Distributed enterprise information management system and method based on information sharing mechanism
A technology of information sharing and enterprise information, applied in the field of information management, can solve problems such as lack of document management system and team management level constraints, and achieve the effect of ensuring efficiency, ensuring safety and high efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] Such as figure 1 As shown, a distributed enterprise information management system based on an information sharing mechanism, the system includes: a management server, a security control server, and a distributed information sharing terminal; the management server performs adding, deleting, storing, and Update, backup and authority control; the security control server is set between the distributed information sharing terminal and the management server, encrypts the information transmitted from the management server to the distributed information sharing terminal, and encrypts the information transmitted from the distributed information sharing terminal to the distributed information sharing terminal. The information of the management server is decrypted; there are several distributed information sharing terminals; the distributed information sharing terminals are connected to each other by signals to form a block chain network; The control server is signal connected; th...
Embodiment 2
[0028] On the basis of the previous embodiment, the security control server includes: an encryption unit, a decryption unit, and a signal transmission unit; the encryption unit encrypts the information transmitted from the management server to the distributed information sharing terminal; the decryption unit Decrypting the information transmitted from the distributed information sharing terminal to the management server; the signal transmission unit is used for data transmission with the management server and the distributed information sharing terminal respectively.
Embodiment 3
[0030] On the basis of the previous embodiment, the encryption unit performs the following steps for encrypting the information transmitted from the management server to the distributed information sharing terminal: generating a key; performing encryption, and encrypting the sub-information according to the generated key The packet is randomly modulated for the first time, and then modulo transformed for the first time, and the transformed sub-packet is randomly modulated for the second time, and then modulo transformed for the second time; the key is generated using the following formula:
[0031] where x n and y n is the input random variable, x n+1 and y n+1 is the generated key; mod is a modulo operation; w, v and μ are system parameters, wherein w is 0.9, v is 1.4, and μ is 3; the first modulus transformation and the second modulus transformation are carried out The method adopted is: use the following formula to perform the first modulus transformation and the secon...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

