CN117171724B - Enterprise information management method and system based on digitization - Google Patents

Enterprise information management method and system based on digitization Download PDF

Info

Publication number
CN117171724B
CN117171724B CN202311040543.1A CN202311040543A CN117171724B CN 117171724 B CN117171724 B CN 117171724B CN 202311040543 A CN202311040543 A CN 202311040543A CN 117171724 B CN117171724 B CN 117171724B
Authority
CN
China
Prior art keywords
information
slice
visitor
verification
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311040543.1A
Other languages
Chinese (zh)
Other versions
CN117171724A (en
Inventor
倪丽栋
瞿建平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Youyang Internet Technology Co ltd
Original Assignee
Anhui Youyang Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Youyang Internet Technology Co ltd filed Critical Anhui Youyang Internet Technology Co ltd
Priority to CN202311040543.1A priority Critical patent/CN117171724B/en
Publication of CN117171724A publication Critical patent/CN117171724A/en
Application granted granted Critical
Publication of CN117171724B publication Critical patent/CN117171724B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for managing enterprise information based on digitalization, wherein the method for managing enterprise information comprises the following steps: verifying login information, wherein the login information comprises an access account number and an access password of a visitor; sending a matching verification request, wherein the matching verification request comprises time domain slice node information; receiving slice verification information which is provided by a visitor and is generated based on time domain slice node information; and verifying the consistency of the slice verification information provided by the visitor and the maternal information, and granting the visitor access right after the verification is passed. According to the invention, after the identity is determined through preliminary verification of the account number and the password by combining with the existing account number and password verification mode, whether the visitor using the account number and password is an employee in an enterprise or not is further verified by combining with a readable medium used in the daily working process of the employee, so that illegal access to enterprise business data caused by cracking, revealing and the like of the account number and password is avoided to a great extent.

Description

Enterprise information management method and system based on digitization
Technical Field
The invention belongs to the technical field of information management services, and particularly relates to an enterprise information management method and system based on digitization.
Background
Enterprise business data are the most precious digital resources of enterprises, reflect the business conditions and financial conditions of the enterprises, provide basis for decision making, and even hide many business secrets of the enterprises, so that the precious data cannot be tampered maliciously, cannot be accessed without authorization and must be always in a safe state; however, in the information age, the business information often has the conditions of being tampered by data, network attack and data leakage, which threatens the security of the business information
At present, the security management of informationized data is mainly carried out by adopting a modern cryptographic algorithm to actively protect the data and adopting a modern information storage means to actively protect the data, and the management method can realize the security management of enterprise business data to a great extent; the management of enterprise business data in enterprises generally adopts an account password verification mode, so that the problem of enterprise business data security caused by cracking, revealing and the like of the account password is inevitably generated.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides the following technical scheme:
The application provides a method for managing enterprise information based on digitalization, which comprises the following steps:
verifying login information, wherein the login information comprises an access account number and an access password of a visitor;
sending a matching verification request, wherein the matching verification request comprises time domain slice node information;
receiving slice verification information which is provided by a visitor and is generated based on time domain slice node information;
And verifying the consistency of the slice verification information provided by the visitor and the maternal information, and granting the visitor access right after the verification is passed.
Preferably, the time domain slice node information includes at least one slice time.
Preferably, slicing is performed on the historical working data of the visitor by taking the slicing time in the time domain slicing node information as a reference, and slice verification information is generated after slice section data are obtained.
Preferably, the method for generating the slice verification information after acquiring the slice section data comprises the following steps:
acquiring data on all slice sections and counting data quantity;
Acquiring the number of slice points on all slice sections;
And packaging the data quantity and the number of the slice points to form slice verification information.
The application also provides a digitalized enterprise information management system, which is used for executing the enterprise information management method, and comprises the following steps:
The data storage module is used for storing an access account number and an access password of a visitor;
the distribution module is used for distributing the randomly generated time domain slice node information to the outside;
The staff data synchronization module is used for synchronously updating data generated in the staff work production process, including position information, work time length information and time axis information;
and the verification module is used for verifying the access account number and the access password and slicing verification information.
The beneficial effects of the invention are as follows: according to the invention, based on basic digital management of the employees by enterprises, historical working data of each employee due to production work differentiation is formed, after the identity is determined by preliminary verification through the account passwords in combination with the existing account password verification mode, whether the visitor using the account passwords is the employee in the enterprises or not is further verified by combining with readable media used in the daily working process of the employees, so that illegal access to enterprise business data caused by cracking, leakage and the like of the account passwords is avoided to a great extent.
Drawings
Fig. 1 is a flow chart of a method for managing enterprise information based on digitization.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the embodiments.
As shown in fig. 1, the present application first provides a method for managing enterprise information based on digitization, which comprises the following steps:
Step one, verifying login information, wherein the login information comprises an access account number and an access password of a visitor.
In this step, when a visitor needs to access enterprise business data, an access account number and an access password with access authority are generally input through a login section of a webpage or a client, so that the visitor has qualification of entering a server or a cloud end storing enterprise business data, and generally, such access management and control is difficult to avoid security problems caused by leakage of the access account number and the access password, so that login through the access account number and the access password is only primary verification, and is only used for verifying whether the visitor is a qualified access user, but cannot verify whether the visitor is a legal access user.
Step two, sending a matching verification request, wherein the matching verification request comprises time domain slice node information.
After the first step, the visitor is preliminarily verified, so that the visitor is ensured to be a qualified access user and is qualified for accessing business data of an enterprise. And then carrying out validity verification on the visitor passing the preliminary verification, and mainly avoiding illegal access caused by the leakage of the access account number and the access password. In the step, a matching verification request is sent to the visitor to request the validity of the visitor to be verified, so that a verification rule of certain information is provided for the visitor, and the visitor can provide the verified information according to the verification rule to pass the validity verification.
In the application, the validity verification process is deeply integrated into the production work data of the visitors, and because the process of the production work data generated by each visitor in the enterprise is unique, the validity verification is carried out based on the production work data of the visitor, thereby greatly avoiding the problem that an illegal user logs in by stealing an access account number and an access password.
And step three, receiving slice verification information which is provided by a visitor and is generated based on the time domain slice node information.
In the step, only slice verification information which is provided by a visitor and is generated based on time domain slice node information is received; more important in this step is the way the slice verification information is generated based on the time domain slice node information. In the second step, the matching verification request includes time-domain slice node information, where the time-domain slice node information is mainly slice time, and the slice time may be a determined absolute time, for example, 1 month and 1 day 16 in 2000 in Beijing time: 21:00, or an indefinite relative time, such as 21 hours 35 minutes from 300 natural days from the starting zero point.
In this step, if the visitor needs to further provide the slice verification information, a readable medium (such as a staff card) needs to be provided, the readable medium is opened and provided for the visitor by the enterprise while the visitor enters the enterprise, the opening time is recorded as a starting zero point, the readable medium is carried by the visitor and used for management of daily life, such as a usual consumption function, an entrance guard function, a card punching function and the like in daily life, the readable medium stores related records of each time the visitor uses the readable medium, such as that the visitor purchases an egg fried bread stick package at a canteen consumption 15 minutes 35 hours from the starting zero point, the readable medium forms a record of a time point, the content comprises 35 hours 14 minutes relative to the starting zero point, the place is the canteen, the behavior is consumption, the consumption amount is 15 yuan, the consumption object is the egg fried bread stick package, the content also forms a record of a time period in the process, the content comprises the record of 35 hours relative to the starting zero point, the place is 24 hours relative to the entrance guard, and the entrance guard is normally provided at the entrance guard.
The method for generating the slice verification information based on the time domain slice node information is as follows:
The communication connection between the upper computer and the readable medium of the visitor can be established by adopting USB, NFC and other modes, and the upper computer can perform read-write operation on the data in the readable medium, and the upper computer has no right for directly accessing the enterprise service data, and is only used for accessing the enterprise service data after the visitor passes verification, such as a personal PC;
After the upper computer acquires the time domain slice node information, the data in the readable medium is read, and then the data in the readable medium is sliced according to the slice time in the time domain slice node information, so that slice section data formed based on the slice can be obtained, and further slice verification information is formed based on the slice section data.
For example, the time-domain slice node information obtained by the upper computer is that the time-domain slice node information is divided into two slice times of 14 minutes from 15 natural days of the starting zero point and 35 hours and 20 minutes from 15 natural days of the starting zero point, then the upper computer reads the data in the readable medium and then slices the data respectively at the two slice times of 14 minutes from 15 natural days of the starting zero point and 35 hours and 20 minutes from 15 natural days of the starting zero point, so as to obtain slice section data, five slicing points about time, place, behavior, content 1 and content 2 are generated on the slicing section of 35 hours and 14 minutes from the initial zero point 15 natural days, and then the data quantity and the number of slicing points on the slicing section are counted to form slice verification information together, wherein the data quantity refers to the capacity of recording the cost of the data content on the slicing point, and M bytes are required for recording the place of a canteen. Correspondingly, on a slice section of 35 hours and 20 minutes from the initial zero point of 15 natural days, only three slice points of time, place and behavior are generated.
And step four, verifying the consistency of the slice verification information provided by the visitor and the maternal information, and granting the visitor access right after the verification is passed.
In this step, it is necessary to verify the consistency of the piece of verification information provided by the visitor with the piece of parent information, which was described in the previous step, and a consistency verification method will be described in this step. In the step, an employee management data server is pre-established, and when an employee uses a readable medium to generate data, the employee management data server records the data on the readable medium of the employee and the employee management data server at the same time, wherein the employee management data server is not used for recording production data; when a matching verification request is sent to a visitor, the same slicing operation is performed on the employee management data server through slicing time carried in the time domain slicing node information, so that maternal information is obtained, and whether the visitor is illegally accessed can be judged through verifying whether slicing verification information provided by the visitor is consistent with the maternal information.
It should be noted that, in the above steps, the time domain slice node information is randomly generated and distributed, and the slice time carried in the time domain slice node information is also random, and at least includes one slice time, or may be two or more, the slice time in the time domain slice node information is used as a reference to slice the historical working data of the visitor, the slice section data is obtained, then the slice verification information is generated, and the method for generating the slice verification information after the slice section data is obtained is as follows:
acquiring data on all slice sections and counting data quantity;
Acquiring the number of slice points on all slice sections;
And packaging the data quantity and the number of the slice points to form slice verification information.
The application also provides a digitalized enterprise information management system, which is used for executing the enterprise information management method, and comprises the following steps:
The data storage module is used for storing an access account number and an access password of a visitor;
the distribution module is used for distributing the randomly generated time domain slice node information to the outside;
The staff data synchronization module is used for synchronously updating data generated in the staff work production process, including position information, work time length information and time axis information;
and the verification module is used for verifying the access account number and the access password and slicing verification information.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting.

Claims (2)

1. A method for managing enterprise information based on digitization, comprising:
verifying login information, wherein the login information comprises an access account number and an access password of a visitor;
sending a matching verification request, wherein the matching verification request comprises time domain slice node information;
receiving slice verification information which is provided by a visitor and is generated based on time domain slice node information;
verifying the consistency of the slice verification information and the maternal information provided by the visitor, and granting the visitor access right after the verification is passed;
The time domain slice node information comprises at least one slice time; slicing historical working data of a visitor by taking slicing time in the time domain slicing node information as a reference, and generating slicing verification information after acquiring slicing section data;
the method for generating the slice verification information based on the time domain slice node information is as follows:
The method comprises the steps that communication connection between an upper computer and a readable medium of a visitor is established, the upper computer can perform read-write operation on data in the readable medium, the readable medium is opened and provided for the visitor by the enterprise when the visitor enters an enterprise, the opening time is recorded as an initial zero point, and the readable medium is carried by the visitor and is used for management of daily work and life;
After the upper computer acquires the time domain slicing node information, reading data in the readable medium, slicing the data in the readable medium according to slicing time in the time domain slicing node information, so that slice section data formed based on slicing can be obtained, slice verification information is further formed based on the slice section data, and validity verification is performed based on production work data of visitors;
The method for generating the slice verification information after the slice section data is acquired comprises the following steps:
acquiring data on all slice sections and counting data quantity;
Acquiring the number of slice points on all slice sections;
And packaging the data quantity and the number of the slice points to form slice verification information.
2. A digitally-based enterprise information management system for performing the enterprise information management method of claim 1, the enterprise information management system comprising:
The data storage module is used for storing an access account number and an access password of a visitor;
the distribution module is used for distributing the randomly generated time domain slice node information to the outside;
The staff data synchronization module is used for synchronously updating data generated in the staff work production process, including position information, work time length information and time axis information;
and the verification module is used for verifying the access account number and the access password and slicing verification information.
CN202311040543.1A 2023-08-16 2023-08-16 Enterprise information management method and system based on digitization Active CN117171724B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311040543.1A CN117171724B (en) 2023-08-16 2023-08-16 Enterprise information management method and system based on digitization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311040543.1A CN117171724B (en) 2023-08-16 2023-08-16 Enterprise information management method and system based on digitization

Publications (2)

Publication Number Publication Date
CN117171724A CN117171724A (en) 2023-12-05
CN117171724B true CN117171724B (en) 2024-05-24

Family

ID=88942183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311040543.1A Active CN117171724B (en) 2023-08-16 2023-08-16 Enterprise information management method and system based on digitization

Country Status (1)

Country Link
CN (1) CN117171724B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506459A (en) * 2016-10-17 2017-03-15 北京小米移动软件有限公司 Identity information verification method and device
CN108197901A (en) * 2018-02-01 2018-06-22 宁夏灵智科技有限公司 Working state determines method and system
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109787988A (en) * 2019-01-30 2019-05-21 杭州恩牛网络技术有限公司 A kind of identity reinforces certification and method for authenticating and device
CN111444484A (en) * 2020-03-27 2020-07-24 广州锦行网络科技有限公司 Enterprise intranet user identity portrait processing method based on unified login management
CN113111319A (en) * 2021-04-07 2021-07-13 珠海市鸿瑞信息技术股份有限公司 Identity authentication system and method based on industrial control system
CN113746846A (en) * 2021-09-06 2021-12-03 滨州学院 Computer network security access processing system based on big data
CN115277004A (en) * 2022-06-25 2022-11-01 南京工业大学 Internet of vehicles slice resource transaction method based on block chain
CN116071811A (en) * 2023-04-06 2023-05-05 中国工商银行股份有限公司 Face information verification method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274516A (en) * 2017-04-19 2017-10-20 捷开通讯(深圳)有限公司 The method and server of access registrar, intelligent terminal and storage device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506459A (en) * 2016-10-17 2017-03-15 北京小米移动软件有限公司 Identity information verification method and device
CN108197901A (en) * 2018-02-01 2018-06-22 宁夏灵智科技有限公司 Working state determines method and system
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109787988A (en) * 2019-01-30 2019-05-21 杭州恩牛网络技术有限公司 A kind of identity reinforces certification and method for authenticating and device
CN111444484A (en) * 2020-03-27 2020-07-24 广州锦行网络科技有限公司 Enterprise intranet user identity portrait processing method based on unified login management
CN113111319A (en) * 2021-04-07 2021-07-13 珠海市鸿瑞信息技术股份有限公司 Identity authentication system and method based on industrial control system
CN113746846A (en) * 2021-09-06 2021-12-03 滨州学院 Computer network security access processing system based on big data
CN115277004A (en) * 2022-06-25 2022-11-01 南京工业大学 Internet of vehicles slice resource transaction method based on block chain
CN116071811A (en) * 2023-04-06 2023-05-05 中国工商银行股份有限公司 Face information verification method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Developing an Adaptive Risk-Based Access Control Model for the Internet of Things;Hany F. Atlam等;2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData);20180201;全文 *
基于可信身份认证的企业信任服务体系研究;李明;;信息安全研究;20170905;第03卷(第09期);全文 *

Also Published As

Publication number Publication date
CN117171724A (en) 2023-12-05

Similar Documents

Publication Publication Date Title
CN107577939B (en) Data leakage prevention method based on keyword technology
CN107770191B (en) Enterprise financial management system with safety protection
US20120198569A1 (en) Associated with abnormal application-specific activity monitoring in a computing network
CN106027520B (en) A kind of detection processing steals the method and device of website account number
CN113722695B (en) Cloud server-based financial data secure sharing method, device and system
CN111475866A (en) Block chain electronic evidence preservation method and system
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN108053088A (en) A kind of Subscriber Management System, method and apparatus
CN109493224A (en) A kind of block chain picture social intercourse system
US10313371B2 (en) System and method for controlling and monitoring access to data processing applications
CN109829333A (en) A kind of key message guard method and system based on OpenID
CN111698328A (en) Enterprise big data analysis and processing platform based on hybrid cloud
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN117171724B (en) Enterprise information management method and system based on digitization
CN110555682A (en) multi-channel implementation method based on alliance chain
CN109714169A (en) It is a kind of based on the credible distribution platform of data strictly authorized and its circulation method
US20230252168A1 (en) Access control for air-gapped computer systems
CN114024730B (en) Enterprise portal management system
CN111427961B (en) Resume right determining method based on block chain, block chain resume system and device thereof
CN114693410A (en) Verification method and system based on block chain
CN114626849A (en) Data protection method and protection device based on block chain
CN115086028A (en) Block chain-based data security acquisition method
CN108399160A (en) A kind of method and system that the illegal word of online customer service is reminded
Tymchenko et al. Risks of Loss of Personal Data in the Process of Sending and Printing Documents.
CN111797382A (en) Privilege account authority control management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant