CN113312649A - Message processing method, device, equipment, system and storage medium - Google Patents

Message processing method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN113312649A
CN113312649A CN202110698712.5A CN202110698712A CN113312649A CN 113312649 A CN113312649 A CN 113312649A CN 202110698712 A CN202110698712 A CN 202110698712A CN 113312649 A CN113312649 A CN 113312649A
Authority
CN
China
Prior art keywords
message file
message
client
server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110698712.5A
Other languages
Chinese (zh)
Inventor
林海杰
韩溧
俱青
焦洋
靖飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202110698712.5A priority Critical patent/CN113312649A/en
Publication of CN113312649A publication Critical patent/CN113312649A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a message processing method, a device, equipment, a system and a storage medium, wherein the method comprises the following steps: responding to a report instruction triggered by a user, generating a message file according to data to be reported, checking the legality of the message file, if the message file is legal, encrypting the message file, sending the encrypted message file to a client, after determining that the client receives the complete message file, sending a password to the client, enabling the client to decrypt the message file, then sending the message file to a monitoring system, deleting the message file after the report is finished, receiving a report result uploaded by the client, pushing the report result to the user, storing the message file, managing the report file more normally, deleting the message file in real time after the report is finished, and achieving automatic report and improving user experience.

Description

Message processing method, device, equipment, system and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, a system, and a storage medium for processing a packet.
Background
With the flourishing development of the financial industry, various supervisory data analysis systems are built for monitoring data requirements of business operation and the like of each financial institution by a supervisory institution. Financial institutions such as commercial banks have built corresponding message processing systems in order to implement reporting of financial-related data to supervisory data analysis systems.
In the existing message processing system, a message generated before reporting is data captured from a supervision service database, so that the generated message is exposed in a front-end processor, depends on manual operation and manual participation, lacks of verification on message validity, and has certain potential safety hazard.
Disclosure of Invention
Embodiments of the present invention provide a method, an apparatus, a device, a system, and a storage medium for processing a message, where message data management is more standard and security is higher.
In a first aspect, an embodiment of the present invention provides a packet processing method, which is applied to a server, where the server communicates with a client through an intranet, and the method includes:
responding to a reporting instruction triggered by a user, generating a message file according to data to be reported, and checking the legality of the message file;
if the message file is legal, encrypting the message file, and sending the encrypted message file to a client;
after the client side is determined to receive the complete message file, a password is issued to the client side, so that the client side decrypts the message file and then reports the message file to a monitoring system, and the message file is deleted after the report is finished;
and receiving a delivery result uploaded by the client, pushing the delivery result to a user, and storing the message file.
Optionally, the method further includes:
generating a corresponding first check code according to the encrypted message file;
correspondingly, after determining that the client receives the complete message file, the method for issuing the password to the client comprises the following steps:
acquiring a second check code generated by the client according to the encrypted message file after receiving the encrypted message file;
comparing the first check code with the second check code;
and if the first check code is matched with the second check code, determining that the client receives a complete message file, and issuing a password to the client.
Optionally, the delivery instruction is used to indicate the data to be delivered and/or the type of the client used for delivering the message file; responding to a reporting instruction triggered by a user, and generating a message file according to data to be reported, wherein the method comprises the following steps:
responding to a reporting instruction triggered by a user, and searching a corresponding message template in a template library according to the type of the data to be reported and/or the type of the client;
if the corresponding message template exists, loading the message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
Optionally, the method further includes:
if the corresponding message template does not exist in the template library, displaying a customization interface for customizing the corresponding message template;
acquiring customized information input by a user on the customized interface, generating a corresponding message template according to the customized information, adding the generated message template into a template library, and establishing an incidence relation between at least one of the type of the data to be reported and the type of the client and the generated message template;
and loading the generated message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
Optionally, the verifying the validity of the message file includes:
determining a corresponding message verification rule according to the type and the length of the data to be reported;
and checking the validity of the message file according to the message verification rule.
Optionally, receiving a delivery result uploaded by the client, pushing the delivery result to a user, and storing the message file includes:
receiving a delivery result uploaded by the client, and pushing the delivery result to a user;
if the delivery result is successful, determining a corresponding storage type according to the importance degree of the data to be delivered; wherein the storage type comprises at least one of: online storage, near-line storage and offline storage;
and saving the message file according to the storage type.
Optionally, the method further includes:
if the reporting result is that the data to be reported is wrong or the data to be reported is not real, checking the data to be reported and regenerating a message file for reporting
In a second aspect, an embodiment of the present invention provides a packet processing method, which is applied to a client, where the client communicates with a server through an intranet, and the method includes:
acquiring an encrypted message file sent by a server; the encrypted message file is obtained by the server side responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and encrypting the message file after verifying that the message file is legal;
acquiring a password issued by a server; the password is sent by the server after the server determines that the client receives a complete message file;
decrypting the message file, then submitting the message file to a supervision system, and deleting the message file after the submission is finished;
and uploading the reporting result to a server, so that the server pushes the reporting result to a user and stores the message file.
Optionally, the obtaining the password issued by the server includes:
after receiving the encrypted message file, generating a second check code corresponding to the encrypted message file;
sending the second check code to a server so that the server compares the second check code with a first check code generated by the server according to the encrypted message file;
and acquiring a password issued by the server when the first check code is matched with the second check code.
Optionally, the uploading the delivery result to a server, so that the server pushes the delivery result to a user and stores the message file, includes:
if the delivery result is successful, uploading the delivery result to a server side so that the server side determines a corresponding storage type according to the importance degree of the data to be delivered and stores the message file according to the storage type;
wherein the storage type comprises at least one of: online storage, near-line storage, and offline storage.
Optionally, the method further includes:
and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, uploading the reporting result to a server, so that the server checks the data to be reported and regenerates a message file for reporting.
In a third aspect, an embodiment of the present invention provides a packet processing apparatus, where the apparatus includes:
the verification module is used for responding to a reporting instruction triggered by a user, generating a message file according to data to be reported and verifying the legality of the message file;
the sending module is used for encrypting the message file when the message file is legal and sending the encrypted message file to the client;
the deleting module is used for sending a password to the client after the client is determined to receive the complete message file, so that the client decrypts the message file and then reports the message file to the monitoring system, and deletes the message file after the report is finished;
and the storage module is used for receiving the delivery result uploaded by the client, pushing the delivery result to a user and storing the message file.
In a fourth aspect, an embodiment of the present invention provides a packet processing apparatus, where the apparatus includes:
the first acquisition module is used for acquiring the encrypted message file sent by the server; the encrypted message file is obtained by the server side responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and encrypting the message file after verifying that the message file is legal;
the second acquisition module is used for acquiring the password issued by the server; the password is sent after the server side determines that the client side receives the complete message file;
the deleting module is used for decrypting the message file and then reporting the decrypted message file to the monitoring system, and deleting the message file after the reporting is finished;
and the storage module is used for uploading the submission result to the server so that the server pushes the submission result to the user and stores the message file.
In a fifth aspect, an embodiment of the present invention provides a service device, including:
a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored by the memory to cause the at least one processor to perform the message processing method of any of the first aspects above.
In a sixth aspect, an embodiment of the present invention provides a client device, including:
a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the message processing method of any of the second aspects above.
In a seventh aspect, an embodiment of the present invention provides a packet processing system, including: a server and a client; wherein the server is configured to perform the method according to any of the above first aspects, and the client is configured to perform the method according to any of the above second aspects.
In an eighth aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the message processing method according to any one of the first aspect and the second aspect.
In a ninth aspect, an embodiment of the present invention provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the message processing method according to any one of the first and second aspects is implemented.
The message processing method, the device, the equipment, the system and the storage medium provided by the embodiment of the invention respond to a report instruction triggered by a user, generate a message file according to data to be reported, check the legality of the message file, encrypt the message file if the message file is legal, send the encrypted message file to a client, send a password to the client after determining that the client receives the complete message file, ensure that the client decrypts the message file and sends the message file to a monitoring system, delete the message file after the report is finished, receive a report result uploaded by the client, push the report result to the user, store the message file, manage the report file more normatively, delete the message file in real time after the report is finished, have high safety and realize automatic report, the user experience is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a message processing system according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a principle of server message processing according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of a message processing method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a message customization interface according to an embodiment of the present invention;
fig. 6 is a schematic flowchart of another message processing method according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a message file archiving management according to an embodiment of the present invention;
fig. 8 is an interaction diagram of a message processing method according to an embodiment of the present invention;
fig. 9 is a schematic flowchart of another message processing method according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a message processing apparatus according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of another message processing apparatus according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a service device according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a client device according to an embodiment of the present invention.
With the above figures, certain embodiments of the invention have been illustrated and described in more detail below. The drawings and the description are not intended to limit the scope of the inventive concept in any way, but rather to illustrate it by those skilled in the art with reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The following describes the technical solution of the present invention and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
The following explains an application scenario provided by an embodiment of the present invention: the scheme provided by the embodiment of the invention relates to message processing. With the continuous improvement of data quality requirements of the supervision mechanism in various reporting works, the workload of message processing is correspondingly increased. When a message file is issued to a supervision organization, the data quality and the security need to be ensured while the type of the message file is correct.
Data reported by a typical regulatory reporting system to a regulatory body is typically on the GB or even TB level. And a large amount of manpower and material resources are consumed for processing and reporting the big data. And the supervision reporting related data is generally sensitive data of financial enterprise business operation and payment settlement, if information leakage exists, the image of the financial enterprise can be seriously influenced, and the supervision institution has higher requirement on the quality of the reporting data of the financial institution.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present invention. As shown in fig. 1, the front-end processor generates a message file of the data to be reported according to the user instruction, and directly sends the message file to the monitoring system for the monitoring system to review.
In some technologies, a message is generated at a front-end, the generated message file is stored in a plaintext, the message format is small, message adaptability is poor, customized message generation cannot be achieved, manual delivery is relied on when delivery is implemented, and the delivery automation degree is low. Most of the current supervision and delivery systems lack unified management on message files, and the files are lost due to system downtime and cannot be recovered.
In other technologies, a database queue mode is utilized, a data processing mode is transmitted through a message queue service, different data are processed through a reporting processing module, and finally the different data are reported to an external debit port adaptation module. According to the method, the external interface adaptation module does not provide a new submission mechanism and a new customized message format inlet for a user, the front-end processor cannot delete the submission file in time after the submission is finished, and the safety is low.
Therefore, the embodiment of the invention provides a message processing method, which responds to a message sending instruction of a user, generates a message at a server, sends an encrypted file to a client after the generated message is subjected to validity verification, sends a password to decode and automatically report by the server after the client receives a complete file, deletes the message file in time after the report is finished, and pushes a report result to the user, so that the automation degree is high, the message file is deleted in time after the report is finished, and the safety is high.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The features of the embodiments and examples described below may be combined with each other without conflict between the embodiments.
Fig. 2 is a schematic structural diagram of a message processing system according to an embodiment of the present invention. As shown in fig. 2, the financial institution includes a delivery server and a delivery client, which are connected via an intranet to implement communication so as to complete the delivery document and delivery information transmission. The reporting client is connected with the supervision data analysis system and reports the message file to the supervision data analysis system.
The message sending server comprises a message management module, a message issuing module and a message tracking module. The message tracking module is used for tracking a message receipt and sending the receipt to a user.
The delivery client comprises a client monitoring module. The client monitoring module is used for checking the message file issued by the server, reporting the message file to the monitoring data analysis system, deleting the message file after the report is finished, and transmitting the report result to the server.
The delivery status may be a transmission status of the message file during delivery between the delivery server and the delivery client, for example, generating a message, issuing a message, and the like.
Fig. 3 is a schematic diagram illustrating a principle of server message processing according to an embodiment of the present invention. As shown in fig. 3, the message management module is used for managing a template library, a customized message module, a message loading module, a template file, and a message format check module.
The template library is used for storing various message templates. And the message customizing module is used for re-customizing a new message template when the message template in the template library can not meet the user requirement, and storing the newly customized message template in the template library. And the loading message template is used for loading the data to be reported into the message template and generating a message file. The message template may be an XML message or JSON message. The message format checking module can be used for checking whether the generated message is legal or not.
Fig. 4 is a flowchart illustrating a message processing method according to an embodiment of the present invention. As shown in fig. 4, the method in this embodiment may be applied to a server, where the server communicates with a client through an intranet, and the method includes:
step 401, responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and checking the validity of the message file.
The server may also be called a delivery server, and the client may also be called a delivery client. The safety performance of the file at the server side and the client side can be ensured through intranet communication, and the file is not easy to be attacked by network hackers.
The report server is constructed for meeting the report automation process and has the functions of managing messages, issuing messages, checking messages, providing automatic report operation for users and the like. The submission file generally refers to a data protocol for communicating with the supervisory data analysis system, and is usually an XML (Extensible markup language) message or JSON (JavaScript Object Notation) message. Among them, XML is a markup language for marking electronic documents to have a structure, and is generally used for data exchange between two parties of communication. JSON is a lightweight data exchange format, and is generally used for data exchange between two communication parties.
The server can be an office computer connected with an intranet. The report client may also be called a report front-end processor, and hardware special equipment built for transmitting report messages to a supervision data analysis system can generally meet the requirements of network security and the like.
The user can trigger the delivery instruction according to the delivery data which is uploaded as required. Wherein the data to be submitted may be deposit data, loan data, institution data, settlement and sales data, and the like.
Specifically, the server responds to a deposit data reporting instruction triggered by the user, generates a corresponding message file according to the deposit data, and checks whether the message file is legal, if so, the step 402 is continuously executed, if not, the server pops up a dialog box to display a message content illegal message, and the user can check the data to be reported and regenerate the reporting file according to the prompt information.
Step 402, if the message file is legal, encrypting the message file, and sending the encrypted message file to the client.
The server can select different encryption processing modes according to the formed message format. For example, when the formed message is an XML message, an encryption processing mode suitable for the XML message is selected; and when the formed message is a JSON message, selecting an encryption processing mode suitable for the JSON message.
Optionally, when the message file is legal, the message file is encrypted according to the format of the message file, a password used in the encryption is stored, and the encrypted file is transmitted to the client.
Step 403, after determining that the client receives the complete message file, sending a password to the client, so that the client decrypts the message file and then reports the decrypted message file to the monitoring system, and deletes the message file after the report is completed.
The monitoring system may also be called a monitoring data analysis system, and is established by a monitoring department for monitoring data such as financial enterprise business operation, payment settlement and the like.
Optionally, the client receives the complete message file and reports the complete message file to the server. And after the client receives the complete message file information, the server transmits the stored password to the client, the client decrypts the message file according to the password, transmits the decrypted message file to the supervision system, and deletes the decoded message file after the report is finished.
Wherein, the completion of the submission may mean that the client transmits the decrypted message file to the monitoring system.
Step 404, receiving the delivery result uploaded by the client, pushing the delivery result to a user, and storing the message file.
Optionally, after transmitting the decrypted message file to the monitoring system, the client transmits the reporting result to the server, and the server displays corresponding information and pushes the information to the user, and stores the transmitted message file. Wherein, the user can judge whether the delivery is successful according to the delivery result.
In practical application, inside a financial institution, a server and a client can realize communication through an intranet, the server cannot directly communicate with a monitoring system or other systems, a message file to be reported is generated by the server and sent to the client, the message file is deleted immediately after the report of the client is finished, the message file is reserved by the server, other devices except the client cannot directly communicate with the server and acquire the message file, and the system safety can be effectively improved on the basis of guaranteeing the normal report of the message.
The message processing method provided by this embodiment generates a message file according to data to be reported in response to a reporting instruction triggered by a user, verifies the validity of the message file, encrypts the message file if the message file is valid, sends the encrypted message file to a client, and sends a password to the client after determining that the client receives the complete message file, so that the client decrypts the message file and sends the message file to a monitoring system, deletes the message file after the reporting is completed, receives a reporting result uploaded by the client, pushes the reporting result to the user, stores the message file, manages the reporting file more regularly, deletes the message file in real time after the reporting is completed, has high security, realizes automatic reporting, and improves user experience.
On the basis of the technical solution provided by the above embodiment, optionally, the method further includes:
generating a corresponding first check code according to the encrypted message file;
correspondingly, after determining that the client receives the complete message file, the method for issuing the password to the client comprises the following steps:
acquiring a second check code generated by the client according to the encrypted message file after receiving the encrypted message file;
comparing the first check code with the second check code;
and if the first check code is matched with the second check code, determining that the client receives a complete message file, and issuing a password to the client.
The generated check code may be an MD5 code.
Optionally, the server generates the first MD5 code according to the encrypted message file. After receiving the encrypted message file, the client generates a second MD5 code according to the encrypted file, transmits a second MD5 code to the server for verification, compares whether the first MD5 code and the second MD5 code are matched and consistent, if the two MD5 codes are consistent, the message file received by the client is complete, and the server issues the stored message file password to the client. If the two MD5 codes are not consistent, the message file received by the client is not complete, the server regenerates the message file encryption and sends the message file encryption to the client, compares whether the two generated MD5 codes are matched and consistent again until the two MD5 codes are consistent, and transmits the encryption password of the message file to the client.
By comparing the message file generated by the server with the check code generated by the message file transmitted to the client, the integrity of the message file transmitted to the client each time can be monitored, and the accuracy of the message file transmitted from the client to the monitoring system is improved.
Optionally, the delivery instruction is used to indicate the data to be delivered and/or the type of the client used for delivering the message file; responding to a reporting instruction triggered by a user, and generating a message file according to data to be reported, wherein the method comprises the following steps:
responding to a reporting instruction triggered by a user, and searching a corresponding message template in a template library according to the type of the data to be reported and/or the type of the client;
if the corresponding message template exists, loading the message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
The delivery instruction may include the data to be delivered or the type of the client to which the message file is delivered. The data to be submitted may be the deposit amount, loan amount, or institution employee information, etc. The type of the client reporting the message file may be a computer device, a tablet device, a POS device, or the like, or the type of the client may be distinguished according to an operating system of the client.
The template library stores a plurality of types of message templates, and a plurality of types of XML/JSON messages are packaged into the message templates.
When the user does not set a specific delivery type, a proper message type can be selected according to data to be delivered, for example, when the message data is data information, an XML message can be preferentially selected; when the message data is bank information, the JSON message can be preferably selected. When the user designates a specific message type, the corresponding message type can be selected according to the instruction of the user.
Optionally, when the user triggers a submission instruction, the submission instruction may be to generate an XML message for submission of the loan amount data, the server searches a corresponding message template in the template library, and if the message template exists, loads a template file in the message template by using a reflection mechanism, loads the loan amount data into the message template, and generates an XML message file of the loan amount data.
And at the message management module of the server, generating a corresponding message file according to the report data and/or the type of the client used for reporting the message file, loading a corresponding message format by adopting a reflection mechanism, and packaging the multiple classes of XML/JSON messages into a message template, so that the coupling between the message templates is reduced. And different message templates are adopted based on different data and different client types, so that the method can adapt to the requirements of different data and different client types, improve the success rate of automatic reporting, and meet the application requirements under different scenes.
Optionally, the method further includes: if the corresponding message template does not exist in the template library, displaying a customization interface for customizing the corresponding message template;
acquiring customized information input by a user on the customized interface, generating a corresponding message template according to the customized information, adding the generated message template into a template library, and establishing an incidence relation between at least one of the type of the data to be reported and the type of the client and the generated message template;
and loading the generated message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
The message management module can support the customized development of user messages and the customization of any XML messages and JSON messages. The customized information may include information such as request message and message type.
Fig. 5 is a schematic diagram of a message customization interface according to an embodiment of the present invention. As shown in fig. 5, a message to be transmitted is transmitted in at a request message in the customized interface, and a message type is selected and generated, where the message type may be of multiple types, such as XML, JSON, or other message types.
When the message template appointed by the user does not exist in the template library, the message customized development can be selected, a customized interface for customizing the corresponding message template is displayed on a page, and the user selects a proper message type according to the requirement to generate a new message type. And adding the generated new message template into a template library and associating with at least one of the data to be reported or the type of the client. When a certain data to be submitted is selected, the corresponding message type can be determined according to the type of the data to be submitted or the message template related to the type of the client.
In one example, the class a delivery data corresponds to the message template 1, and when the delivery data is the class a data, the message template 1 is found from the template library to generate a corresponding message file.
In another example, the class B client corresponds to the message template 2, and when the data to be reported is class B data, the message template 2 is found from the template library to generate a corresponding message file.
In another example, the corresponding template file may be determined jointly according to the client type and the to-be-posted data type.
And loading a template file corresponding to the generated message template by using a reflection mechanism, and loading the data to be reported into the message template to generate the message file.
When the template library does not have the file to be reported, the user-defined XML/JSON message is supported, and the generated template is stored in the template library, so that the template library is convenient to use next time and has high universality.
Optionally, the verifying the validity of the message file includes:
determining a corresponding message verification rule according to the type and the length of the data to be reported; and checking the validity of the message file according to the message verification rule.
The XML/JSON checker in the management module can be used for checking whether the message is legal or not.
Optionally, the corresponding message validation rules are determined according to the type and length of the data to be reported, when the type of the data to be reported is an XML message and the length is longer, the validation rules of parity check can be selected for validation, and when the type of the data to be reported is an XML message and the length is shorter, the validation can be selected in sequence. Different message verification rules can be selected for different data to be reported.
The message file may be generated according to a certain rule, for example, the data is added to the message file after being sorted in a certain order. After the message file is generated, the validity of the message file can be verified, that is, whether the generated message meets a specific rule or not is judged.
Different types of data to be reported can correspond to different rules, for example, a sorting mode corresponding to various types of data can be designed according to actual needs, and a message file is generated according to the corresponding sorting mode. When the validity is verified, if the message file does not conform to the data sorting mode, the message file is considered to be illegal. Different processing modes can be designed for different types of data by corresponding different rules to different types of data to be reported, and the requirement of data interaction is met.
In addition, different data lengths may also correspond to different rules, for example, after the data length exceeds a certain length threshold, a message file may be generated in a compressed manner, and when the data length does not exceed the length threshold, the message file may be generated in a normal manner, and when performing validity verification, it may be correspondingly verified whether the generated message satisfies a corresponding generation manner, for example, the generated message file needs to have a corresponding flag indicating the generation manner, so as to satisfy the processing requirements of the data with different lengths.
When the message verification rule corresponding to the data to be submitted meets the preset message verification rule, the message file is specific legal, when the message verification rule corresponding to the data to be submitted does not meet the preset message verification rule, the message file is not legal, and a server page can pop up a dialog box of 'file illegal' to remind a user to check the submitted data and regenerate the submitted file.
Different message verification rules are selected to verify the message file according to different data to be reported, so that the flexibility of message file verification can be improved, and the validity of the message file can be quickly verified.
Fig. 6 is a flowchart illustrating another message processing method according to an embodiment of the present invention. As shown in fig. 6, the method includes:
step 601, responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and checking the validity of the message file.
Step 602, if the message file is legal, encrypting the message file, and sending the encrypted message file to the client.
Step 603, after determining that the client receives the complete message file, sending a password to the client, so that the client decrypts the message file and then reports the decrypted message file to a monitoring system, and deleting the message file after the report is completed.
The specific implementation principle and effect of the method in this embodiment can be referred to in steps 401 and 403 in the foregoing embodiment, which are not described herein again.
And step 604, receiving the delivery result uploaded by the client, and pushing the delivery result to a user.
Optionally, after the client sends the submission file to the monitoring system, the information fed back by the monitoring system is uploaded to the server in the form of a submission result, and the server displays the submission result to the user in the form of a pop-up dialog box.
605, if the delivery result is successful, determining a corresponding storage type according to the importance degree of the data to be delivered; wherein the storage type comprises at least one of: online storage, near-line storage, and offline storage.
The online storage can store the message files for 3 years, the near-line storage can store the message files for 3-10 years, and the offline storage can store the message files for more than 10 years.
Optionally, when the delivery result is successful, the data to be delivered is stored according to the importance degree of the data to be delivered. The importance level may be determined according to the type of the data to be reported, or may be input by the user.
Optionally, when the data to be reported is a data file recently viewed by related people, the data file is regarded as a relatively important file, and the storage type is online storage. The online storage mode needs higher cost in storage, and the distortion problem can not occur when the file is restored. When the data to be reported may have data files viewed by related personnel, the data files are regarded as less important files, and the storage mode is near-line storage. The near-line storage method requires low cost in storage, and may have a certain degree of distortion in restoring a file. When the data to be reported does not have a data file which is checked by related personnel recently, the data is regarded as an unimportant file, and the storage mode is offline storage. The offline storage mode requires a lower cost in storage, and may have a larger degree of distortion in restoring the file.
And 606, storing the message file according to the storage type.
In this embodiment, the receiving of the delivery result uploaded by the client, the pushing of the delivery result to the user, and the storing of the message file can be realized through steps 604 to 606.
Optionally, the message file is archived and managed according to the storage type of the data to be reported. When the data to be reported is stored online, performing online message management on the message file, wherein the retention time is also within 3 years; when the data to be reported is stored in a near-line mode, performing near-line message management on the message file, wherein the retention time is 3-10 years; when the data to be reported is stored off-line, the off-line message management is carried out on the message file, and the retention time is over 10 years.
When the storage time of the online message reaches 3 years, entering a near-line message management time period, and changing the online storage of the message into near-line storage; when the storage time of the message on the near line reaches 10 years, the offline message management time period can be entered, and the message is changed from the near line storage to the offline storage.
The message files which are successfully sent are managed online, online and offline, historical report data messages can be stored to the maximum extent, the message files are stored in persistent resources of the server side, and message data management is more standard.
Fig. 7 is a schematic diagram of a message file archiving management according to an embodiment of the present invention. As shown in fig. 7, the message tracking module transmits the message transmission result to the server, and the server performs archive management on the message file. The server file storage area is divided into online messages (message files within 3 years), near-line messages (message files within 3-10 years) and offline messages (message files greater than 10 years).
Optionally, the method further includes: and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, checking the data to be reported and regenerating a message file for reporting.
In the embodiment of the present invention, the data error may refer to an error in the reported data transmitted to the monitoring system, for example, if a certain data is obtained by adding another two data, but is smaller than the two added data, the reported data error may be displayed; the unreal data may mean that the reported data transmitted to the monitoring system is obviously wrong and exceeds a specified range, for example, if a certain value ranges from 0% to 100%, and is displayed as 150% in the data, the reported data is not authentic.
When the delivery result is that the data to be delivered is wrong, the server can pop up a dialog box to display the xx data delivery mistake so as to remind the user to perform corresponding check on the data to be delivered and regenerate the delivery file for transmission. Or the server can automatically check and update the data to be reported according to the error of the data to be reported in the reporting result and report again.
And when the delivery result is that the data to be delivered is not real, the server can pop up a dialog box to display that the xx data is not real for delivery so as to remind the user to perform corresponding check on the data to be delivered and regenerate the delivery file for transmission. Or the server side can automatically check and update the data to be submitted according to the fact that the data to be submitted in the submitting result is not real, and then the data to be submitted is submitted again.
Optionally, when the delivery result is other information which is not successfully delivered, the server cannot automatically identify and pop up a corresponding dialog box for the user to analyze and make a decision.
The server receives the unsuccessful reporting result, and can readjust the data to be reported, avoid the situation that the data is not managed for a long time, find the data problem in time and feed back the reported data.
Fig. 8 is an interaction diagram of a message processing method according to an embodiment of the present invention. As shown in fig. 8, after a user initiates a delivery action, a delivery server starts to generate a message and checks the validity of the message, if the message is legal, an encrypted message is issued, a delivery client receives the message and starts to check the integrity of the message, if the message is complete, a decryption password is issued, after the client receives the decryption password, a file is decrypted and delivered, after the delivery is finished, the delivery client clears the message file and the temporary file, monitors the delivery receipt result, and once the receipt arrives, the receipt is uploaded to the server, which processes the receipt and makes a decision for the user.
Fig. 9 is a flowchart illustrating a further message processing method according to an embodiment of the present invention. As shown in fig. 9, the method is applied to a client, where the client communicates with a server through an intranet, and includes:
step 901, acquiring an encrypted message file sent by a server; the encrypted message file is obtained by the server side responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and encrypting the message file after verifying that the message file is legal.
Step 902, acquiring a password issued by a server; and the password is sent by the server after the server determines that the client receives the complete message file.
And step 903, decrypting the message file, reporting to a monitoring system, and deleting the message file after the report is finished.
Step 904, uploading the submission result to a server, so that the server pushes the submission result to a user and stores the message file.
Optionally, the obtaining the password issued by the server includes:
after receiving the encrypted message file, generating a second check code corresponding to the encrypted message file;
sending the second check code to a server so that the server compares the second check code with a first check code generated by the server according to the encrypted message file;
and acquiring a password issued by the server when the first check code is matched with the second check code.
Optionally, the uploading the delivery result to a server, so that the server pushes the delivery result to a user and stores the message file, includes:
if the delivery result is successful, uploading the delivery result to a server side so that the server side determines a corresponding storage type according to the importance degree of the data to be delivered and stores the message file according to the storage type;
wherein the storage type comprises at least one of: online storage, near-line storage, and offline storage.
Optionally, the method further includes:
and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, uploading the reporting result to a server, so that the server checks the data to be reported and regenerates a message file for reporting.
The specific implementation principle and effect of the method in this embodiment can be found in the foregoing embodiments, and are not described herein again.
Optionally, the method provided in this embodiment may be implemented based on each module shown in fig. 2, or may have other module division manners, which is not limited in this embodiment of the present invention.
Fig. 10 is a schematic structural diagram of a message processing apparatus according to an embodiment of the present invention. The device in this embodiment may be applied to a server, and the server may communicate with a client through an intranet. As shown in fig. 10, the message processing apparatus provided in this embodiment may include:
the verification module 1001 is configured to generate a message file according to data to be submitted in response to a submission instruction triggered by a user, and verify the validity of the message file;
a sending module 1002, configured to encrypt the message file when the message file is legal, and send the encrypted message file to the client;
a deleting module 1003, configured to, after determining that the client receives a complete message file, issue a password to the client, so that the client decrypts the message file and reports the decrypted message file to a monitoring system, and deletes the message file after reporting is completed;
the storage module 1004 is configured to receive a delivery result uploaded by the client, push the delivery result to a user, and store the message file.
Optionally, the sending module 1002 is further configured to:
generating a corresponding first check code according to the encrypted message file;
correspondingly, when the deleting module 1003 determines that the client receives the complete message file and then issues a password to the client, the deleting module is specifically configured to:
acquiring a second check code generated by the client according to the encrypted message file after receiving the encrypted message file;
comparing the first check code with the second check code;
and if the first check code is matched with the second check code, determining that the client receives a complete message file, and issuing a password to the client.
Optionally, the delivery instruction is used to indicate the data to be delivered and/or the type of the client used for delivering the message file; when the verification module 1001 responds to a delivery instruction triggered by a user and generates a message file according to data to be delivered, the verification module is specifically configured to:
responding to a reporting instruction triggered by a user, and searching a corresponding message template in a template library according to the type of the data to be reported and/or the type of the client;
if the corresponding message template exists, loading the message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
Optionally, the verification module 1001 is further configured to: if the corresponding message template does not exist in the template library, displaying a customization interface for customizing the corresponding message template;
acquiring customized information input by a user on the customized interface, generating a corresponding message template according to the customized information, adding the generated message template into a template library, and establishing an incidence relation between at least one of the type of the data to be reported and the type of the client and the generated message template;
and loading the generated message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
Optionally, when verifying the validity of the message file, the verifying module 1001 is specifically configured to:
determining a corresponding message verification rule according to the type and the length of the data to be reported;
and checking the validity of the message file according to the message verification rule.
Optionally, the storage module 1004 is specifically configured to:
receiving a delivery result uploaded by the client, and pushing the delivery result to a user;
if the delivery result is successful, determining a corresponding storage type according to the importance degree of the data to be delivered; wherein the storage type comprises at least one of: online storage, near-line storage and offline storage;
and saving the message file according to the storage type.
Optionally, the storage module 1004 is further configured to: and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, checking the data to be reported and regenerating a message file for reporting.
The apparatus provided in this embodiment may implement the technical solutions of the method embodiments shown in fig. 1 to fig. 8, and the implementation principles and technical effects are similar, which are not described herein again.
Fig. 11 is a schematic structural diagram of another message processing apparatus according to an embodiment of the present invention. The device in this embodiment may be applied to a client, and the client may communicate with a server through an intranet. As shown in fig. 11, the message processing apparatus provided in this embodiment may include:
a first obtaining module 1101, configured to obtain an encrypted message file sent by a server; the encrypted message file is obtained by the server side responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and encrypting the message file after verifying that the message file is legal;
a second obtaining module 1102, configured to obtain a password issued by a server; the password is sent after the server side determines that the client side receives the complete message file;
a deleting module 1103, configured to decrypt the message file and send the decrypted message file to the monitoring system, and delete the message file after the sending is completed;
the storage module 1104 is configured to upload the delivery result to the server, so that the server pushes the delivery result to the user and stores the message file.
Optionally, the second obtaining module 1102 is specifically configured to:
after receiving the encrypted message file, generating a second check code corresponding to the encrypted message file;
sending the second check code to a server so that the server compares the second check code with a first check code generated by the server according to the encrypted message file;
and acquiring a password issued by the server when the first check code is matched with the second check code.
Optionally, the storage module 1104 is specifically configured to:
if the delivery result is successful, uploading the delivery result to a server side so that the server side determines a corresponding storage type according to the importance degree of the data to be delivered and stores the message file according to the storage type;
wherein the storage type comprises at least one of: online storage, near-line storage, and offline storage.
Optionally, the storage module 1104 is further configured to:
and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, uploading the reporting result to a server, so that the server checks the data to be reported and regenerates a message file for reporting. The apparatus provided in this embodiment may implement the technical solution of the method embodiment shown in fig. 9, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 12 is a schematic structural diagram of a service device according to an embodiment of the present invention. As shown in fig. 12, the apparatus provided in this embodiment may include: a memory 122 and at least one processor 121;
the memory 122 stores computer-executable instructions;
the at least one processor 121 executes the computer-executable instructions stored by the memory 122 to cause the at least one processor 121 to perform the method of any of the embodiments described above.
Wherein the memory 122 and the processor 121 may be connected by a bus 123.
For specific implementation principles and effects of the device provided in this embodiment, reference may be made to relevant descriptions and effects corresponding to the embodiments shown in fig. 1 to fig. 9, which are not described herein in detail.
Fig. 13 is a schematic structural diagram of a client device according to an embodiment of the present invention. As shown in fig. 13, the apparatus provided in this embodiment may include: a memory 132 and at least one processor 131;
the memory 132 stores computer-executable instructions;
the at least one processor 131 executes computer-executable instructions stored by the memory 132 to cause the at least one processor 131 to perform the method of any of the embodiments described above.
Wherein the memory 132 and the processor 131 may be connected by a bus 133.
For specific implementation principles and effects of the device provided in this embodiment, reference may be made to relevant descriptions and effects corresponding to the embodiments shown in fig. 1 to fig. 9, which are not described herein in detail.
An embodiment of the present invention further provides a message processing system, including: a server and a client; the server is configured to execute the method according to any embodiment of the present invention, and the client is configured to execute the method according to any embodiment of the present invention.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the message processing method provided by any embodiment of the invention is realized.
The embodiment of the present invention further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the message processing method according to any embodiment of the present invention is implemented.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to implement the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one unit. The unit formed by the modules can be realized in a hardware form, and can also be realized in a form of hardware and a software functional unit.
The integrated module implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a processor to execute some steps of the methods according to the embodiments of the present invention.
It should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise a high-speed RAM memory, and may further comprise a non-volatile storage NVM, such as at least one disk memory, and may also be a usb disk, a removable hard disk, a read-only memory, a magnetic or optical disk, etc.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present invention are not limited to only one bus or one type of bus.
The storage medium may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the storage medium may reside as discrete components in an electronic device or host device.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (18)

1. A message processing method is characterized in that the method is applied to a server side, the server side and a client side communicate through an intranet, and the method comprises the following steps:
responding to a reporting instruction triggered by a user, generating a message file according to data to be reported, and checking the legality of the message file;
if the message file is legal, encrypting the message file, and sending the encrypted message file to a client;
after the client side is determined to receive the complete message file, a password is issued to the client side, so that the client side decrypts the message file and then reports the message file to a monitoring system, and the message file is deleted after the report is finished;
and receiving a delivery result uploaded by the client, pushing the delivery result to a user, and storing the message file.
2. The method of claim 1, further comprising:
generating a corresponding first check code according to the encrypted message file;
correspondingly, after determining that the client receives the complete message file, the method for issuing the password to the client comprises the following steps:
acquiring a second check code generated by the client according to the encrypted message file after receiving the encrypted message file;
comparing the first check code with the second check code;
and if the first check code is matched with the second check code, determining that the client receives a complete message file, and issuing a password to the client.
3. The method of claim 1, wherein the posting instruction is used to indicate the type of data to be posted and/or the client used to post the message file; responding to a reporting instruction triggered by a user, and generating a message file according to data to be reported, wherein the method comprises the following steps:
responding to a reporting instruction triggered by a user, and searching a corresponding message template in a template library according to the type of the data to be reported and/or the type of the client;
if the corresponding message template exists, loading the message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
4. The method of claim 3, further comprising:
if the corresponding message template does not exist in the template library, displaying a customization interface for customizing the corresponding message template;
acquiring customized information input by a user on the customized interface, generating a corresponding message template according to the customized information, adding the generated message template into a template library, and establishing an incidence relation between at least one of the type of the data to be reported and the type of the client and the generated message template;
and loading the generated message template by using a reflection mechanism, and loading the data to be reported into the message template to generate a message file.
5. The method of claim 1, wherein verifying the validity of the message file comprises:
determining a corresponding message verification rule according to the type and the length of the data to be reported;
and checking the validity of the message file according to the message verification rule.
6. The method according to any one of claims 1 to 5, wherein receiving the delivery result uploaded by the client, pushing the delivery result to a user, and storing the message file comprises:
receiving a delivery result uploaded by the client, and pushing the delivery result to a user;
if the delivery result is successful, determining a corresponding storage type according to the importance degree of the data to be delivered; wherein the storage type comprises at least one of: online storage, near-line storage and offline storage;
and saving the message file according to the storage type.
7. The method of claim 6, further comprising:
and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, checking the data to be reported and regenerating a message file for reporting.
8. A message processing method is characterized in that the method is applied to a client side, the client side and a server side communicate through an intranet, and the method comprises the following steps:
acquiring an encrypted message file sent by a server; the encrypted message file is obtained by the server side responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and encrypting the message file after verifying that the message file is legal;
acquiring a password issued by a server; the password is sent by the server after the server determines that the client receives a complete message file;
decrypting the message file, then submitting the message file to a supervision system, and deleting the message file after the submission is finished;
and uploading the reporting result to a server, so that the server pushes the reporting result to a user and stores the message file.
9. The method of claim 8, wherein obtaining the password issued by the server comprises:
after receiving the encrypted message file, generating a second check code corresponding to the encrypted message file;
sending the second check code to a server so that the server compares the second check code with a first check code generated by the server according to the encrypted message file;
and acquiring a password issued by the server when the first check code is matched with the second check code.
10. The method according to claim 8 or 9, wherein uploading the submission result to a server, so that the server pushes the submission result to a user and stores the message file, comprises:
if the delivery result is successful, uploading the delivery result to a server side so that the server side determines a corresponding storage type according to the importance degree of the data to be delivered and stores the message file according to the storage type;
wherein the storage type comprises at least one of: online storage, near-line storage, and offline storage.
11. The method of claim 10, further comprising:
and if the reporting result is that the data to be reported is wrong or the data to be reported is not real, uploading the reporting result to a server, so that the server checks the data to be reported and regenerates a message file for reporting.
12. A message processing apparatus, the apparatus comprising:
the verification module is used for responding to a reporting instruction triggered by a user, generating a message file according to data to be reported and verifying the legality of the message file;
the sending module is used for encrypting the message file when the message file is legal and sending the encrypted message file to the client;
the deleting module is used for sending a password to the client after the client is determined to receive the complete message file, so that the client decrypts the message file and then reports the message file to the monitoring system, and deletes the message file after the report is finished;
and the storage module is used for receiving the delivery result uploaded by the client, pushing the delivery result to a user and storing the message file.
13. A message processing apparatus, the apparatus comprising:
the first acquisition module is used for acquiring the encrypted message file sent by the server; the encrypted message file is obtained by the server side responding to a delivery instruction triggered by a user, generating a message file according to data to be delivered, and encrypting the message file after verifying that the message file is legal;
the second acquisition module is used for acquiring the password issued by the server; the password is sent after the server side determines that the client side receives the complete message file;
the deleting module is used for decrypting the message file and then reporting the decrypted message file to the monitoring system, and deleting the message file after the reporting is finished;
and the storage module is used for uploading the submission result to the server so that the server pushes the submission result to the user and stores the message file.
14. A service device, comprising: a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the message processing method of any of claims 1-7.
15. A client device, comprising: a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the message processing method of any of claims 8-11.
16. A message processing system, comprising: a server and a client; wherein the server is configured to perform the method of any of claims 1-7 and the client is configured to perform the method of any of claims 8-11.
17. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, implement the message processing method of any of claims 1-11.
18. A computer program product comprising a computer program, characterized in that the computer program realizes the message handling method of any of claims 1-11 when executed by a processor.
CN202110698712.5A 2021-06-23 2021-06-23 Message processing method, device, equipment, system and storage medium Pending CN113312649A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110698712.5A CN113312649A (en) 2021-06-23 2021-06-23 Message processing method, device, equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110698712.5A CN113312649A (en) 2021-06-23 2021-06-23 Message processing method, device, equipment, system and storage medium

Publications (1)

Publication Number Publication Date
CN113312649A true CN113312649A (en) 2021-08-27

Family

ID=77380166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110698712.5A Pending CN113312649A (en) 2021-06-23 2021-06-23 Message processing method, device, equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN113312649A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114022031A (en) * 2021-11-23 2022-02-08 中国工商银行股份有限公司 Data processing method, data processing apparatus, electronic device, medium, and computer program product
CN115190189A (en) * 2022-07-08 2022-10-14 中国银行股份有限公司 Message information processing method and device
CN115718555A (en) * 2022-11-16 2023-02-28 河南翔宇医疗设备股份有限公司 Control method of man-machine interaction and related assembly

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114022031A (en) * 2021-11-23 2022-02-08 中国工商银行股份有限公司 Data processing method, data processing apparatus, electronic device, medium, and computer program product
CN115190189A (en) * 2022-07-08 2022-10-14 中国银行股份有限公司 Message information processing method and device
CN115718555A (en) * 2022-11-16 2023-02-28 河南翔宇医疗设备股份有限公司 Control method of man-machine interaction and related assembly

Similar Documents

Publication Publication Date Title
US11429959B2 (en) Multi-approval system using M of N keys to generate a transaction address
CN113312649A (en) Message processing method, device, equipment, system and storage medium
CN106161629B (en) Business object synchronization method, client and server
CN111429191A (en) Block chain-based electronic invoice flow management method, device and system
CN110599140B (en) Digital currency verification method and system
CN115841370A (en) Electronic bidding insurance letter full-flow public service system
CN115658604A (en) Information acquisition management system and method
CN111209542B (en) Authority management method and device, storage medium and electronic equipment
US20150206143A1 (en) Line item processing in a multi-layer transaction tracking system
WO2023197917A1 (en) Payment security management method and apparatus and payment system
CN112598502A (en) Evidence obtaining method, device, equipment and storage medium
CN112256799A (en) Data processing method and device based on block chain, server and storage medium
CN116346362A (en) Electronic fidelity verification method and system based on blockchain technology
CN115619552A (en) Asynchronous processing method and device of transaction bill, electronic equipment and medium
WO2021121030A1 (en) Resource transfer method, settlement terminal, and server node
CN114066451A (en) Method and system for managing fund transaction and electronic equipment
CN115280740A (en) Techniques for providing streaming data resiliency using a distributed message queue system
CN110912987B (en) Information processing method and related equipment
US20240154800A1 (en) Token recovery
CN116883150B (en) Quick identification and safety response method for gold-eliminating wind control information
CN112712365B (en) Processing method and device for digital certificate
CN115760338A (en) File message processing method and device of bank-enterprise docking system and storage medium
US20150206142A1 (en) Batch processing in a multi-layer transaction tracking system
CN115002184A (en) Processing method, processing equipment and system for prefix number data
CN115496583A (en) Asynchronous accounting data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination