CN116319763B - File uploading method and device based on WASM technology - Google Patents

File uploading method and device based on WASM technology Download PDF

Info

Publication number
CN116319763B
CN116319763B CN202310565725.4A CN202310565725A CN116319763B CN 116319763 B CN116319763 B CN 116319763B CN 202310565725 A CN202310565725 A CN 202310565725A CN 116319763 B CN116319763 B CN 116319763B
Authority
CN
China
Prior art keywords
wasm
file
module
uploading
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310565725.4A
Other languages
Chinese (zh)
Other versions
CN116319763A (en
Inventor
叶伟强
李昌志
朱文雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chaitin Tech Co ltd
Original Assignee
Beijing Chaitin Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chaitin Tech Co ltd filed Critical Beijing Chaitin Tech Co ltd
Priority to CN202310565725.4A priority Critical patent/CN116319763B/en
Publication of CN116319763A publication Critical patent/CN116319763A/en
Application granted granted Critical
Publication of CN116319763B publication Critical patent/CN116319763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a file uploading method and a device based on WASM technology, which belong to the technical field of file processing and are applied to a user side, wherein the user side is in communication connection with a server, the user side is configured with a first WASM module, and the first WASM module is compiled by an analysis module in the server, and the method comprises the following steps: receiving an uploading request of a user for a target file; responding to an uploading request, and acquiring meta information of a target file through a first WASM module; receiving a confirmation operation of a user on meta information of the target file; and uploading the target file in response to the confirmation operation. When a user uploads a file, the wasm is utilized to analyze the meta-information of the file at the client, the participation of a server is not needed, the unnecessary network transmission is avoided, meanwhile, the wasm is utilized to realize the file decryption operation at the client, the repeated writing of codes is not needed, and the engineering efficiency is improved.

Description

File uploading method and device based on WASM technology
Technical Field
The application belongs to the technical field of file processing, and particularly relates to a method and a device for uploading files based on a WASM technology.
Background
In a typical B/S (Browser/Server) application, there is a large file upload demand.
Referring to fig. 1, a flow chart of an existing file upload method is shown. For file upload, the traditional solutions are: the method comprises the steps of (1) reading a local file through a browser plug-in, (2) transmitting the local file to a back-end server through a network, (3) analyzing meta information of the file by the back-end server when the transmission is completed, and returning the meta information to the browser, (4) enabling a user to confirm whether the uploaded file meets expectations according to the meta information, and uploading the file if the uploaded file meets expectations.
When the uploaded file is too large, at least the following problems exist in the prior art: (1) The network transmission process consumes a long time, and if the network quality is poor, the file uploading efficiency can be affected, and sometimes the uploading can not be completed at all; (2) If the user does not confirm the uploading operation finally, namely, the uploading is canceled, the network resource is wasted.
Disclosure of Invention
In order to solve the technical problems that the network transmission process takes longer time, if the network quality is poor, the file uploading efficiency is affected, sometimes even uploading cannot be completed, and network resource waste is possibly caused in the prior art, the application provides a file uploading method and device based on WASM (WebAssembly) technology.
In a first aspect, the present application provides a method for uploading a file based on a WASM technology, which is applied to a user side, where the user side is in communication connection with a server, and the user side is configured with a first WASM module, where the first WASM module is compiled by an analysis module in the server, and the method for uploading a file includes:
receiving an uploading request of a user for a target file;
responding to an uploading request, and acquiring meta information of a target file through a first WASM module;
receiving a confirmation operation of a user on meta information of the target file;
and uploading the target file in response to the confirmation operation.
Second aspect
The application provides a file uploading device based on WASM technology, which is applied to a user side, the user side is connected with a server in a communication way, the user side is configured with a first WASM module, the first WASM module is compiled by an analysis module in the server, and the file uploading device comprises:
the first receiving module is used for receiving an uploading request of a user for the target file;
the first response module is used for responding to the uploading request and acquiring meta information of the target file through the first WASM module;
the second receiving module is used for receiving the confirmation operation of the user on the meta information of the target file;
and the second response module is used for responding to the confirmation operation and uploading the target file.
Compared with the prior art, the application has at least the following beneficial effects:
in the application, the file analysis function carried out by the server side (the rear end) is transplanted to the user side (the front end) through the WASM technology, and the file is not required to be transmitted to the server through a network when the user uploads the file, so that the file uploading efficiency is prevented from being influenced when the network quality is poor. The meta information can be analyzed at the user side, so that the user can directly confirm the meta information at the user side to upload the file, and even if the user finally cancels uploading, the network resource is not wasted.
Drawings
FIG. 1 is a flow chart of an existing file uploading method provided by the application;
FIG. 2 is a schematic flow chart of a method for uploading files based on WASM technology;
FIG. 3 is a schematic flow chart of another method for uploading files based on WASM technology provided by the application;
fig. 4 is a schematic diagram of a configuration of a WASM module according to the present application;
fig. 5 is a schematic structural diagram of a file uploading device based on WASM technology.
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. Some specific embodiments of the application will be described in detail hereinafter by way of example and not by way of limitation with reference to the accompanying drawings.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions according to the embodiments of the present application with reference to the accompanying drawings. It will be apparent that the described embodiments are merely some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
In a first aspect, referring to fig. 2, a flowchart of a file uploading method based on WASM (WebAssembly) technology according to an embodiment of the present application is shown.
Referring to fig. 3, a flowchart of another method for uploading files based on WASM technology according to an embodiment of the present application is shown.
The application provides a file uploading method based on a WASM technology, which is applied to a user side, wherein the user side is in communication connection with a server, the user side is configured with a first WASM module, and the first WASM module is compiled by an analysis module in the server.
The application does not limit the hardware structure form of the user side.
The WASM technology is a new specification formulated by W3C community groups consisting of mainstream browser manufacturers, and aims to provide an efficient, open, safe and standard technical scheme. WASM technology is a new binary code format that can run in modern Web browsers and can provide a faster, safer and more reliable way for high-performance applications on Web platforms. WASM technology can be used with other Web technologies (e.g., javaScript, HTML and CSS) allowing developers to gradually migrate existing Web applications into WASM.
The analysis module in the server is compiled into the WASM module, and the file analysis function performed by the server side (back end) can be transferred to the client side (front end/browser).
Referring to fig. 4, a schematic diagram of a configuration manner of a WASM module according to an embodiment of the present application is shown.
In one possible implementation manner, the configuration manner of the first WASM module includes:
s101: and modifying the codes of the analysis file library in the server into a preset format.
The preset format is a format which can be called by javascript.
S102: the code in the preset format is compiled into the WASM format using a programming language corresponding to the preset format.
The programming language corresponding to the preset format is a golang language. Other back-end programming languages may be adopted for compiling, and the related back-end programming languages include C, C ++ and Rust, etc., and the application is not limited to the specific form of the back-end programming language.
S103: and packaging the codes in the WASM format into a first WASM module.
S104: the first WASM module is introduced into the implementation code of the user.
It should be noted that the size and loading time of the WASM code need to be considered when transferring the back-end code to the front-end run. Since the WASM code is in binary format, its size is much larger than the source code. Furthermore, loading the WASM module requires time, and thus the size of the WASM module and the loading time need to be weighed. Therefore, these factors need to be taken into account when introducing the WASM module to ensure that the WASM module can run efficiently in the front-end application.
In one possible implementation, S104 includes:
and integrating the first WASM module into an implementation code of the user side through the glue code.
The Glue code (Glue code) refers to a code written by connecting or integrating different programming languages or environments.
In the actual application process, the WASM module can be loaded and ready to run by using JavaScript code, then the data in the front-end application program is transferred into the WASM module by using glue code, the function in the WASM module is called to process the data, and then the result in the WASM module is transferred back into the front-end application program for display or further processing.
In the application, the WASM module and the front-end application program can be seamlessly integrated by writing the glue code, thereby realizing the high-performance Web application program. At the same time, the use of glue codes can simplify the work of developers so that they can concentrate more on the implementation of business logic without paying too much attention to the implementation details of the underlying technology.
The file uploading method comprises the following steps:
s201: and receiving an uploading request of a user for the target file.
Optionally, the user side may provide an upload button for the user, and the user may initiate the upload request by clicking the upload button.
Optionally, the client may predefine the format and size of the file that is allowed to be uploaded.
S202: and responding to the uploading request, and acquiring the meta information of the target file through the first WASM module.
The meta information refers to additional information of the file, such as file name, file type, file size, creation date, modification date, and the like. In a Web application, when uploading a file, it is generally necessary to upload meta information of the file to a server together, and store the meta information on the server side for retrieval and processing when necessary.
In the actual application process, the meta information of the uploaded file can be analyzed in various modes. One common way is to use the Multipart/form-data encoding format in the HTTP protocol. In this encoded format, the meta information of the file is contained in the HTTP request header, and the file data is contained in the HTTP request body. When the server receives such a request, it parses the request header and the request body to extract the meta-information and data of the file.
S203: and receiving the confirmation operation of the meta information of the target file by the user.
The confirming operation of the meta information of the target file may be a click operation of the mouse on the confirming control, or a press input of a certain key in the keyboard.
Here, the confirmation operation is a user reconfirming information such as a file name, a file type, and a file size. The user may be prevented from uploading unintended files, such as files that are not of the same type or version.
For the user, in this process, either confirmation of the upload or cancellation of the upload may be selected. If the user chooses to cancel the uploading, the file is uploaded from the user side. If the user selects to confirm the upload, the process proceeds to S204.
S204: and uploading the target file in response to the confirmation operation.
Compared with the prior art, the application has at least the following beneficial effects:
in the application, the file analysis function carried out by the server side (the rear end) is transplanted to the user side (the front end) through the WASM technology, and the file is not required to be transmitted to the server through a network when the user uploads the file, so that the file uploading efficiency is prevented from being influenced when the network quality is poor. The meta information can be analyzed at the user side, so that the user can directly confirm the meta information at the user side to upload the file, and even if the user finally cancels uploading, the network resource is not wasted.
In one possible implementation, before S203, the file uploading method further includes:
S203A: and analyzing the meta information through the first WASM module, and extracting file information.
In the practical application process, for parsing the meta information, the multi part/form-data coding format in the HTTP protocol described above may be used. In this encoded format, the meta information of the file is contained in the HTTP request header, and the file data is contained in the HTTP request body. When the server receives such a request, it parses the request header and the request body to extract the meta-information and data of the file.
S203B: and displaying file information.
Wherein the file information includes a file name, a file size, and a file type.
The file information can be displayed in a dialog box form so as to remind the user.
S203 specifically is: and receiving a confirmation operation of the user on the file information.
It should be noted that, the validation operation herein may prevent the user from uploading unexpected files, such as files with different types or versions.
In the prior art, the complete file is always uploaded first, the file information can be displayed after the decryption of the server is completed, if the user confirms the file information, the post-processing actions such as storage and the like are performed, if the uploading is canceled, the file is deleted from the server, but the network resource is wasted. In the application, the file information can be analyzed at the user side by the WASM technology, so that the user can directly confirm the file information at the user side to upload the file, and even if the user finally cancels the uploading, the network resource is not wasted.
In one possible implementation, the client is configured with a second WASM module compiled from the authentication module and the public key information in the server. Before uploading the target file, the method further comprises the following steps:
S204A: and carrying out digital signature authentication on the user through public key information in the second WASM module.
The validity and the authenticity of the uploaded file can be ensured through digital signature authentication.
In the practical application process, the user side uses an encryption algorithm to generate a pair of public key and private key, and sends the public key to the second WASM module so that the second WASM module can verify the digital signature of the file. The user uses the private key to digitally sign the uploaded file, generates a digital signature and sends the digital signature to the second WASM module. The second WASM module then verifies the digital signature using the public key provided by the user. If the digital signature passes the verification, the user side uploading the file is trusted, and the data of the uploaded file can be accepted.
Uploading a target file, specifically: and uploading the target file under the condition that the user side passes the digital signature authentication.
The uploading of the file is allowed only under the condition that the digital signature authentication is passed, so that the validity and the authenticity of the uploaded file can be ensured.
In one possible implementation, after S204A, the file uploading method further includes:
S204B: and refusing to upload the target file under the condition that the user side fails to pass the digital signature authentication.
Under the condition that the digital signature authentication is not passed, the uploading of the file is required to be refused so as to ensure the information security.
In one possible implementation, the configuration of the second WASM module includes:
s301: and modifying codes and public key information of the verification file library in the server into a preset format.
S302: the code in the preset format is compiled into the WASM format using a programming language corresponding to the preset format.
S303: and packaging the codes in the WASM format into a second WASM module.
S304: and introducing the second WASM module into the implementation code of the user.
The configuration of the second WASM module has many similarities with the configuration of the first WASM module, and for the similarities, the description of the configuration of the second WASM module is omitted to avoid repetition. The first WASM module is different from the second WASM module in that the first WASM module is compiled by an analysis module in the server to take on the role of analyzing the file, and the second WASM module is compiled by a verification module and public key information in the server to take on the role of analyzing and verifying the identity of the user.
In a second aspect, referring to fig. 5, a schematic structural diagram of a file uploading device based on WASM technology according to an embodiment of the present application is shown.
The application provides a file uploading device 50 based on WASM technology, which is applied to a user side, wherein the user side is in communication connection with a server, the user side is configured with a first WASM module, and the first WASM module is compiled by an analysis module in the server.
The file uploading device 50 includes:
a first receiving module 501, configured to receive an upload request of a user for a target file;
the first response module 502 is configured to obtain meta information of the target file through the first WASM module in response to the upload request;
a second receiving module 503, configured to receive a confirmation operation of the meta information of the target file by the user;
and the second response module 504 is configured to upload the target file in response to the confirmation operation.
In one possible implementation manner, the configuration manner of the first WASM module includes:
transforming the codes of the analysis file library in the server into a preset format;
compiling the codes in the preset format into a WASM format by using a programming language corresponding to the preset format;
encapsulating the codes in the WASM format into a first WASM module;
the first WASM module is introduced into the implementation code of the user.
In one possible implementation, the preset format is a format that can be called by javascript, and the programming language corresponding to the preset format is the golang language.
In one possible implementation manner, the first WASM module is introduced into implementation code of the user side, including:
and integrating the first WASM module into an implementation code of the user side through the glue code.
In one possible implementation, the file uploading device 50 further includes:
the parsing module 505 is configured to parse the meta information through the first WASM module and extract file information;
the display module 506 is configured to display file information;
the second receiving module 503 is specifically configured to: and receiving a confirmation operation of the user on the file information.
In one possible implementation, the file information includes a file name, a file size, and a file type.
In a possible implementation manner, the client is configured with a second WASM module, where the second WASM module is compiled by the authentication module and the public key information in the server, and the file uploading device 50 further includes:
the authentication module 507 is configured to perform digital signature authentication on the user through public key information in the second WASM module;
the second response module 504 is configured to upload the target file if the user side is authenticated by the digital signature.
In a possible implementation manner, the second response module 504 is further configured to refuse to upload the target file if the user side fails to pass the digital signature authentication.
In one possible implementation, the configuration of the second WASM module includes:
modifying codes and public key information of a verification file library in a server into a preset format;
compiling the codes in the preset format into a WASM format by using a programming language corresponding to the preset format;
encapsulating the codes in the WASM format into a second WASM module;
and introducing the second WASM module into the implementation code of the user.
The WASM technology-based file uploading device 50 provided by the present application can implement each process implemented in the above method embodiment, and in order to avoid repetition, a description is omitted here.
The virtual device provided by the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal.
Compared with the prior art, the application has at least the following beneficial effects:
in the application, the file analysis function carried out by the server side (the rear end) is transplanted to the user side (the front end) through the WASM technology, and the file is not required to be transmitted to the server through a network when the user uploads the file, so that the file uploading efficiency is prevented from being influenced when the network quality is poor. The meta information can be analyzed at the user side, so that the user can directly confirm the meta information at the user side to upload the file, and even if the user finally cancels uploading, the network resource is not wasted.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.

Claims (9)

1. The file uploading method based on the WASM technology is applied to a user side and is characterized in that the user side is in communication connection with a server, the user side is configured with a first WASM module, the first WASM module is compiled by an analysis module in the server, and the file uploading method comprises the following steps:
receiving an uploading request of a user for a target file;
responding to the uploading request, and acquiring meta information of the target file through the first WASM module;
receiving a confirmation operation of a user on the meta information of the target file;
responding to the confirmation operation, and uploading the target file;
the user terminal is configured with a second WASM module, the user terminal generates a pair of public key and private key by using an encryption algorithm, and sends the public key to the second WASM module, and the second WASM module is compiled by a verification module in the server and the public key information;
before the uploading of the target file, the method further comprises: performing digital signature authentication on the user side through public key information in the second WASM module, wherein the digital signature of the user side is obtained by the user side performing digital signature on a target file by using the private key and sending the target file to the second WASM module;
the uploading of the target file specifically includes:
and uploading the target file under the condition that the user side passes the digital signature authentication.
2. The WASM technology-based file uploading method according to claim 1, wherein the configuration mode of the first WASM module includes:
transforming the codes of the analysis file library in the server into a preset format;
compiling the codes in the preset format into a WASM format by using a programming language corresponding to the preset format;
encapsulating the codes in the WASM format into the first WASM module;
and introducing the first WASM module into the implementation code of the user side.
3. The WASM technology-based file uploading method according to claim 2, wherein the preset format is a format that can be called by javascript, and the programming language corresponding to the preset format is a golang language.
4. The WASM technology-based file uploading method according to claim 2, wherein the introducing the first WASM module into the implementation code of the client includes:
integrating the first WASM module into an implementation code of the user terminal through a glue code.
5. The WASM technology based file uploading method according to claim 1, further comprising, before the receiving user confirms the meta information of the target file:
analyzing the meta information through the first WASM module, and extracting file information;
displaying the file information;
the receiving user confirms the meta information of the target file specifically comprises the following steps:
and receiving a confirmation operation of the user on the file information.
6. The WASM technology based file uploading method according to claim 5, wherein the file information comprises file name, file size and file type.
7. The WASM technology-based file uploading method according to claim 1, wherein after the digital signature authentication is performed on the client by the public key information in the second WASM module, further comprising:
and refusing to upload the target file under the condition that the user side fails to pass the digital signature authentication.
8. The WASM technology-based file uploading method according to claim 1, wherein the configuration mode of the second WASM module includes:
modifying codes of the verification file library in the server and the public key information into a preset format;
compiling the codes in the preset format into a WASM format by using a programming language corresponding to the preset format;
encapsulating the codes in the WASM format into the second WASM module;
and introducing the second WASM module into the implementation code of the user side.
9. The utility model provides a file uploading device based on WASM technique, is applied to the user side, its characterized in that, the user side is connected with the server communication, the user side is furnished with first WASM module, first WASM module is compiled by the analysis module in the server, the file uploading device includes:
the first receiving module is used for receiving an uploading request of a user for the target file;
the first response module is used for responding to the uploading request and acquiring meta information of the target file through the first WASM module;
the second receiving module is used for receiving the confirmation operation of the user on the meta information of the target file;
the second response module is used for responding to the confirmation operation and uploading the target file;
the user terminal is configured with a second WASM module, the user terminal generates a pair of public key and private key by using an encryption algorithm, and sends the public key to the second WASM module, and the second WASM module is compiled by a verification module in the server and the public key information;
before the uploading of the target file, the method further comprises: performing digital signature authentication on the user side through public key information in the second WASM module, wherein the digital signature of the user side is obtained by the user side performing digital signature on a target file by using the private key and sending the target file to the second WASM module;
the uploading of the target file specifically includes:
and uploading the target file under the condition that the user side passes the digital signature authentication.
CN202310565725.4A 2023-05-19 2023-05-19 File uploading method and device based on WASM technology Active CN116319763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310565725.4A CN116319763B (en) 2023-05-19 2023-05-19 File uploading method and device based on WASM technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310565725.4A CN116319763B (en) 2023-05-19 2023-05-19 File uploading method and device based on WASM technology

Publications (2)

Publication Number Publication Date
CN116319763A CN116319763A (en) 2023-06-23
CN116319763B true CN116319763B (en) 2023-08-11

Family

ID=86801745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310565725.4A Active CN116319763B (en) 2023-05-19 2023-05-19 File uploading method and device based on WASM technology

Country Status (1)

Country Link
CN (1) CN116319763B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108563728A (en) * 2018-04-04 2018-09-21 沈阳东软医疗系统有限公司 A kind of method and apparatus that medical image file is uploaded by browser
CN112073188A (en) * 2020-08-31 2020-12-11 北京市商汤科技开发有限公司 Authentication method, device, equipment and computer readable storage medium
CN114285833A (en) * 2021-12-15 2022-04-05 中国建设银行股份有限公司 WEB terminal resource file access system, device and method
CN114356507A (en) * 2022-01-13 2022-04-15 深圳睿品通信息科技有限公司 Method, device and equipment for processing document based on browser and storage medium
CN115396177A (en) * 2022-08-23 2022-11-25 成都三零瑞通移动通信有限公司 Encrypted communication method for realizing efficient communication of web end based on WASM
WO2023029447A1 (en) * 2021-08-30 2023-03-09 北京百度网讯科技有限公司 Model protection method, device, apparatus, system and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11489909B1 (en) * 2021-04-15 2022-11-01 Cloudflare, Inc. Non-HTTP layer 7 protocol applications running in the browser

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108563728A (en) * 2018-04-04 2018-09-21 沈阳东软医疗系统有限公司 A kind of method and apparatus that medical image file is uploaded by browser
CN112073188A (en) * 2020-08-31 2020-12-11 北京市商汤科技开发有限公司 Authentication method, device, equipment and computer readable storage medium
WO2023029447A1 (en) * 2021-08-30 2023-03-09 北京百度网讯科技有限公司 Model protection method, device, apparatus, system and storage medium
CN114285833A (en) * 2021-12-15 2022-04-05 中国建设银行股份有限公司 WEB terminal resource file access system, device and method
CN114356507A (en) * 2022-01-13 2022-04-15 深圳睿品通信息科技有限公司 Method, device and equipment for processing document based on browser and storage medium
CN115396177A (en) * 2022-08-23 2022-11-25 成都三零瑞通移动通信有限公司 Encrypted communication method for realizing efficient communication of web end based on WASM

Also Published As

Publication number Publication date
CN116319763A (en) 2023-06-23

Similar Documents

Publication Publication Date Title
US8620995B2 (en) Method, computer program, transcoding server and computer system for modifying a digital document
CN109768965B (en) Login method, equipment and storage medium of server
CN110764807B (en) Upgrading method, system, server and terminal equipment
CN105786998A (en) Database middleware system and method for processing data through database middleware system
CN104219198B (en) A kind of tamper resistant method of WebApp
CN104462522A (en) File on-line previewing method, terminal and server
CN111858376A (en) Request message generation method and interface test method
KR102226463B1 (en) UI/UX solution providing server linked with process automation program, process automation method using the same, and computer program executing the same
CN111988418A (en) Data processing method, device, equipment and computer readable storage medium
CN109560895A (en) Data transmission method and device
CN111506551A (en) Conference file extraction method and system and computer equipment
CN116319763B (en) File uploading method and device based on WASM technology
CN112988311A (en) On-line experimental method based on WEB server
CN108259487B (en) information interaction method and computer readable medium
CN111158716A (en) Version upgrade calling method and device, computer system and readable storage medium
CN105141586A (en) Method and system for verifying user
CN111324645A (en) Data processing method and device for block chain
CN114996708A (en) Method and device for studying and judging fraud-related mobile phone application, electronic equipment and storage medium
WO2017143931A1 (en) Method and apparatus for identifying smart card, method and apparatus for processing smart card identification data, and device
CN103856504A (en) System and method for object file access in image file by analyzing access path
CN109543398B (en) Application program account migration method and device and electronic equipment
CN113342811A (en) HBase table data processing method and device
CN113824756A (en) File processing method and device, storage medium and electronic equipment
CN113064627A (en) Service access data processing method, platform, terminal, equipment and system
CN113138817A (en) Mobile terminal interface annotation method and device, electronic equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant