

Publication number
CN115392810A
CN115392810A CN202211341829.9A CN202211341829A CN115392810A CN 115392810 A CN115392810 A CN 115392810A CN 202211341829 A CN202211341829 A CN 202211341829A CN 115392810 A CN115392810 A CN 115392810A
Authority
CN
China
Prior art keywords
detection
unit
block chain
sample
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211341829.9A
Other languages
Chinese (zh)
Inventor
甘伟伟
金劲松
曹鹏
刘志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengzheng Blockchain Technology Co ltd
Original Assignee
Jiangsu Hengzheng Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengzheng Blockchain Technology Co ltd filed Critical Jiangsu Hengzheng Blockchain Technology Co ltd
Priority to CN202211341829.9A priority Critical patent/CN115392810A/en
Publication of CN115392810A publication Critical patent/CN115392810A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0611Request for offers or quotes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Accounting & Taxation (AREA)
  • Educational Administration (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of data detection, in particular to a block chain-based full-flow environment detection system and a block chain-based full-flow environment detection method, wherein the system comprises an electronic quotation unit: for generating a quotation; an electronic contract unit: used for generating a contract document; an online scheduling unit: for performing online scheduling; a sampling management unit: the system is used for printing a sample label and generating a sampling list; a sample management unit: for generating a sample cross-connect sheet; a detection management unit: for intelligently allocating tasks; a report generation unit: for generating a detection report. The invention creates a whole-process environment detection alliance chain, helps the third-party environment detection institution to scientifically manage, improves the efficiency, reduces the cost, prompts the informatization management level, repeatedly utilizes the public, transparent and traceable characteristics of the block chain, carries out double protection on data through an improved encryption algorithm and provides a brand-new digital channel for the detection institution, the detection client and the supervision institution.

Description

Block chain-based full-process environment detection system and method thereof
Technical Field
The invention relates to the technical field of data detection, in particular to a block chain-based full-flow environment detection system and a block chain-based full-flow environment detection method.
Background
With the rapid development of science and technology and building industry, people have powerful and great improvement in all aspects of life. At the same time, many problems are generated in the development process. Among them, the most significant problem of environmental problems greatly affects the health of people. In China, the detection of the environment is strengthened in the year, certain effect is achieved on improving the environment, but a plurality of problems still exist, and especially the environment improvement effect is not obvious due to the imperfection of the environment monitoring technology. Although the existing environment detection mechanism has the first-hand detection data of the environment protection industry, an effective means is lacked to analyze and mine the data, the data is difficult to be converted into valuable information, and the environment detection industry is low in added value and profit margin. The detection data acquisition and transmission channel depends on the traditional manual handwriting mode, so that the labor cost is high, mistakes are easy to make, and the overall efficiency of the detection industry is low. Due to competition and confidentiality factors, information among detection mechanisms has islands and is not shared; for information security reasons, organizations are also reluctant to place the test data on a data server. The detection industry depends on the traditional salesman marketing means, the client resources are mastered by the salesman, the loss of the client resources is often caused directly by the deputy of the salesman, and the detection mechanism is easy to be kidnapped by the salesman.
Disclosure of Invention
The present invention is directed to a block chain-based full-process environment detection system and method thereof, so as to solve the above-mentioned drawbacks in the background art.
The technical scheme adopted by the invention is as follows:
a block chain-based full-process environment detection system and a method thereof are provided, which comprises the following steps:
an electronic quotation unit: for quickly generating a quotation;
an electronic contract unit: the contract document is automatically generated;
an online scheduling unit: the system is used for scheduling according to the monitoring frequency and the progress condition;
a sampling management unit: the system is used for automatically printing a sample label, recording a sample by a mobile phone on site and generating a sampling list;
a sample management unit: for automatically generating a sample cross-connect order;
a detection management unit: the system is used for intelligently distributing tasks, and performing online entry and audit;
a report generation unit: for automatically generating a detection report;
the block chain encryption unit is used for encrypting uplink to key information in the detection process; in the block chain encryption unit, key node data in a detection process is encrypted and uplink stored by means of a block chain, the whole encryption process can be traced, and uplink information cannot be tampered; wherein, the encryption of the key information adopts the improved RSA algorithm.
As a preferred technical scheme of the invention: the online scheduling unit comprises a subcontracting judgment and a task scheduling for the contract, wherein in the subcontracting judgment, whether the contract needs subcontracting and is matched with a subcontracting mechanism is judged, and in the task scheduling, a detection task is distributed according to project requirements, and the task progress is tracked in real time.
As a preferred technical scheme of the invention: the improved RSA algorithm comprises the following steps:
generating large prime numbers from detected data
Figure 730979DEST_PATH_IMAGE001
And
Figure 884880DEST_PATH_IMAGE002
Figure 767385DEST_PATH_IMAGE003
let us order
Figure 385448DEST_PATH_IMAGE004
Obtaining Euler function values from Euler function properties
Figure 531259DEST_PATH_IMAGE005
Randomly selecting a positive integer e smaller than r, wherein e and r are prime numbers, and according to the modulo element, if two positive integers e and r are prime numbers, then there is an integer d, so as to satisfy the requirement
Figure 234773DEST_PATH_IMAGE006
Divided by r to obtain e modulo element d about r to obtain public key
Figure 858652DEST_PATH_IMAGE007
And a private key
Figure 331222DEST_PATH_IMAGE008
To obtain a public key
Figure 710250DEST_PATH_IMAGE007
Then, the plaintext information m is encrypted:
Figure 635481DEST_PATH_IMAGE009
c obtained by calculation is a ciphertext;
selecting an arbitrary value k
Figure 63051DEST_PATH_IMAGE010
J is the order of an elliptic curve t domain, and a binary group is constructed according to the obtained public key and the private key
Figure 390127DEST_PATH_IMAGE011
And sending the ciphertext c to a receiving end together:
Figure 877741DEST_PATH_IMAGE012
wherein the content of the first and second substances,
Figure 290267DEST_PATH_IMAGE013
in order to be the public key,
Figure 583845DEST_PATH_IMAGE014
is a private key.
As a preferred technical scheme of the invention: after the receiving end receives the ciphertext, solving according to the binary group:
Figure 968690DEST_PATH_IMAGE015
Figure 423942DEST_PATH_IMAGE016
to obtain
Figure 323765DEST_PATH_IMAGE017
Private key
Figure 591673DEST_PATH_IMAGE018
And decrypt the ciphertext to obtain the private key
Figure 158921DEST_PATH_IMAGE019
And substituting with the ciphertext c:
Figure 519495DEST_PATH_IMAGE020
the plaintext m is obtained.
As a preferred technical scheme of the invention: the system also comprises a basic data management unit, wherein the basic data management unit is used for managing the customer relationship, the packet mechanism, the detection factor and the instrument.
As a preferred technical scheme of the invention: still include intelligent workstation: the method and the device are used for realizing the dynamic data overview and carrying out risk early warning prompt.
As a preferred technical scheme of the invention: the system also comprises a client service unit, wherein the client service provided by the client service unit comprises consultation service, implementation service and after-sales service.
The method for detecting the full-flow environment based on the block chain comprises the following steps:
s1.1: rapidly selecting detection factors and quotation, automatically generating an electronic quotation list, and performing higher-level audit feedback;
s1.2: after the quotation is finished, automatically generating an electronic contract draft, and carrying out online contract review on the electronic contract;
s1.3: after the contract review is passed, performing sub-packet judgment and task scheduling according to the contract;
s1.4: distributing sampling tasks and automatically generating electronic tags, scanning the sample tags through a mobile phone, and automatically generating a field sampling record sheet;
s1.5: after sampling is finished, sample handover is carried out, the samples are put in and out of a warehouse in batches, and a sample handover list is automatically generated;
s1.6: and after the sample is collected, distributing detection tasks on line, inputting detection results and auditing on line.
Compared with the prior art, the block chain-based full-flow environment detection system and the block chain-based full-flow environment detection method have the beneficial effects that:
the invention creates a whole-process environment detection alliance chain, helps the third-party environment detection institution to scientifically manage, improves the efficiency, reduces the cost, prompts the informatization management level, repeatedly utilizes the public, transparent and traceable characteristics of the block chain, carries out double protection on data through an improved encryption algorithm and provides a brand-new digital channel for the detection institution, the detection client and the supervision institution.
Drawings
FIG. 1 is a system block diagram of a preferred embodiment of the present invention;
FIG. 2 is a flow chart of a method in a preferred embodiment of the present invention.
The meaning of each label in the figure is: 1. an electronic quotation unit; 2. an electronic contract unit; 3. an online scheduling unit; 4. a sampling management unit; 5. a sample management unit; 6. a detection management unit; 7. a report generation unit; 8. a block chain encryption unit; 9. a basic data management unit; 10. an intelligent workbench; 11. a customer service unit.
Detailed Description
It should be noted that, in the case of no conflict, the embodiments and the features in the embodiments may be combined with each other, and the technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a preferred embodiment of the present invention provides a block chain-based full-flow environment detection system and a method thereof, including:
electronic quotation unit 1: for quickly generating a quotation;
electronic contract unit 2: the contract document is automatically generated;
online scheduling unit 3: the system is used for scheduling according to the monitoring frequency and the progress condition;
the sampling management unit 4: the system is used for automatically printing a sample label, recording a sample by a mobile phone on site and generating a sampling list;
the sample management unit 5: for automatically generating a sample cross-connect order;
the detection management unit 6: the system is used for intelligently distributing tasks, and performing online entry and audit;
report generation unit 7: for automatically generating a detection report.
The online scheduling unit 3 comprises a subcontracting judgment and a task scheduling for the contract, wherein in the subcontracting judgment, whether the contract needs subcontracting and is matched with a subcontracting mechanism is judged, and in the task scheduling, a detection task is distributed according to project requirements, and the task progress is tracked in real time.
The system further comprises a block chain encryption unit 8, wherein the block chain encryption unit 8 is used for encrypting uplink for key information in the detection process.
In the block chain encryption unit 8, key node data in the detection process is encrypted and uplink stored by means of a block chain, the whole encryption process can be traced, and uplink information cannot be tampered; wherein, the encryption of the key information adopts the improved RSA algorithm.
The improved RSA algorithm comprises the following steps:
generating large prime numbers from detected data
Figure 109876DEST_PATH_IMAGE001
And
Figure 745257DEST_PATH_IMAGE002
Figure 839115DEST_PATH_IMAGE003
let us order
Figure 636170DEST_PATH_IMAGE004
Obtaining Euler function values from Euler function properties
Figure 510585DEST_PATH_IMAGE005
Randomly selecting a positive integer e smaller than r, wherein e and r are prime numbers, and according to the modulo element, if two positive integers e and r are prime numbers, then there is an integer d, so as to satisfy the requirement
Figure 887340DEST_PATH_IMAGE006
Divided by r to obtain the modulo inverse element d of e with respect to r and obtain the public key
Figure 163600DEST_PATH_IMAGE007
And a private key
Figure 131556DEST_PATH_IMAGE008
To obtain a public key
Figure 430950DEST_PATH_IMAGE007
Then, the plaintext information m is encrypted:
Figure 408134DEST_PATH_IMAGE009
c obtained by calculation is ciphertext;
selecting an arbitrary value k
Figure 273322DEST_PATH_IMAGE010
J is the order of an elliptic curve t domain, and a binary group is constructed according to the obtained public key and the private key
Figure 615441DEST_PATH_IMAGE011
And sending the ciphertext c to a receiving end together:
Figure 464449DEST_PATH_IMAGE012
wherein the content of the first and second substances,
Figure 917427DEST_PATH_IMAGE013
in order to be the public key,
Figure 902700DEST_PATH_IMAGE014
is a private key.
After the receiving end receives the ciphertext, solving according to the binary group:
Figure 478038DEST_PATH_IMAGE015
Figure 752024DEST_PATH_IMAGE016
to obtain
Figure 71010DEST_PATH_IMAGE017
Private key
Figure 910790DEST_PATH_IMAGE018
And decrypt the ciphertext to obtain the private key
Figure 93248DEST_PATH_IMAGE018
And substituting with the ciphertext c:
Figure 651268DEST_PATH_IMAGE020
the plaintext m is obtained.
The system also comprises a basic data management unit 9, wherein the basic data management unit 9 is used for managing the customer relationship, the packet distribution mechanism, the detection factor and the instrument.
Still include intelligent workstation 10: the method and the device are used for realizing the dynamic data overview and carrying out risk early warning prompt.
The system also comprises a client service unit 11, and the client service provided by the client service unit 11 comprises consultation service, implementation service and after-sales service.
The method for detecting the full-flow environment based on the block chain comprises the following steps:
s1.1: rapidly selecting detection factors and quotation, automatically generating an electronic quotation list, and performing higher-level audit feedback;
s1.2: after the quotation is finished, automatically generating an electronic contract draft, and carrying out online contract review on the electronic contract;
s1.3: after the contract review is passed, performing sub-packet judgment and task scheduling according to the contract;
s1.4: distributing sampling tasks and automatically generating electronic tags, scanning the sample tags through a mobile phone, and automatically generating a field sampling record sheet;
s1.5: after sampling is finished, sample connection is carried out, the samples are delivered in batches and put into a warehouse, and a sample connection list is automatically generated;
s1.6: and after the sample is collected, distributing detection tasks on line, inputting detection results and auditing on line.
In this embodiment, drinking water detection is taken as an example. The intelligent workbench 10 dynamically displays various detection data, carries out risk early warning prompt, and the customer service unit 11 provides various online services for customers.
In the electronic quotation unit 1, a salesman can quickly screen out the quotation simulating factors according to the detection factor classification, and can also combine the common factors into a package form, so that a quotation is conveniently and quickly created. The platform counts the detection cost, sampling cost, report establishment cost, traveling cost and the like of the project to obtain total quotation, and after a salesman submits a quotation bill, the superior on-line audit feedback is carried out, so that the rapid and efficient service management is realized.
After the quotation is finished, the electronic contract unit 2 can automatically generate an electronic contract draft, and then each department responsible person can perform online contract review on the contract to be signed, and the review process can also be properly simplified. After the evaluation, the user can continue the subsequent work flow.
The online scheduling unit 3 comprises sub-package judgment and task scheduling, a scheduling responsible person needs to judge whether the contract needs to be sub-packaged or not and match a sub-package mechanism, and also needs to flexibly distribute detection tasks according to project requirements and track the task progress in real time.
The sampling management unit 4 performs sampling task allocation according to information such as detection types, detection factors, sampling point positions and the like, and each sample can automatically generate an electronic tag and be printed by a thermal printer in a one-key mode. The staff can scan the sample label through the mobile phone, input the detailed information of the sample, and can also automatically generate a field sampling record sheet. Therefore, visualization of sampling execution and progress is realized, flow management and control are established, and the working efficiency is improved.
After the sampling is completed, the sample management unit 5 needs to perform sample handover with a sample manager by sampling personnel and sample reception personnel, supports one-key batch output and input of samples, and supports automatic generation of a sample handover list, wherein the handover list contains key information such as sample details, sample sending personnel, sample receiving personnel, sample reception personnel and storage positions of a warehouse.
After the detection management unit 6 finishes sample collection, the laboratory responsible person can distribute detection tasks to the analysts on line, and after the analysts input detection results, the responsible person can perform on-line audit and inquire the execution conditions of the detection tasks in real time, so that the laboratory detection efficiency is improved.
After the detection data is input, the system can automatically generate a detection report by one key according to the sampling data and the detection data, and can also edit and typeset after the report is downloaded for special requirements, thereby greatly improving the working efficiency of a report builder. After the editor submits the audit, the auditor audits and issues on line, and the server permanently stores the final filing text of the detection report.
Key node data in the detection process is encrypted and uplink storage is carried out through the block chain encryption unit 8, and uplink information cannot be tampered and traceable. Meanwhile, in order to ensure the safety and reliability of data, all data stored in the chain are stored in an asymmetric encryption mode, and unauthorized data leakage is avoided. Data in the detection process are strictly isolated, the employee authority is different, and the observed interface and the data are different. The authority can be self-defined, the system gives the role default authority, and the mechanism can change the authority according to the requirement and also support the part-and-part functions.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present specification describes embodiments, not every embodiment includes only a single embodiment, and such description is for clarity purposes only, and it is to be understood that all embodiments may be combined as appropriate by one of ordinary skill in the art to form other embodiments as will be apparent to those of skill in the art from the description herein.

Claims (8)

1. The utility model provides a full flow environment detecting system based on block chain which characterized in that: the method comprises the following steps:
electronic quote unit (1): for quickly generating a quotation;
electronic contract unit (2): the contract document is automatically generated;
online scheduling unit (3): the system is used for scheduling according to the monitoring frequency and the progress condition;
sample management unit (4): the system is used for automatically printing a sample label, recording a sample by a mobile phone on site and generating a sampling list;
sample management unit (5): the system is used for automatically generating a sample cross-connection list;
detection management unit (6): the system is used for intelligently distributing tasks, and performing online entry and audit;
report generation unit (7): for automatically generating a detection report;
the block chain encryption unit (8) is used for encrypting uplink for key information in the detection process, in the block chain encryption unit (8), key node data in the detection process is encrypted and stored in uplink by means of a block chain, the encryption process can be traced back, and uplink information cannot be tampered; wherein, the encryption of the key information adopts the improved RSA algorithm.
2. The block chain-based full flow environment detection system of claim 1, wherein: the online scheduling unit (3) is used for performing subcontracting judgment and task scheduling on the contract, judging whether the contract needs subcontracting and matching with a subcontracting mechanism in the subcontracting judgment, and distributing detection tasks according to project requirements and tracking task progress in real time in the task scheduling.
3. The block chain-based full-flow environment detection system of claim 1, wherein: the improved RSA algorithm comprises the following steps:
generating large prime numbers from detected data
Figure 260632DEST_PATH_IMAGE001
And
Figure 443351DEST_PATH_IMAGE002
Figure 426351DEST_PATH_IMAGE003
let us order
Figure 821560DEST_PATH_IMAGE004
Obtaining the value of the Euler function according to the Euler function property
Figure 901512DEST_PATH_IMAGE005
Randomly selecting a positive integer e smaller than r, wherein e and r are prime numbers, and according to the modulo element, if two positive integers e and r are prime numbers, then there is an integer d, so as to satisfy the requirement
Figure 425772DEST_PATH_IMAGE006
Divided by r to obtain the modulo inverse element d of e with respect to r and obtain the public key
Figure 692805DEST_PATH_IMAGE007
And a private key
Figure 157284DEST_PATH_IMAGE008
To obtain a public key
Figure 29425DEST_PATH_IMAGE007
Then, the plaintext information m is encrypted:
Figure 288368DEST_PATH_IMAGE009
c obtained by calculation is a ciphertext;
selecting an arbitrary value k
Figure 42698DEST_PATH_IMAGE010
J is the order of an elliptic curve t domain, and a binary group is constructed according to the obtained public key and the private key
Figure 982972DEST_PATH_IMAGE011
And sending the ciphertext c to a receiving end together:
Figure 771936DEST_PATH_IMAGE012
wherein the content of the first and second substances,
Figure 405043DEST_PATH_IMAGE013
in order to be the public key,
Figure 646668DEST_PATH_IMAGE014
is a private key.
4. The blockchain-based full flow environment detection system of claim 3, wherein: after the receiving end receives the ciphertext, solving according to the binary group:
Figure 187371DEST_PATH_IMAGE015
Figure 34105DEST_PATH_IMAGE016
to find out
Figure 634850DEST_PATH_IMAGE017
Private key
Figure 363772DEST_PATH_IMAGE018
And decrypt the ciphertext to obtain the private key
Figure 645849DEST_PATH_IMAGE019
Substituting with the ciphertext c:
Figure 409405DEST_PATH_IMAGE020
the plaintext m is obtained.
5. The block chain-based full-flow environment detection system of claim 1, wherein: the system also comprises a basic data management unit (9), wherein the basic data management unit (9) is used for managing the customer relationship, the packet distribution mechanism, the detection factor and the instrument.
6. The block chain-based full flow environment detection system of claim 1, wherein: still include intelligent workstation (10): the method and the device are used for realizing the dynamic data overview and carrying out risk early warning prompt.
7. The block chain-based full-flow environment detection system of claim 1, wherein: the system also comprises a client service unit (11), and the client service provided by the client service unit (11) comprises consultation service, implementation service and after-sales service.
8. The detection method of the full-flow environment detection system based on any one of claims 1 to 7, characterized in that: the method comprises the following steps:
s1.1: rapidly selecting detection factors and quotations, automatically generating an electronic quotation list, and checking and feeding back by a superior level;
s1.2: after the quotation is finished, automatically generating an electronic contract draft, and carrying out online contract review on the electronic contract;
s1.3: after the contract review is passed, performing sub-package judgment and task scheduling according to the contract;
s1.4: the sampling task is distributed and an electronic tag is automatically generated, and the sample tag is scanned through a mobile phone to automatically generate a field sampling record sheet;
s1.5: after sampling is finished, sample handover is carried out, the samples are put in and out of a warehouse in batches, and a sample handover list is automatically generated;
s1.6: and after the sample is collected, distributing detection tasks on line, inputting detection results and auditing on line.
CN202211341829.9A 2022-10-31 2022-10-31 Block chain-based full-process environment detection system and method thereof Pending CN115392810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211341829.9A CN115392810A (en) 2022-10-31 2022-10-31 Block chain-based full-process environment detection system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211341829.9A CN115392810A (en) 2022-10-31 2022-10-31 Block chain-based full-process environment detection system and method thereof

Publications (1)

Publication Number Publication Date
CN115392810A true CN115392810A (en) 2022-11-25

Family

ID=84115105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211341829.9A Pending CN115392810A (en) 2022-10-31 2022-10-31 Block chain-based full-process environment detection system and method thereof

Country Status (1)

Country Link
CN (1) CN115392810A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116383859A (en) * 2023-06-06 2023-07-04 四川省建筑科学研究院有限公司 Detection report generation method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737098A (en) * 2018-06-27 2018-11-02 山西师范大学 Key generation method, information encipher-decipher method, device, medium and electronic equipment
CN110135748A (en) * 2019-05-21 2019-08-16 利姆斯(北京)区块链技术有限公司 Environment measuring sampling management system
CN112837195A (en) * 2020-12-31 2021-05-25 中盾云链(广州)信息科技有限公司 Block chain-based environment monitoring system and method
CN112884494A (en) * 2021-03-16 2021-06-01 链晟数科(成都)科技有限公司 Method and system for realizing high-credibility inspection detection data of third-party inspection detection mechanism

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737098A (en) * 2018-06-27 2018-11-02 山西师范大学 Key generation method, information encipher-decipher method, device, medium and electronic equipment
CN110135748A (en) * 2019-05-21 2019-08-16 利姆斯(北京)区块链技术有限公司 Environment measuring sampling management system
CN112837195A (en) * 2020-12-31 2021-05-25 中盾云链(广州)信息科技有限公司 Block chain-based environment monitoring system and method
CN112884494A (en) * 2021-03-16 2021-06-01 链晟数科(成都)科技有限公司 Method and system for realizing high-credibility inspection detection data of third-party inspection detection mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
任义烽: ""基于DES、RSA和ECC的混合加密算法研究"", 《中国优秀硕士学位论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116383859A (en) * 2023-06-06 2023-07-04 四川省建筑科学研究院有限公司 Detection report generation method and device, electronic equipment and storage medium
CN116383859B (en) * 2023-06-06 2023-08-22 四川省建筑科学研究院有限公司 Detection report generation method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Al-Fatlawi et al. Accounting information security and it governance under cobit 5 framework: A case study
CN102945519A (en) Internal work approval process management system of bank
CN106228340A (en) Construction drawing digitized auditing system
CN113987074A (en) Distributed service full-link monitoring method and device, electronic equipment and storage medium
EP3363148B1 (en) Encryption deployment discovery
CN107844875A (en) Green product management system and method
CN109102199A (en) laboratory information management system
CN103714434A (en) Chemical industry production site patrol system based on internet of things technology
Hong et al. An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea
CN115392810A (en) Block chain-based full-process environment detection system and method thereof
Shahjee et al. Integrated network and security operation center: A systematic analysis
Banciu et al. Digital transformation impact on organization management and several necessary protective actions
CN111428265A (en) Statement quality inspection method, device, equipment and storage medium based on federal learning
Brown et al. SANS 2022 cyber threat intelligence survey
CN107563671A (en) A kind of enterprise's test and appraisal planning service system based on internet
Altarawneh et al. Business Intelligence and Information System Management: A Conceptual View
Morolong et al. Designing an email security awareness program for state-owned enterprises in namibia
Grobauer et al. Carmentis: A co-operative approach towards situation awareness and early warning for the internet
CN112861037A (en) Data annotation method, device, system, electronic equipment and storage medium
CN110794795A (en) Industrial control information security risk assessment model based on distributed inspection
Youn et al. Empirical Analysis of Cryptocurrency Mixer: Tornado Cash
Goldman et al. Metrics based security assessment
Kumari et al. Taxonomy of Technical Challenges in Digital Forensics
CN116522028A (en) Online investigation method for company
Cervenka et al. THE IMPACT OF THE COVID 19 PANDEMIC ON THE DEVELOPMENT OF DIGITAL PROCESS AUTOMATION IN SMALL AND MEDIUM-SIZED ENTERPRISES

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221125