Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed unified management method applied to national defense industry supply chain

A management method and distributed technology, applied in data processing applications, electrical digital data processing, instruments, etc., can solve problems such as inconsistent data standards, difficult business interconnection, and inconsistent system construction standards, so as to improve computing efficiency and ensure data security. The effect of privacy security

Pending Publication Date: 2021-06-25
航天科工网络信息发展有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] A large number of business information systems that have been built in various industries and departments are built in a chimney style. Various systems generally have problems such as inconsistent construction standards, inconsistent data standards, difficult business interconnection, and difficult data interoperability, forming a large number of information islands, resulting in highly fragmented data. Decentralization, unable to effectively integrate, and play a synergistic complementarity of information utility
[0006] 2. The contradiction between the easy-to-copy feature of data and the security guarantee of cross-domain data
[0007] Since the data is in a digital form, it is easy to be copied and leaked in the network environment
For a long time, due to the lack of technical means to ensure the security of cross-domain data fusion computing, data fusion adopts plain text, which cannot ensure that data is not leaked and that data can be used across domains.
Faced with the requirement of data confidentiality responsibility, the data management party can only formulate strict data sharing requirements, which actually makes it impossible for data to achieve efficient cross-domain fusion applications
[0008] 3. Requirements for data custody are too high
For data cross-domain sharing and integration requirements, even if it is required by superiors, due to the difficulty in clarifying rights, responsibilities, and benefits, it is difficult to realize
[0010] 4. The application level of cross-domain data fusion needs to be improved urgently
[0011] Since cross-domain data cannot be effectively integrated, artificial intelligence and machine learning applications based on cross-domain data cannot be carried out, which greatly limits the application scenarios and application level of big data landing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed unified management method applied to national defense industry supply chain
  • Distributed unified management method applied to national defense industry supply chain
  • Distributed unified management method applied to national defense industry supply chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings and examples.

[0042] The present invention understands the overall risk information in the supply chain through information such as the supply capacity of the supplier unit, the demand of J arms (users), the refinement of the overall unit demand, the type / quantity of model components and specifications, risk information description, and degree of influence, and supports the group Make corresponding adjustments according to the risk situation, support the group to issue a major risk analysis of the supply chain to relevant secondary units, prevent the expansion and transfer of risks, and realize the management of major risks in the supply chain.

[0043] Such as figure 1 , Party J issues the production demand, the production demand is d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed unified management method applied to a national defense industry supply chain, and belongs to the technical field of information security. According to the invention, a matrix hybrid calculation mode of combining the plaintext and the ciphertext and combining the edge and the center is adopted, the edge and the center can be combined during plaintext calculation, and the edge and the center can also be combined during ciphertext calculation. According to the combination modes, under the condition that a service party requests and a participant agrees, scheduling is carried out by a resource scheduling center according to strategies agreed by the participant; the strategies comprise which calculations occur at the edge, which calculations occur at the center and which calculations can only occur at a specified node, and the purposes of simultaneously carrying out data security protection and improving calculation efficiency can be achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a distributed unified management method applied to the supply chain of the national defense industry. Background technique [0002] A new round of global technological revolution and industrial transformation is ready to go. The information network, artificial intelligence, big data, biotechnology, clean energy, new materials, advanced manufacturing and other fields are showing a group leap forward, and disruptive technologies are constantly emerging. In the process of promoting the penetration and deep integration of various industries in the defense industry, guarantee The security of networks and data at all levels has become extremely important and urgent. In the process of data storage, circulation, analysis, and use, 360-degree full life cycle data security is required. Therefore, the larger the data volume and the more concentrated the distributi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06F21/62
CPCG06Q10/06315G06Q10/0635G06F21/6245Y02P90/30
Inventor 张传开杨帅杜笑天
Owner 航天科工网络信息发展有限公司