CN117118625A - Data processing method, device and computer readable storage medium - Google Patents

Data processing method, device and computer readable storage medium Download PDF

Info

Publication number
CN117118625A
CN117118625A CN202210541642.7A CN202210541642A CN117118625A CN 117118625 A CN117118625 A CN 117118625A CN 202210541642 A CN202210541642 A CN 202210541642A CN 117118625 A CN117118625 A CN 117118625A
Authority
CN
China
Prior art keywords
data
target
signature
service
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210541642.7A
Other languages
Chinese (zh)
Inventor
苟亚明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202210541642.7A priority Critical patent/CN117118625A/en
Publication of CN117118625A publication Critical patent/CN117118625A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44204Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a data processing method, a data processing device and a computer readable storage medium, which can be applied to scenes such as cloud technology. Specifically, the data processing method can obtain service logic data of a target account in the target application; classifying the service logic data to obtain classified service type data; reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority to the server and contains the data signature authority of the target account at the local terminal; signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information; and uploading the target logic data to the server for storage. Therefore, the data generated by the application program can be managed pertinently, the willingness of the target object is met, the application business data used subsequently meets the requirements of the target object, the safety and the efficiency of data processing are ensured, and the user experience is improved.

Description

Data processing method, device and computer readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, apparatus, and computer readable storage medium.
Background
An Application (APP) as a functional program unit, which can carry corresponding service function logic to enable service functions of each platform to run on the terminal device; the data of the application program in the running process can be used for subsequent other business scenes, such as scenes of feature mining, recommendation and the like. In order to enable the application program data to be applied later, the related art manages the application program data, such as actively transmitting the application program data to a server, so that the server associates the data with an application account at runtime to facilitate later use.
In the research and practice process of the prior art, the inventor finds that when the prior art manages the data generated by the application program, all the data generated by the application program are transmitted to the server for storage, so that the user will is removed when the data of the application program are managed, the history data of the application program used subsequently is not targeted, the data of the required service type is difficult to quickly find, the user experience is influenced, and the safety and the efficiency of the data processing are poor.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device and a computer readable storage medium, which can pertinently manage data generated by an application program so that application business data used subsequently accords with the requirements of a target object, ensure the safety and the efficiency of data processing and improve the user experience.
The embodiment of the application provides a data processing method, which comprises the following steps:
acquiring business logic data of a target account in a target application;
classifying the service logic data to obtain classified service type data;
reading a signature certificate of the target account, wherein the signature certificate is obtained after a local terminal registers data signature authority to a server, and the signature certificate contains the data signature authority of the target account at the local terminal;
signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information;
and uploading the target logic data to the server for storage.
Accordingly, an embodiment of the present application provides a data processing apparatus, including:
the acquisition unit is used for acquiring service logic data of a target account in the target application;
The classifying unit is used for classifying the service logic data to obtain classified service type data;
the reading unit is used for reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority with the server, and the signature certificate contains the data signature authority of the target account at the local terminal;
the signature unit is used for signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information;
and the processing unit is used for uploading the target logic data to the server for storage.
In some embodiments, the classifying unit is further configured to:
creating abstract data corresponding to the business logic data;
extracting a target field corresponding to the business logic data from the abstract data, and assigning a value to the target field according to the business logic data to obtain a target field value;
and classifying the service logic data according to the target field value to obtain classified service type data.
In some embodiments, the signature unit is further configured to:
Determining a signature authority list according to the data signature authority in the signature certificate, wherein the signature authority list comprises an association relationship between a preset service type and the signature authority;
determining a target service type corresponding to the service type data, and matching the target service type in the signature authority list;
and if the service type is matched with the preset service type corresponding to the target service type, signing the service type data according to the signature authority associated with the preset service type to obtain target logic data carrying target signature information.
In some embodiments, the signature unit is further configured to: if the service type is not matched with the preset service type corresponding to the target service type, stopping signing the service type data, and determining the service type data stopping signing as unsigned data;
the processing unit is further configured to: intercepting the unsigned data uploaded to the server, and deleting the intercepted unsigned data.
In some embodiments, the data processing apparatus further comprises a registration unit for:
identifying a target account registered in the target application;
Requesting the server to register the data signature authority corresponding to the target account;
and if the signature certificate corresponding to the data signature authority is received and returned by the server, storing the signature certificate into a storage space associated with the target account in the local terminal.
In some embodiments, the registration unit is further configured to:
requesting to acquire a data signature strategy from the server;
acquiring historical business logic data selected for the target account in the target application, and signing the historical business logic data according to the data signing policy to obtain signature information;
and sending the signature information to the server, so that the server registers the data signature authority of the target account according to the signature information.
In some embodiments, the registration unit is further configured to:
generating an account key corresponding to the target account according to the data signature strategy;
and signing the historical business logic data according to the account key to obtain signature information.
In some embodiments, the data processing apparatus further comprises an updating unit for:
identifying the device authority type of the local terminal;
If the device authority type of the local terminal is detected to be the main device authority, a preset auxiliary device authority list is obtained, and when the auxiliary device authority list is identified to contain an auxiliary device identifier, the authority relation of the signature information is updated according to the auxiliary device identifier, so that updated signature information is obtained;
the registration unit is further configured to send the updated signature information to the server.
In some embodiments, the data processing apparatus further comprises an identification unit for:
acquiring a data transmission queue corresponding to the target application in the local terminal;
identifying the number of data tasks to be executed in the data transmission queue;
and the processing unit is further configured to upload the target logic data to the server for storage if the number of the data tasks is identified to be smaller than a preset task number threshold.
In some embodiments, the data processing apparatus further comprises a detection unit for:
detecting a business operation process of the target application;
determining the current service operation logic time point of the target application according to the service operation process;
and the acquiring unit is used for acquiring the service logic data of the target account in the target application if the service operation logic time point is detected to reach the preset data uploading time point.
In some embodiments, the data processing apparatus further comprises a data merging unit for:
if the starting request of the target application is detected, starting the target application, and identifying the running process of the started target application;
if the running process is identified to reach the preset running process time point, acquiring an attribution field value in real-time business logic data corresponding to the running process, and requesting the server to acquire historical business logic data corresponding to the attribution field value;
and if the service types between the historical service logic data and the real-time service logic data are detected to be consistent, merging the historical service logic data and the real-time service logic data, and displaying the merged target service logic data.
In some embodiments, the data processing apparatus further comprises a pushing unit for:
if the starting request of the target application is detected, a service prompt request carrying the target account is sent to the server, so that the server determines logic data to be pushed based on the data uploading record of the local terminal aiming at the target account;
And if logic data to be pushed returned by the server is received, starting the target application, and displaying a service prompt tag corresponding to the logic data to be pushed in a target application interface after starting.
In addition, the embodiment of the application also provides a computer device, which comprises a processor and a memory, wherein the memory stores a computer program, and the processor is used for running the computer program in the memory to realize the steps in any data processing method provided by the embodiment of the application.
In addition, the embodiment of the application also provides a computer readable storage medium, which stores a plurality of instructions, wherein the instructions are suitable for being loaded by a processor to execute the steps in any data processing method provided by the embodiment of the application.
In addition, the embodiment of the application also provides a computer program product, which comprises computer instructions, wherein the computer instructions realize the steps in any data processing method provided by the embodiment of the application when being executed.
The embodiment of the application can acquire the business logic data of the target account in the target application; classifying the service logic data to obtain classified service type data; reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority to the server, and the signature certificate contains the data signature authority of the target account at the local terminal; signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information; and uploading the target logic data to the server for storage. Therefore, the scheme can acquire the service logic data generated by the target application in operation and classify the service logic data to determine the service type of the service logic data; and then, the classified service type data is signed according to the data signing authority in the signing certificate of the target account, so that the processing strategy of the service type data is determined according to the signing condition, for example, the data uploading is executed after the signing is successful, and the safety and the efficiency of the data processing are improved. Therefore, the business data can be processed according to the wish of the target object so as to pertinently manage the data generated by the application program, so that the subsequently used application business data meets the requirements of users and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a scenario of a data processing system provided by an embodiment of the present application;
FIG. 2 is a flowchart illustrating steps of a data processing method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating another step of a data processing method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an interface used in multiple ends in a data processing method according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an interface for managing device information in a data processing method according to an embodiment of the present disclosure;
fig. 6 is a schematic diagram of a scenario of registering a data signature authority in the data processing method provided in the application embodiment;
FIG. 7 is a block flow diagram of a data processing method according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
Fig. 9 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to fall within the scope of the application.
The embodiment of the application provides a data processing method, a data processing device and a computer readable storage medium. In particular, the embodiments of the present application will be described in terms of a data processing apparatus, which may be specifically integrated in a computer device, where the computer device may be a server, or may be a device such as a terminal. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligence platforms. The terminal may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, an intelligent sound box, a smart watch, an intelligent home appliance, a vehicle-mounted terminal, an intelligent voice interaction device, an aircraft, and the like.
It should be noted that, in the specific embodiment of the present application, related data of user information, user behavior, business habits, features, etc. are related, when the above embodiments of the present application are applied to specific products or technologies, user permission or consent needs to be obtained, and the collection, use and processing of related data need to comply with related laws and regulations and standards of related countries and regions. In addition, in the embodiment of the application, the related object data, service data and the like related to the account are mainly the service function operation related to the account in the application program, belong to the operation category of the related service function, and the application of the related data is authorized by the user and follows the privacy protection requirement of the user.
The data processing method provided by the embodiment of the application can be applied to various scenes including but not limited to scenes of data processing such as cloud technology, artificial intelligence, intelligent traffic, auxiliary driving and the like, and the scenes are not limited to be realized by means of cloud service, big data and the like, and the method is specifically described by the following embodiments:
for example, referring to fig. 1, a schematic view of a scenario of a data processing system according to an embodiment of the present application is provided. The scenario includes a terminal and a server.
The terminal can acquire service logic data of a target account in the target application; classifying the service logic data to obtain classified service type data; reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority to the server, and the signature certificate contains the data signature authority of the target account at the local terminal; signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information; and uploading the target logic data to a server for storage.
The server can receive a data signature authority registration request of the terminal in the target application aiming at the target account, and complete the data signature authority registration of the target account in the target application; and when receiving target logic data which is sent by the terminal and is signed in the target application aiming at the target account, verifying target signature information in the signed target logic data, and storing the target type data after verification is passed.
The data processing may include: obtaining business logic data, classifying the data, reading signature certificates, signing the data, determining a data processing strategy, processing the data and the like.
The following will describe in detail. The order of the following examples is not limited to the preferred order of the examples.
In the embodiments of the present application, description will be made in terms of a data processing apparatus, which may be integrated in a computer device such as a terminal or a server in particular. Referring to fig. 2, fig. 2 is a schematic step flow diagram of a data processing method according to an embodiment of the present application, where in the embodiment of the present application, a specific integration of a data processing device on a terminal is taken as an example, and when a processor on the terminal executes a program instruction corresponding to the data processing method, a specific flow is as follows:
101. and acquiring business logic data of a target account in the target application.
The target application can be an application program/client with a service function installed on the local terminal, and can perform data interaction with other clients/servers; for example, taking a mobile phone as a local terminal, the target application may be a video application, a map application, a music application, a shopping application, etc. installed on the mobile phone. The above is merely an example, and the target application may be any type of application program.
The target account can be account information which is registered in advance with the server by the target object, the account information can be used for logging in clients of different terminal devices, and can be used for logging in different clients under the same terminal device, for example, the target account can be used for logging in an application client or a webpage client, namely, the target account can meet the scene of simultaneous use or segmented use of multiple people.
Wherein, the business logic data can be specific data generated inside the application program, which can provide the call of related function functions for the management of the business data; specifically, the service logic data essentially belongs to object data, and can be specifically application data of a target object when the target object requests to operate related service functions, and the application data can influence the calling and executing instructions of the related functions in the operation process of the service function program. For example, in the case of video applications, the types of service logic data are not limited to object data including video play records, playlist records, collection records, and behavior logs.
For easy understanding, the embodiments of the present application describe service data and service logic data respectively, and specifically are as follows:
the service data is the data presented in the application interface after the related service function in the application program is operated, specifically the appearance data of the service logic data of the related service function in the display interface, namely the service data is service information; for example, taking a video application as an object application, the video application may not be limited to service function options including video playing record, video collection, play list, and the like, and the service data corresponding to the video playing record function may be a video playing name of the logical data of the video playing record displayed/represented in the application interface, and for example, the service data corresponding to the video collection function is a video collection name of the logical data of the video collection displayed/represented in the application interface.
The business logic data may be logic data generated by the target application when executing/running the program function, which represents underlying business logic of relevant program function options in the target application for influencing the execution of the relevant business logic. For example, taking a service guiding scene of an application program as an example, when a target object opens the target application or runs a certain service function program in the application, service logic data capable of currently conducting service guiding can be determined according to the current process environment conditions (such as service data, service logic data, application external data and the like) of the target application, and the guidable service logic data is presented in an application interface, such as a service pushing label or a service prompting label corresponding to the guidable service logic data is displayed in the application interface; and when the target object selects the service prompt tag in the application interface, the current process environment condition of the target application is switched to the condition corresponding to the service prompt tag, for example, the service logic data of the current process is stopped, and the service logic data corresponding to the service prompt tag is executed.
It should be noted that, the storage location of the service logic data may be a server, for example, the service logic data generated by the target application is stored in the server corresponding to the target application so as to be convenient for subsequent use, for example, the subsequent use is not limited to feature mining, preference information recommendation, and the like of the target account in the target application, and is mainly performed based on authorization and preference willingness of the target object. However, when the target object uses the business program function of the target application, the target object may wish to store only part of the data, such as storing business logic data under the same type, for the usage record under the same business program function; for example, taking a video application as an example, a target object plays a normal long video and a short video in the video application, where the target object only wants to store a play record of the normal long video and not store a play record of the short video in a server, at this time, service logic data corresponding to the play record of the video needs to be managed, for example, the service logic data of the normal long video when played is stored, and the service logic data corresponding to the short video when played is deleted, so that future requirements of the target object are met in a data application layer.
In order to manage business logic data corresponding to a target account in a target application, the embodiment of the application needs to acquire data generated by the target application in running. Specifically, taking the example that the data processing device is integrated in the local terminal, the local terminal starts and runs the related service function program built in the target application, at this time, the target application can generate related service logic data, and the local terminal needs to acquire the service logic data about the target account in the target application so as to facilitate the subsequent management of the service logic data according to the wish of the target object.
In some embodiments, when the business logic data is managed, the business logic data can be uploaded in real time, but the data uploading process may affect the running performance of the current business function program of the target application and may affect the experience of the target object; therefore, the embodiment of the application can also manage the business logic data generated by the target application by setting the proper time, such as acquiring the business logic data at the proper time. Specifically, before the step of obtaining the service logic data of the target account in the target application, the step may include: detecting a business operation process of a target application; determining the current service operation logic time point of the target application according to the service operation process; the step of acquiring the business logic data of the target account in the target application may include: and if the service operation logic time point is detected to reach the preset data uploading time point, acquiring the service logic data of the target account in the target application.
The service running process may be an execution entity of a related service function program in the target application, and may reflect, through the service running process, a running progress or a running duration of the service function program, which may specifically represent a progress of service running logic of the service function program.
The service operation logic time point may be a logic progress time point of the local terminal when the related service function program is operated, which may reflect an operation progress of the service function. For example, taking a music application as an example, the target object can generate service operation logic of a play service function of the music application by pre-establishing a music play list to be played and setting an automatic play time and a stop play time, a pause play mode and the like of the music play list, such as "identify time-to-time play (automatic play time) -other scenes pause play and resume play (pause play mode) -stop play (stop play time)", and can be regarded as a service operation logic time point from the above; the above is merely an example, and the embodiment of the present application does not limit the service operation logic time point.
The preset data uploading time point may be a logic time point when the service logic data is uploaded to the server for storage, and the uploading time of the service logic data can be limited by the preset data uploading logic time point. For example, taking a video class or an image class application as an example, capturing a video frame of a target object in a video playing process, or saving a picture in the image application, when detecting that a related image is saved to a local album, setting an operation logic time point for completing saving the image to the local album as a preset data uploading time point, so as to obtain service logic data of the application when the target object saves the image in an application program, and executing a subsequent preparation uploading process. It should be noted that the above is merely an example, and the embodiments of the present application are not limited thereto; in addition, the uploading time points of the data between different service function programs in the same application may not be consistent, i.e. the preset uploading time point of the data may be set according to actual requirements.
In order to manage the business logic data of the target application, the embodiment of the application specifically identifies the current running business function program in the target application by detecting the business running process of the target application, and searches the business running process corresponding to the business function program, for example, searches the corresponding business running process in the target application according to the identification of the business function program; further, determining a service operation logic time point of the target application (specifically, a service function program) according to the service operation process; further, comparing the determined service operation logic time point with a preset data uploading time point, and acquiring service logic data aiming at a target account in the target application when the service operation logic time point is detected to reach (accord with) the preset data uploading time point, wherein the service logic data can be specifically the service logic data of the target account when the target service function program is operated. Therefore, the running progress of the currently running service function program in the target application can be known, and the service logic data can be obtained when the service running progress reaches a preset time point, so that the obtained data can be managed later.
By the method, when the business logic data of the target application aiming at the target account is detected, the business logic data can be acquired, so that the business logic data corresponding to the target account in the target application can be managed later.
102. And classifying the service logic data to obtain classified service type data.
The service type data refers to the returned service logic data. Specifically, the target application may include a plurality of service function programs or a plurality of service type programs, where each service function program or service type program corresponds to one service type, that is, service logic data between different service type programs is different. For example, taking video application as an example, classifying the business logic data according to the member type of the account, because the business logic corresponding to different member types may be different, such as playing progress, preemptive broadcasting, definition, etc. of the video with the account of the member, the business logic data may be classified according to the member type; in addition, the classification can be performed according to video types, for example, when the target account views videos, the target account can include service logic data of video types such as common long videos (e.g., movies, each episode of television drama video, etc.), short videos (videos with shorter duration), and the like, and since the current short video service is in a push operation mode, the push operation mode has no certainty and cannot represent that the target object has interest preference on the pushed short videos, when the data is classified and managed, the related service logic data can be classified according to the video types.
It should be noted that, in the embodiment of the present application, after obtaining the service logic data of the target application for the target account, the service logic data needs to be categorized, so that the categorized data is signed and processed in a related manner, thereby implementing management of the service logic data.
In some embodiments, in the classifying process of the service logic data, the service type corresponding to the service logic data may be determined according to the correlation value in the service logic data. For example, the step of "classifying the service logic data to obtain classified service type data" may include: creating abstract data corresponding to business logic data; extracting a target field corresponding to the business logic data from the abstract data, and assigning a value to the target field according to the business logic data to obtain a target field value; and classifying the service logic data according to the target field value to obtain classified service type data.
The abstract data refers to abstract class data (baseData) corresponding to the service logic data, which may include various fields corresponding to related data or values in the service logic data, where the fields may be understood as attribute types of related values in the service logic data, and are used for labeling or explaining related values in the service logic data. For example, assuming that the business logic data contains a business type value, a data type value, a background identification of the application, etc., the created abstract data may include a field for the business type, a field for the data type, a field for the background identification of the application, etc.
The target field may be a field required by service logic data, and is used for marking a correlation value in the service logic data.
Specifically, in order to classify service logic data, after the service logic data is obtained, abstract class data corresponding to the service logic data can be created for marking relevant numerical values in the service logic data in the follow-up process; further, the target field required by the service logic data is selected from the created abstract class data, and specifically may be a value for identifying the service type in the service logic data, for example, the service type value in the service logic data is identified according to a preset service type value format, and the target field corresponding to the service type value is extracted from the abstract class data; therefore, the target field is assigned according to the related value (such as the value of the service type) in the service logic data so as to rewrite the type field and obtain the target field value corresponding to the service logic data; and finally, classifying the service logic data based on the target field value of the service type of the service logic data, for example, searching a preset service type value list according to the field value (target field value) of the service type to determine the target service type corresponding to the target field value, thereby classifying the service logic data according to the target service type to obtain classified service type data.
By the method, after the business logic data of the target application aiming at the target account is obtained, the business logic data can be classified so as to sign and store the data conforming to the business type later, and therefore the business data is managed; therefore, the influence of data disorder on the subsequent data signature efficiency is avoided, the subsequent signature success rate is improved, and the management efficiency of service data is ensured.
103. The signature certificate of the target account is read.
The signature certificate is obtained after the local terminal registers the data signature authority with the server, and the signature certificate contains the data signature authority of the target account at the local terminal, specifically, the signature authority of all or part of business logic data, which is used for limiting the business type and the signature process of the signable logic data.
The data signing authority may be signing authority of logic data, specifically signing authority of part/all business type data set for the target account. Specifically, the target object corresponding to the target account may register, according to personal wish, the data signature authority of the target application of the target account in the local terminal to the server through the local terminal (or the related application program of the local terminal), and register, according to personal wish or other user wishes, the data signature authority of the target application of the target account in other terminal devices to the server.
The data signing authority comprises a signing authority relation of a target account in a target application of a corresponding terminal, wherein the signing authority relation can reflect an association relation between data of a service type and signing authority, namely, the terminal equipment can determine the data of the signable service type of the target account in the target application of the terminal equipment according to the data signing authority.
It should be noted that, the signature certificate in the embodiment of the present application needs to be obtained by registering the data signature authority in advance. Specifically, the registrant of the target account can register data authority through the main device, and the main device can be understood as a terminal device with the maximum management authority of the account, which means that the target account has the maximum authority when being used in the target application of the main device. For example, taking the use of sharing a target account with a plurality of target objects as an example, a manager of the target account (which may be the target object initiating account registration) may set a master device to a server through a personal information authentication manner, for example, set the master device and a change of the master device through a verification code of a mobile phone number, other passwords, and the like, where the master device is typically a personal terminal device of the manager; and the main equipment requests to register the data signature authority from the server, specifically, the data signature authority of the target account in each terminal equipment and/or the client of the terminal equipment is registered, so as to obtain the signature certificate corresponding to the data signature authority.
In some embodiments, in order to enable the local terminal to sign the classified service type data later, the embodiment of the present application needs to obtain a signature certificate of the target account in the local terminal device or other terminal devices in advance. Thus, prior to step "read signature certificate of target account", it may include:
(103.1) identifying a target account registered in the target application;
(103.2) requesting the server to register the data signature authority corresponding to the target account;
and (103.3) if the signature certificate corresponding to the data signature authority is received and returned by the server, storing the signature certificate into a storage space associated with the target account in the local terminal.
In the embodiment of the application, when the signature certificate of the target account is registered in advance, the registration and the issuing of the certificate can be requested to the server according to the certificate acquisition request triggered by the account manager. Specifically, the local terminal detects a certificate registration instruction triggered by a target object in real time, and when the certificate registration instruction is detected, a target account logged in by a target application in the local terminal is identified to determine account information corresponding to the certificate registration instruction; further, the local terminal generates a certificate registration request, and requests the server to register the data signature authority corresponding to the target account through the certificate registration request, so that the server registers the data signature authority aiming at the target account, and returns a corresponding signature certificate to the local terminal after the registration is passed; when receiving the signature certificate corresponding to the data signature authority, the local terminal can store the signature certificate into a storage space associated with the target account in the local terminal, so that when the service type data needs to be signed subsequently, the signature certificate in the storage space is read, and the service type data is signed according to the read signature certificate.
It should be noted that, for the case that one target account is used in multiple target objects (different terminal devices), the signature certificates of the target applications (and related web page clients) in other device ends can also be registered through the master device; further, after registering the signature certificates of the other device ends through the master device, the server may issue the signature certificates corresponding to the other device ends to the corresponding other device terminals, for example, when detecting that the target application in the other device ends logs in the target account, the server may actively issue the registered related signature certificates to the device terminal, so that the device end stores the related signature certificates in a storage space which is built in and associated with the target account.
In some embodiments, the registration process of the signature certificate may be a registration of data signature rights, the registration process of the data signature rights mainly including signature rights registration of signable business type data. Specifically, the step (103.2) "request to register the data signature authority corresponding to the target account to the server" may include:
(103.2.1) requesting the server to obtain a data signature policy;
(103.2.2) acquiring historical business logic data selected for a target account in a target application, and signing the historical business logic data according to a data signing policy to obtain signature information;
(103.2.3) sending the signature information to the server such that the server registers the data signing authority of the target account according to the signature information.
Wherein the data signature policy may be a data authentication rule, which is not limited to a verification rule including an information (e.g., key) authentication process and an authentication rule of a data signature authentication process. In the embodiment of the application, the data signature policy comprises a signature rule of the data signature authority registration process, for example, the signature rule can limit a signature format, a signature element, a signature parameter and the like, and can be used for guiding and normalizing the data signature authority registration process.
The signature information may be data information including signature data, which may be a value in a specific form, such as an MD5 value form, and may be used for subsequent verification of the signed logic data by the server, and may particularly be used for subsequent verification of the signed logic data by the server. When signature information is acquired, the logic data of the service type can be signed according to the data signature strategy after the service type of the historical service logic data is determined, so that the signature information is obtained; when determining the service type of the historical service logic data, the service type can be determined according to a service type management rule provided by the background of the target application, for example, the background of the target application presets a corresponding data field value when managing each service function program, and the service type of the historical service logic data can be determined through the data field value.
It should be noted that, after the signature information passes through the verification of the server, the signature information may be used as the archived data of the server, so as to be used for subsequent verification of the relevant logic data after the signature.
In order to register the data signature authority aiming at the target account in the target application at the server, the embodiment of the application can send a data authority registration request aiming at the target account to the server after detecting the authority registration instruction input by the target object so as to acquire the data signature strategy of the application platform (server). Further, identifying historical business logic data selected by the target object for one or more business function programs in the target application, for example, logic data corresponding to a historical play record in a video play record (business function program) of the video application, and/or logic data of other business function programs; after the selected historical service logic data is identified, the historical service logic data selected for the target account in the target application can be obtained, and the historical service logic data is signed according to the data signing policy, so that signature information is obtained. And finally, the signature information is sent to a server, so that the server files after the signature information passes verification, and the data signature authority of the target account is registered according to the verified signature information.
In some embodiments, "signing the historical business logic data according to the data signing policy to obtain signature information" in step (103.2.2) may include: generating an account key corresponding to the target account according to the data signature strategy; and signing the historical service logic data according to the account key to obtain signature information.
Wherein the account key is used as a signature element in a signature rule of the data signature policy, which may be defined by the data signature policy, such as a format of a defined key and/or a generation rule, which is not limited herein.
When the embodiment of the application signs the historical service logic data, the signature can be carried out in a key mode. Specifically, after a data signature strategy is obtained, generating an account key corresponding to a target account according to a relevant rule of the data signature strategy and target account information; and then, signing the business logic data by using the account key according to a signing rule in the data signing policy to obtain signing information so as to be conveniently sent to a server for verification and registration of data signing authority.
In some embodiments, in order to implement data management for a target application of a target account in other device ends, a target account manager may set, through a master device, signature authority of logic data related to the target application of the target account in other device ends. For example, after step (103.2.2), it may further include: identifying the equipment authority type of the local terminal; if the device authority type of the local terminal is detected to be the main device authority, a preset auxiliary device authority list is obtained, and when the auxiliary device authority list is identified to contain an auxiliary device identifier, the authority relation of signature information is updated according to the auxiliary device identifier, so that updated signature information is obtained; then step (103.2.3) "send signature information to server" may include: and sending the updated signature information to a server.
Specifically, when the device authority type of the local terminal is identified, a device authority inquiry request can be specifically sent to the server, so that the device authority type of the local terminal can be determined according to the device authority information fed back by the server; in addition, the device authority type of the local terminal can be determined through the device management information of the target application of the local terminal. When the device authority type of the local terminal is detected to be the main device authority, a preset auxiliary device authority list can be obtained through the device management information of the target application, and the auxiliary device identification in the auxiliary device authority list is added to the device authority information in the signature information, so that the authority relationship between the target auxiliary device identification and the signature information is established, the device authority relationship of corresponding logic data in the signature information is updated, and the signature information is updated; in addition, the data of the local target application and the target application of other equipment ends (auxiliary equipment) can be signed on the main equipment independently, so that the signature information of different terminal equipment is independent, the signature mode is consistent with the implementation process of the signature in the embodiment of the application, and the details are not repeated here. And finally, the updated signature information is sent to a server for verification, so that the signature authority of the service type data of the target account in the local terminal equipment and other equipment, namely the data signature authority, is registered after the verification is passed.
It should be noted that, the device management information may be updated at any time by the target application of the master device. Specifically, taking management of other device ends as an example, when a device management instruction of a device management interface of a target application of a target object in a main device is detected, device identification information (such as a device unique identifier, a device serial number and the like) selected/input by the target object is obtained, the obtained device identification information is added to a secondary device authority list, and the updated device identification in the secondary device authority list can be reported to a server in real time so as to update the device management information of the target account. In addition, the setting of the master device may be set or changed through an interface corresponding to the device management information, and specifically, the master device may be set or changed to the server by means of a verification code of a mobile phone number, other passwords, and the like.
Through the mode, the signature certificate stored in the local terminal in advance can be read, so that the service type data can be conveniently subjected to signature management and control according to the data signature authority in the signature certificate.
104. And signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information.
The target signature information may be signature data information, signature data value, etc. in the target logic data, and the format of the target signature information may be a unique character string or code in a specific format, and is specifically determined according to a signature element involved in the signature process, for example, the signature element is not limited to include an account key, a character string, a service type identifier (field value), an application identifier, etc., but is not limited to include an account key, a specific character string, a service type identifier (field value), an application identifier, terminal identifier information (such as a serial number), etc. For example, the format of the target signature information may be the format encrypted by the message digest algorithm (Message Digest Algorithm, MD5), which is merely an example, and may be specific to the actual situation.
The target logic data may be logic data of the service type data after the signature is successful, which may be understood as encrypted logic data. The target logic data comprises signed target signature information, and the target signature information is used for data verification at a server side; for example, taking MD5 value as the target signature information, the server may compare the target signature information (MD 5 value) with pre-archived signature data to complete verification.
In order to sign the service type data, after obtaining a signature certificate of a target account in a target application of a local terminal, the embodiment of the application can sign the service type data according to the data signature authority in the signature certificate so as to obtain target logic data carrying target signature information. Therefore, the signature authority of the service type data can be identified, the service type data with the signature authority is signed, the preliminary management of the service type data is realized, and the security of the service type data in the management process is ensured through the data signature.
In some embodiments, in order to determine whether the service type data to be managed has a signature authority, the authority relationship of the service type data to be managed may be determined according to the data signature authority in the signature certificate, for example, whether the data signature authority in the signature certificate includes an association relationship of the service type data, if the association relationship of the service type data is included, the service type data has the data signature authority, and if the service type data has the association relationship, the signature of the service type data may be completed. For example, the step of signing the service type data according to the data signing authority in the signing certificate to obtain the target logic data carrying the target signing information may include: determining a signature authority list according to the data signature authority in the signature certificate, wherein the signature authority list comprises an association relation between a preset service type and the signature authority; determining a target service type corresponding to the service type data, and matching the target service type in a signature authority list; and if the service type is matched with the preset service type corresponding to the target service type, signing the service type data according to the signature authority associated with the preset service type so as to obtain target logic data carrying target signature information.
Specifically, in the process of signing the service type data, firstly, it needs to determine whether the service type data to be signed (to be managed) has signature authority, for example, according to the data signature authority in the signature certificate, a preset service type with signature authority and a corresponding signature authority relationship are obtained, so that a corresponding signature authority list is established according to the preset service type and the corresponding authority relationship, and an association relationship is formed between the preset service type and the signature authority. Furthermore, the target service type of the service type data to be managed currently is determined, which may be specifically determined by the target field value in the embodiment of the present application, or may be determined according to a service function program corresponding to the service type data; and matching the determined target service type with the preset service type with the signature authority relationship in the signature authority list to find out whether the service type data to be managed is the preset service type with the signature authority. And finally, if the signature authority list contains the preset service type matched with the target service type, signing the service type data to be managed according to a pre-built data signing policy based on the signature authority associated with the preset service type to obtain target logic data carrying target signing information.
On the other hand, after the step of matching the target service type in the signature authority list, the method further includes: if the signature authority list is detected to contain the preset service type matched with the target service type, the signature of the service type data is stopped, and other data management strategies are executed later, such as no uploading of a server, deletion and the like.
By the method, the business type data with the authority relationship can be signed according to the data signing authority in the signing certificate, so that the target logic data with the target signing information is obtained, the target logic data can be managed conveniently later, the data can be prevented from being tampered in the management process, such as preventing the data from being tampered or invaded in the process of being transmitted to a server for storage, and the safety of the data is improved.
105. And uploading the target logic data to a server for storage.
In the embodiment of the application, after completing the signing process of the service type data, the method can further comprise the following steps: and determining a data processing strategy corresponding to the service type data based on the signature result, and processing the service type data according to the data processing strategy. Specifically, after the signing process of the service type data is completed, a corresponding data processing policy can be determined according to the signing condition (signing result) of the service type data, and the service type data is processed according to the data processing policy.
It should be noted that, when the embodiment of the present application manages service type data, two processing modes may be divided according to the data signature condition: 1. after the service type data is signed successfully, uploading the signed data to a server for storage; 2. when signing the business type data fails, the business type data is not uploaded to the server.
In the embodiment of the application, when the signature result is the target logic data containing the target signature information, determining a data processing strategy corresponding to the target logic data as a data uploading strategy; further, the target logical data including the target signature information is uploaded to the server according to the data uploading policy and stored.
In some embodiments, in order to ensure performance of network resources (such as bandwidth, signal strength, etc.), servers, local terminals, etc., and ensure stability in data transmission, when determining to upload target logic data, a current data upload request amount may be determined first, and whether to continue uploading target type data at present may be estimated according to the data upload request amount. For example, before "upload target logical data to server for storage" in step (105.2), it may further include: acquiring a data transmission queue corresponding to a target application in a local terminal; identifying the number of data tasks to be executed in a data transmission queue; the "upload target logical data to server for storage" in step (105.2) may include: if the number of the data tasks is identified to be smaller than the preset task number threshold, uploading the target logic data to a server for storage.
On the other hand, if the number of the data tasks is greater than or equal to the preset task number threshold, the current target time of the local terminal is identified, the target uploading time of the target logic data is determined according to the target time and the preset delay time value, and when the target time reaches the target uploading time, the target uploading task of the target logic data is established in the data transmission queue so as to upload the target logic data to the server for storage. In addition, the uploading time of the target logic data can be determined according to the condition of the occupied amount of the network resources, for example, the data uploading is carried out according to the time with lower bandwidth occupied amount, so that the data uploading is carried out when the network is idle, the stability of data transmission can be ensured, meanwhile, the phenomenon of network resource congestion is effectively avoided, and the reliability is realized.
In the embodiment of the application, after signing the service type data according to the data signing authority in the signing certificate, the method further comprises the following steps: if the preset service type corresponding to the target service type is not matched, stopping signing the service type data, and determining the service type data stopping signing as unsigned data; and intercepting unsigned data uploaded to the server, and deleting the intercepted unsigned data.
Specifically, when the signature result is the service type data which does not contain the target signature information, the failure of signing the service type data is indicated, namely, the target object does not set the signature authority of the service type data, namely, the target object does not have the storage requirement of the service type data. At this time, in order to avoid confusion between the service type data and the logic data of the target account in the server at the local terminal, the service type data may not be uploaded specifically when the service type data with failed signature is managed.
In an embodiment of the present application, the management process of the service logic data generated for the target application may include two parts. The method comprises the following steps: when detecting business logic data generated by a target application aiming at a target account, the first and the local terminals conduct classification processing and signature processing on the business logic data, and upload the business logic data with successful signature to a server for storage; therefore, the logic data of the service function program is managed according to the service function behavior habit and the data management willingness of the target object in the local terminal, and if the service data meeting the willingness of the target object is uploaded to the server for storage management. Secondly, the data application is not limited to follow-up application of target logic data after being uploaded to a server, and the data application comprises service function preference mining, feature mining, advertisement pushing, information recommendation, big data query, service recommendation and the like; for example, taking a service function in a target application as an example, a server side respectively establishes a corresponding database table for each terminal device (a main device and/or a secondary device), taking the main device as an example, and uploading any service logic data generated when the target application in the main device runs the related service function for a target account to the server after classification and signature of the main device, and storing the data in the database table after verification; all logic data stored in the database table can be used for the subsequent related application scenes, so that the use management of the uploaded logic data is realized. It should be noted that, the above data may be managed in terms of application by the logic data after the corresponding target account is authorized.
It should be noted that, the use management of the logic data in the server may be managed in combination with the data signing authority, and specifically, reference may be made to a signing example of the service logic data in the terminal in the embodiment of the present application, which is not repeated in the embodiment of the present application. In order to facilitate understanding of the management of logical data usage after uploading the server, embodiments of the present application will describe data usage management in the following manner.
In some embodiments, for the business function of the target object running through the target application of the local terminal, corresponding business logic data of the business function can be uploaded and managed for the authority of the target account on the target application of the local terminal, and related data stored by the server after being uploaded can be used for recommending the business of the target account in the target application of the local terminal. Then, after the step of uploading the target logic data to the server for storage, it may include: if a starting request of the target application is detected, starting the target application, and identifying the running process of the started target application; if the running process is identified to reach the preset running process time point, acquiring an attribution field value in the real-time business logic data corresponding to the running process, and requesting a server to acquire historical business logic data corresponding to the attribution field value; and if the service types between the historical service logic data and the real-time service logic data are detected to be consistent, merging the historical service logic data and the real-time service logic data, and displaying the merged target service logic data.
The preset running process time point is a running logic point preset by a pointer to the target application or the service function program in the target application, and can be used for reference and comparison of the running progress of the service function program, so that the target application runs to the preset running process time point later, and data use management is performed. For example, taking a video application as an example, the preset running process time point may be a logic time point of "the target object opens a service function of a video play record in the video application", or may be a logic time point of "the target object opens a service function of a video recommendation option in the video application", which is merely an example, and may be specifically set according to practical situations.
In this embodiment, when the local terminal detects that the target application of the local terminal is running and started, the running process of the target application may be detected in real time, and the current running condition of the target application is determined through the running process, for example, whether to start a related service function, a service logic point where a service function program of the target application is currently located, etc. are determined, so that the running process of the subsequent target application reaches a preset running process time point, and the management server requests stored logic data for the target account at the local terminal.
Specifically, after the target application is started, determining the current operation logic time point of the target application according to the operation process of the target application; if the current running logic time point reaches the preset running process time point, identifying whether the current process logic time point of the target application is at the preset logic time point or not; when the target application is at the preset logic time point, identifying the attribution field value of the real-time service logic data when the target application is at the time point, so as to acquire the historical service logic data of the same attribution field value which is requested to be stored by the target account at the local terminal from the server; and when the historical service logic number with the same attribution field value is received, selecting a target historical service logic number consistent with the service type between the real-time service logic data, combining the target historical service logic number with the real-time service logic data, and displaying the combined target service logic data. For example, taking a video application as an example, when a target object clicks a video recommendation function in the video application, a preset running process time point corresponding to the video recommendation function is reached, at this time, real-time service logic data selected by the target object in the video recommendation function of the target application is obtained, a attribution field value of the real-time service logic data is determined, a data source (such as a production company, a author, an editor or a copyright, etc.) of a corresponding recommended video is determined, further, historical service logic data corresponding to the same attribution field value is requested to a server, and target historical service logic data belonging to the video recommendation function with the real-time service logic data under the same attribution field value is selected, so that the video of a certain data source is displayed in video recommendation options after data combination is completed, and therefore, the recommendation range of the video of a certain data source is enlarged, the video recommendation strength is enlarged according to preference of the target object, and the experience of the target object is improved.
In some embodiments, in the process of implementing data usage management, service prompt can be further performed according to historical service logic data of the behavior habit of the target object in the target application. Then, after the step of uploading the target logic data to the server for storage, it may include: if the starting request of the target application is detected, a service prompt request carrying the target account is sent to the server, so that the server generates a service prompt tag according to the data uploading record of the target account on the local terminal; and if the service prompt tag returned by the server is received, starting the target application, and displaying the service prompt tag in the started target application interface.
Specifically, after a starting request of a target application is detected, determining the current target time, and sending a service prompt request to a server; and the server searches historical service logic data which is at the same time as the target time from the data uploading record of the target account through the local terminal, and determines the historical service logic data at the same time as logic data to be pushed so as to return the logic data to be pushed to the local terminal. And the local terminal receives logic data to be pushed returned by the server and displays a service prompt tag corresponding to the logic data to be pushed in a target application interface after the target application is started. For example, taking a live video application as an example, when the local terminal identifies that a target object opens the live video application, determining that the current target time is 20:00, if the target object is used to watch a live ball game at the same time (20:00) in the historical time of the live video application, and storing historical service logic data corresponding to the live ball game by a server; and then requesting historical service logic data corresponding to the live ball game at the moment from a server to serve as logic data to be pushed of the live video application, and further displaying a service prompt tag corresponding to the logic data to be pushed on an interface (such as an application front page or any window interface) of the live video application according to the logic data to be pushed after the live video application is started.
In the embodiment of the application, on one hand, aiming at the business logic data generated by the target account in the target application, the business logic data can be firstly classified to obtain the business type data so as to determine the business type corresponding to the business logic data; further, reading a signature certificate stored in a local terminal (or a target application), determining a service type with signature authority according to a data signature authority pre-registered by a target object in the signature certificate, signing the service type data with the signature authority to obtain target logic data after successful signature, and uploading the target type data to a server for verification, namely storage; therefore, the uploading process of the target logic data is managed, meanwhile, the data can be prevented from being tampered in a signature mode, and the safety of the data is improved. In addition, the management operations such as deleting, modifying and the like can be performed on the business type data with failed signature, so that the data management requirement of the target object is met, and the experience of the target object is improved. On the other hand, the historical business logic data stored in the server can be managed in terms of data application, and the historical business logic data is the data stored after being signed according to the data signing authority registered by the target object, so that the method accords with the intention of the target object, and can search from the historical business logic data stored by the intention of the target object when the application scene of the related data requests the application of the related historical business logic data, has targeting, can improve the efficiency of searching the business logic data required by the application scene, and improves the experience of the target object.
As can be seen from the above, the embodiment of the present application can obtain the service logic data of the target account in the target application; classifying the service logic data to obtain classified service type data; reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority to the server, and the signature certificate contains the data signature authority of the target account at the local terminal; signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information; and uploading the target logic data to a server for storage. Therefore, the scheme can acquire the service logic data generated by the target application in operation and classify the service logic data to determine the service type of the service logic data; and then, the classified service type data is signed according to the data signing authority in the signing certificate of the target account, so that the processing strategy of the service type data is determined according to the signing condition, for example, the data uploading is executed after the signing is successful, and the safety and the efficiency of the data processing are improved. Therefore, the business data can be processed according to the wish of the target object so as to pertinently manage the data generated by the application program, so that the application business data used subsequently accords with the requirement of the target object, and the user experience is improved.
According to the method described in the above embodiments, examples are described in further detail below.
The embodiment of the application takes data processing as an example, and the data processing method provided by the embodiment of the application is further described.
Fig. 3 is a flow chart of another step of the data processing method according to the embodiment of the present application, fig. 4 is a multi-terminal interface diagram of the data processing method according to the embodiment of the present application, fig. 5 is an interface diagram of device information management in the data processing method according to the application embodiment, fig. 6 is a schematic view of a scenario of registering a data signature authority in the data processing method according to the application embodiment, and fig. 7 is a block flow chart of the data processing method according to the embodiment of the present application. For ease of understanding, embodiments of the present application are described in connection with FIGS. 3-7.
In the embodiments of the present application, description will be made from the point of view of a data processing apparatus, which may be integrated in a computer device such as a terminal and a server in particular. For example, when the processor on the computer device executes a program corresponding to the data processing method, the specific flow of the data processing method is as follows:
201. the terminal identifies a target account logged in the target application and sends a data signature authority registration request for the target account to the server.
In the embodiment of the application, when the terminal detects the data signature authority registration instruction in the target application, the terminal identifies the target account logged in the target application, generates a data signature authority registration request of the target account and sends the data signature authority registration request to the server.
202. And the server returns the acquired data signature strategy to the terminal based on the data signature authority registration request.
The data signature policy may be a data authentication rule, which may include a verification rule of an information authentication process, an authentication rule of a data authentication process, and the like; for example, the data signing policy includes a signing rule of the data signing authority registration process, where the signing rule may define a signing format, a signing element, a signing parameter, etc., and may be used to guide the data signing authority registration process and the normalization of the registration process.
203. The terminal acquires historical service logic data selected for a target account in a target application, signs the historical service logic data according to a data signing policy, and sends the obtained historical signature information to a server.
The historical business logic data can be logic data when the target account runs the related business function program of the target application at the historical moment, the logic data belongs to object data in nature, and the logic data can influence the calling and executing instructions of the related functions in the running process of the business function program.
The historical signature information can be data information containing signature data and is used for verifying the signature logic data by a server; for example, the historical signature information may be data information in MD5 value format.
In the embodiment of the application, when signature information is acquired, firstly, historical business logic data selected by a target object for one or more business function programs in a target application, for example, logic data corresponding to a historical play record in a video play record (business function program) of a video application and/or logic data of other business function programs are identified; after the selected historical business logic data is identified, the historical business logic data selected for the target account in the target application can be obtained. Furthermore, the service type of the historical service logic data can be determined according to the service type management rule provided by the target application background, for example, the target application background sets corresponding data field values in advance when managing each service function program, and the service type of the historical service logic data can be determined through the data field values; and then, after the service type of the historical service logic data is determined, signing the logic data of the service type according to a data signing policy to obtain the historical signature information corresponding to the historical service logic data.
It should be noted that, in order to implement data management of the target application of the target account in other device ends, the target account manager may set, through the master device, signature authority of the target application related logic data of the target account in other device ends; the master device is usually a personal terminal device of a manager, and can set the master device to the server through a personal information authentication mode, such as setting the master device and the modification of the master device through a verification code of a mobile phone number, other passwords and the like. Specifically, when the device authority type of the local terminal is identified, a device authority inquiry request can be specifically sent to the server, so that the device authority type of the local terminal can be determined according to the device authority information fed back by the server; in addition, the device authority type of the local terminal can be determined through the device management information of the target application of the local terminal. When the device authority type of the local terminal is detected to be the main device authority, a preset auxiliary device authority list can be obtained through the device management information of the target application, and the auxiliary device identification in the auxiliary device authority list is added to the device authority information in the signature information, so that the authority relationship between the target auxiliary device identification and the signature information is established, the device authority relationship of corresponding logic data in the signature information is updated, and the signature information is updated; in addition, the data of the local target application and the target application of other equipment ends (auxiliary equipment) can be signed on the main equipment independently, so that the signature information of different terminal equipment is independent, the signature mode is consistent with the implementation process of the signature in the embodiment of the application, and the details are not repeated here. And finally, the updated signature information is sent to a server for verification.
Further, the history signature information is transmitted to the server so that the data signature authority of the target account is registered according to the history signature information.
204. The server registers the data signing authority of the target account according to the historical signing information, and returns the signing certificate to the terminal for storage after applying for the signing certificate corresponding to the data signing authority.
When registering the data signature authority of the target account, the server can register the data signature authority of the target application of the target account on one or more terminals at the same time; it should be noted that, the same target account may have different corresponding data signature authorities in different terminal devices.
Specifically, the registration process of the data signature authority may be: the server verifies the historical signature information, and registers the data signature authority of the target account at one or more terminal devices after the verification is passed; meanwhile, the server can use the history signature information after verification as the archiving data of the server for later verification of the logic data after signature. In addition, the server applies for the signature certificate of the target account at the terminal according to the history signature information after verification, and returns the applied signature certificate to the terminal for storage.
205. And the terminal acquires the service logic data of the target account in the target application when identifying the current service operation logic time point of the target application and detecting that the service operation logic time point reaches the preset data uploading time point.
The service operation logic time point may be a logic progress time point of the local terminal when the related service function program is operated, which may reflect an operation progress of the service function. For example, taking a music application as an example, the target object can generate service operation logic of a play service function of the music application by pre-establishing a music play list to be played and setting an automatic play time and a stop play time, a pause play mode and the like of the music play list, such as "identify time-to-time play (automatic play time) -other scenes pause play and resume play (pause play mode) -stop play (stop play time)", and can be regarded as a service operation logic time point from the above; the above is merely an example, and the embodiment of the present application does not limit the service operation logic time point.
The preset data uploading time point may be a logic time point when the service logic data is uploaded to the server for storage, and the uploading time of the service logic data can be limited by the preset data uploading logic time point.
Specifically, the current operation service function program in the target application is identified, and the service operation process corresponding to the service function program is searched, for example, the corresponding service operation process in the target application is searched according to the identification of the service function program; further, determining a service operation logic time point of the target application (specifically, a service function program) according to the service operation process; further, comparing the determined service operation logic time point with a preset data uploading time point, and acquiring service logic data aiming at a target account in the target application when the service operation logic time point is detected to reach (accord with) the preset data uploading time point, wherein the service logic data can be specifically the service logic data of the target account when the target service function program is operated. Therefore, the running progress of the currently running service function program in the target application can be known, and the service logic data can be obtained when the service running progress reaches a preset time point, so that the obtained data can be managed later.
206. The terminal classifies the service logic data to obtain classified service type data.
The service type data refers to the returned service logic data. Specifically, the target application may include a plurality of service function programs or a plurality of service type programs, where each service function program or service type program corresponds to one service type, that is, service logic data between different service type programs is different.
Specifically, in order to classify service logic data, after the service logic data is obtained, abstract class data corresponding to the service logic data can be created for marking relevant numerical values in the service logic data in the follow-up process; further, the target field required by the service logic data is selected from the created abstract class data, and specifically may be a value for identifying the service type in the service logic data, for example, the service type value in the service logic data is identified according to a preset service type value format, and the target field corresponding to the service type value is extracted from the abstract class data; therefore, the target field is assigned according to the related value (such as the value of the service type) in the service logic data so as to rewrite the type field and obtain the target field value corresponding to the service logic data; and finally, classifying the service logic data based on the target field value of the service type of the service logic data, for example, searching a preset service type value list according to the field value (target field value) of the service type to determine the target service type corresponding to the target field value, thereby classifying the service logic data according to the target service type to obtain classified service type data.
207. And the terminal reads the signature certificate of the target account, signs the service type data according to the data signature authority in the signature certificate, and obtains a signature result.
The signature certificate is obtained after the local terminal registers the data signature authority with the server, and the signature certificate contains the data signature authority of the target account at the local terminal, specifically, the signature authority of all or part of business logic data, which is used for limiting the business type and the signature process of the signable logic data.
In the embodiment of the application, in the process of signing the service type data, firstly, whether the service type data to be signed (to be managed) has signature authority is required to be determined, for example, a preset service type with the signature authority and a corresponding signature authority relationship are acquired according to the data signature authority in a signature certificate, so that a corresponding signature authority list is established according to the preset service type and the corresponding authority relationship, and the association relationship between the preset service type and the signature authority is realized. Furthermore, the target service type of the service type data to be managed currently is determined, which may be specifically determined by the target field value in the embodiment of the present application, or may be determined according to a service function program corresponding to the service type data; and matching the determined target service type with the preset service type with the signature authority relationship in the signature authority list to find out whether the service type data to be managed is the preset service type with the signature authority. Therefore, when searching whether the service type data to be managed has the signature right, the embodiment of the application can comprise two aspects, namely the following specific conditions:
On the one hand, if the preset service type corresponding to the target service type is matched, the service type data to be managed is signed according to a pre-built data signing policy according to signing authority associated with the preset service type. After successful signing of the service type data, the signature result contains the target logical data with the target signature information, steps 208-209 are performed.
On the other hand, if the preset service type corresponding to the target service type is not matched, the signature of the service type data is stopped, and the service type data of which the signature is stopped is determined to be unsigned service logic data. At this time, the signature of the service logic data is not completed, and if the signature result is the unsigned service type data, step 210 is executed.
208. If the signature result is detected to be the target logic data carrying the target signature information, uploading the target logic data to a server for verification.
In the embodiment of the application, when the signature result is the target logic data containing the target signature information, determining a data processing strategy corresponding to the target logic data as a data uploading strategy; further, according to the data uploading policy, the target logic data containing the target signature information is uploaded to the server for verification.
209. And the server verifies the target logic data according to the historical signature information and stores the target logic data passing the verification.
Specifically, the server acquires a historical signature information set associated with the target account, and selects historical signature information corresponding to the service type of the target logic data from the historical signature information; and extracting target signature information in the target logic data, and comparing the target signature information according to the historical signature information to realize information verification, thereby completing verification of the target logic data. Further, the server stores the target logic data that passes the verification, specifically, may be a database table corresponding to the local terminal.
The server side establishes a corresponding database table for each terminal device (primary device and/or secondary device).
210. If the signing result is detected to be the unsigned business type data, the uploading of the unsigned business type data to the server is intercepted, and the intercepted unsigned data is deleted.
The unsigned service type data is logic data without target signature information, and indicates that the target account does not have signature authority for the logic data and authority stored in a server in a target application of the terminal.
Specifically, when the signature result is the service type data which does not contain the target signature information, the failure of signing the service type data is indicated, namely, the target object does not set the signature authority of the service type data, namely, the target object does not have the storage requirement of the service type data. At this time, in order to avoid confusion between the service type data and the logic data of the target account in the server at the local terminal, the service type data may not be uploaded specifically when the service type data with failed signature is managed.
For the convenience of understanding the embodiments of the present application, the embodiments of the present application will be described with specific application scenario examples. Specifically, the application scenario example is described by performing the above steps 201-210, and by referring to fig. 4, 5, 6 and 7.
Examples of application scenarios in embodiments of the present application are not limited to include map applications, video applications, music applications, media live applications, information applications, and the like. The embodiment of the application takes the video application as an application scene example, and the video application scene example can relate to a plurality of video service functions, such as video service functions including video play records, video collection, play lists, behavior logs and the like, and the data corresponding to the video service functions becomes core data (coreData data, namely service logic data). For ease of understanding, the following description will be made with the video service function of video play recording as an example in the video application scenario example.
The video play record example may include a case where one application account is used at multiple ends, for example, a case where one application account is used at different clients under the same terminal device, and a case where the same application account is used at each client under different terminal devices.
Referring to fig. 4, a schematic diagram of a product interface for multi-end use of an account in the video playing record example includes an interface of a video application a, an interface of a video application B, and an interface of a PC client C (e.g., a computer client and/or a web page); the interface diagram of the video application a and the interface diagram of the video application B are combined to show that the same account pulls the same play record in different application programs, and the interface diagram of the video application (a or B) and the interface diagram of the PC client C are combined to show that the same account pulls the same play record in different terminals (including the mobile terminal and/or the PC client). As can be seen from the above description, the play records and the merge of the same account in multiple terminal uses, but if there are multiple target objects in one account, the data management confusion occurs, resulting in the merge of the play records between the multiple target objects in the same account, which is not beneficial to the data processing management and the subsequent data application management of each target object. Therefore, in order to avoid this phenomenon, the present video application scenario example manages core data (coreData data, i.e., service logic data) by collecting terminal device information through data signature authority.
Referring to fig. 5, an interface schematic diagram of device information management in the data processing method is shown, a setting page in each video application program has a "device management" option, and authority and login records of a target account in each terminal device can be checked and set through an interface corresponding to the "device management" option, for example, interrupt device information and time of the logged account can be seen at the device management interface. It should be noted that, a terminal device may be set as a master device for each application account (the determination rule of the master device is that the target object passes through the mobile phone verification code), and the master device may add, limit, delete, and blacken other terminal devices; in addition, the master device can apply for the data signature authority of the local terminal and the data signature authority of other terminal devices, and is respectively used for limiting operations of writing cache, reporting, merging and the like to the local terminal and the other terminal devices when coreData is generated.
In the video application scene example, a data signature authority registration process and a data processing process are included.
1. Before the core data (coreData data, i.e. service logic data) is processed, the data signature authority of the application account on the main terminal device and other terminal devices needs to be registered, wherein the data signature authority registration can be obtained through online quick identity authentication (Fast Identity Online, FIDO) on the main terminal device. The registration process of the data signature authority is described as follows:
Referring to fig. 6, a scenario of registering a data signature authority includes a terminal device and a server. The terminal equipment (which is a master equipment) is not limited to the video application program, the FIDO client and the coreData data end; the server side is not limited to including video application background services, FIDO authentication services, signature verification services (encryption verification), certificate services (China Financial Certification Authority, CFCA/cache). It should be noted that, the FIDO client interacts with the video application program in an interface manner, and the FIDO authentication service interacts with the video application program background service in an interface manner, so that the terminal device accesses the FIDO client and the FIDO authentication service when the video application program interacts with the video application program background service. The registration process of the data signature authority comprises the following steps: 1. the video application program of the terminal equipment calls an initialization register and sends a register service request to a video application program background service in a server; 2. the video application program background service calls an interface to access the FIDO authentication service; 3. the FIDO authentication service returns a data signature strategy to the video application background service through the interface; 4. the video application program background service generates a data signature authority registration request according to the data signature strategy so as to request the terminal equipment to execute related matters for registering the data signature authority; 5. the video application program calls an interface and sends the data signature strategy to the FIDO client; 6. when the FIDO client identifies that the coreData data end generates service logic data, an account key is generated and signed according to a data signing policy, and in addition, the FIDO client can also sign data by combining the equipment key; 7. the FIDO client returns signature information to the video application; 8. the video application program sends signature information to video application program background service in the server side to request to complete registration of the data signature authority; 9. the video application program background service call interface sends signature information to the FIDO authentication service; 10. the FIDO authentication service requests the signature verification service for verification of the signature information, such as by encryption contrast verification; 11. the signature verification service returns a verification result to the FIDO authentication service; 12. after the FIDO authentication service identifies that the verification structure passes the verification, applying for a signature certificate corresponding to the signature information passing the verification from the certificate service; 13. the FIDO authentication service call interface returns the signature certificate to the video application program background service; 14. the video application program background service returns the signature certificate to the terminal equipment, so that the terminal equipment stores the signature certificate to a storage space associated with the application account, and the registration of the data signature authority is completed.
2. And carrying out data processing on the business logic data, wherein the data processing process comprises the following steps:
1. the terminal equipment detects coreData of an application account in the video application program in real time, and acquires the coreData when the coreData is detected.
2. Creating abstract class data (baseData) of coreData, wherein the abstract class data provides a plurality of fields, such as a service type field (type), a attribution field (business), a remote service field (aid) and the like, the coreData inherits the fields in the abstract class data, and rewrites the service type field (type) to endow the coreData with a service type field value corresponding to the coreData, and further classifying the coreData according to the service type field value. For example, in the video-based application program, the VIP function of the account includes a common VIP (watching a common video), a sports member (watching a sports live event), a diamond member (watching an advanced video on demand function), and a screen throwing member (having functions of watching a television, throwing a screen, etc.), where these functions may be uniformly divided into VIP types; and for knowledge payment members after business development (pay by watching certain knowledge-related courses), plumb line functions (functions of watching cartoon, live game, cartoon, novel and the like), the type field can be rewritten after inheriting the baseData and then uniformly represented by using the vipType field.
3. Management (uploading, downloading) of the classified coreData data may be performed after the FIDO authentication. The management of coreData mainly relates to a server and a terminal device (including a main device and other devices), and the description of the server and the terminal device can be combined with fig. 7, which is specifically as follows:
A. the server side performs a basic storage function and an open adding, deleting and checking interface on coreData so that each equipment terminal can call the interface; the server establishes a table device ID database table of each terminal device by taking aid as a table name, so as to be used for storing coreData after signature verification, and the coreData is generated by an application account for a video application program at the terminal device and is uploaded to the server after being signed; each terminal device is connected with the database table corresponding to the server by using the account identifier so as to inquire the required coreData.
B. The master device can manage the functions of uploading, downloading, synchronizing and merging data of other devices, and has the authority of deleting and adding the other devices. Binding of the master device can be performed on a device management page of the video application program, and the binding is used for controlling other devices to read the authority of a designated service type field (such as a vipTYPE); when the vipType is a specific value, the modification or deletion of coreData data is allowed, for example, in the play records, when the vipType type is a live broadcast category, the play records of the live broadcast category can be deleted, so as to avoid confusion in the data management of the subsequent server.
The data uploading example specifically includes: after the video application program generates the historical coreData of the application account, the target object can perform preset time embedding on the coreData through the video application program. In practical application, when the service function program of video playing is operated to the moment, for example, after the service function of video playing is operated to image, the video application program is switched to the background, and the operation of switching to the background is regarded as the preset moment; therefore, the terminal equipment calls the coreData to sign after classifying the signature certificate degree issued by the server; and further, calling the adding, deleting and checking interface of the server to upload coreData data to the server. It should be noted that, a fusing mechanism may be set for the data uploading process, and when the uploaded network request reaches a certain threshold, the next uploading operation is fused.
The data downlink process specifically comprises the following steps: after the video application program of the main device/other devices reaches the similar point burying time, the interface request of the server side can be called to carry out the downlink operation on the logic data, so that the server side can inquire the related data set according to the identification field business related to the coreData carried in the request to determine the required coreData, and the required coreData is issued. Further, after receiving the downstream coreData, the video application program determines whether the coreData has a merge (merge) operation; if so, providing an anonymous function to the outside, giving the merging process to an external caller, receiving the result after merging, and displaying the merged data on a video application program interface.
Through the above application scenario example, the following effects can be achieved: the method is suitable for the situation of multi-terminal use of an application account, and can normalize and process data according to target object appeal, current privacy policy and legal regulations in the data management process, so that the data can be managed in a targeted manner, and the managed data can be used conveniently subsequently; in addition, the logic data is packaged based on the FIDO authentication, so that the safety of the logic data in the management process is improved, and the phenomena of packet grabbing, leakage and the like of the privacy data are prevented.
As can be seen from the above, the embodiment of the present application can obtain service logic data generated by the target application during operation, and classify the service logic data to determine the service type of the service logic data; and then, the classified service type data is signed according to the data signing authority in the signing certificate of the target account, so that the processing strategy of the service type data is determined according to the signing condition, for example, the data uploading is executed after the signing is successful, and the safety and the efficiency of the data processing are improved. Therefore, the business data can be processed according to the wish of the target object so as to pertinently manage the data generated by the application program, so that the application business data used subsequently accords with the requirement of the target object, and the user experience is improved.
In order to better implement the method, the embodiment of the application also provides a data processing device. For example, as shown in fig. 8, the data processing apparatus may include an acquisition unit 401, a classification unit 402, a reading unit 403, a signature unit 404, and a processing unit 405.
An obtaining unit 401, configured to obtain service logic data of a target account in a target application;
the classifying unit 402 is configured to perform classifying processing on the service logic data to obtain service type data after the classifying processing;
the reading unit 403 is configured to read a signature certificate of the target account, where the signature certificate is obtained after the local terminal registers a data signature authority with the server, and the signature certificate includes the data signature authority of the target account in the local terminal;
a signature unit 404, configured to sign the service type data according to the data signing authority in the signing certificate, so as to obtain target logic data carrying target signing information;
and the processing unit 405 is used for uploading the target logic data to the server for storage.
In some embodiments, the classifying unit 402 is further configured to: creating abstract data corresponding to business logic data; extracting a target field corresponding to the business logic data from the abstract data, and assigning a value to the target field according to the business logic data to obtain a target field value; and classifying the service logic data according to the target field value to obtain classified service type data.
In some implementations, the signature unit 404 is further configured to: determining a signature authority list according to the data signature authority in the signature certificate, wherein the signature authority list comprises an association relation between a preset service type and the signature authority; determining a target service type corresponding to the service type data, and matching the target service type in a signature authority list; and if the service type is matched with the preset service type corresponding to the target service type, signing the service type data according to the signature authority associated with the preset service type to obtain target logic data carrying target signature information.
In some implementations, the signature unit 404 is further configured to: if the preset service type corresponding to the target service type is not matched, stopping signing the service type data, and determining the service type data stopping signing as unsigned data;
the processing unit 405 is further configured to intercept unsigned data uploaded to the server, and delete the intercepted unsigned data.
In some embodiments, the data processing apparatus further comprises a registration unit, in particular for: identifying a target account registered in the target application; requesting a server to register a data signature authority corresponding to a target account; and if the signature certificate corresponding to the data signature authority is received and returned by the server, storing the signature certificate into a storage space associated with the target account in the local terminal.
In some embodiments, the registration unit is further configured to: requesting a server to acquire a data signature strategy; acquiring historical service logic data selected for a target account in a target application, and signing the historical service logic data according to a data signing policy to obtain signature information; and sending signature information to the server, so that the server registers the data signature authority of the target account according to the signature information.
In some embodiments, the registration unit is further configured to: generating an account key corresponding to the target account according to the data signature strategy; and signing the historical service logic data according to the account key to obtain signature information.
In some embodiments, the data processing apparatus further comprises an updating unit, in particular for: identifying the equipment authority type of the local terminal; if the device authority type of the local terminal is detected to be the main device authority, a preset auxiliary device authority list is obtained, and when the auxiliary device authority list is identified to contain an auxiliary device identifier, the authority relation of signature information is updated according to the auxiliary device identifier, so that updated signature information is obtained;
the registration unit is further configured to send updated signature information to the server.
In some embodiments, the data processing apparatus further comprises an identification unit, in particular for: acquiring a data transmission queue corresponding to a target application in a local terminal; identifying the number of data tasks to be executed in a data transmission queue;
the processing unit 405 is further configured to upload the target logic data to the server for storage if the number of data tasks is identified to be less than the preset task number threshold.
In some embodiments, the data processing apparatus further comprises a detection unit, in particular for: detecting a business operation process of a target application; determining the current service operation logic time point of the target application according to the service operation process;
the obtaining unit 401 is configured to obtain service logic data of a target account in the target application if the service operation logic time point is detected to reach a preset data uploading time point.
In some embodiments, the data processing apparatus further comprises a data merging unit, specifically configured to:
if a starting request of the target application is detected, starting the target application, and identifying the running process of the started target application; if the running process is identified to reach the preset running process time point, acquiring an attribution field value in the real-time business logic data corresponding to the running process, and requesting a server to acquire historical business logic data corresponding to the attribution field value; and if the service types between the historical service logic data and the real-time service logic data are detected to be consistent, merging the historical service logic data and the real-time service logic data, and displaying the merged target service logic data.
In some embodiments, the data processing apparatus further includes a pushing unit, specifically configured to:
if a starting request of a target application is detected, a service prompt request carrying a target account is sent to a server, so that the server determines logic data to be pushed based on data uploading record of a local terminal aiming at the target account; and if logic data to be pushed returned by the server is received, starting the target application, and displaying a service prompt tag corresponding to the logic data to be pushed in a target application interface after starting.
From the above, the embodiment of the present application may acquire the service logic data of the target account in the target application through the acquiring unit 401; classifying the service logic data through the classifying unit 402 to obtain classified service type data; reading a signature certificate of the target account through a reading unit 403, wherein the signature certificate is obtained after the local terminal registers data signature authority with the server, and the signature certificate contains the data signature authority of the target account in the local terminal; signing the business type data through a signature unit 404 according to the data signature authority in the signature certificate to obtain target logic data carrying target signature information; the target logical data is uploaded to the server for storage by the processing unit 405. Therefore, the scheme can acquire the service logic data generated by the target application in operation and classify the service logic data to determine the service type of the service logic data; and then, the classified service type data is signed according to the data signing authority in the signing certificate of the target account, so that the processing strategy of the service type data is determined according to the signing condition, for example, the data uploading is executed after the signing is successful, and the safety and the efficiency of the data processing are improved. Therefore, the business data can be processed according to the wish of the target object so as to pertinently manage the data generated by the application program, so that the application business data used subsequently accords with the requirement of the target object, and the user experience is improved.
The embodiment of the application also provides a computer device, as shown in fig. 9, which shows a schematic structural diagram of the computer device according to the embodiment of the application, specifically:
the computer device may include one or more processing cores 'processors 501, one or more computer-readable storage media's memory 502, a power supply 503, and an input unit 504, among other components. Those skilled in the art will appreciate that the computer device structure shown in FIG. 9 is not limiting of the computer device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. Wherein:
the processor 501 is the control center of the computer device, and uses various interfaces and lines to connect the various parts of the overall computer device, perform various functions of the computer device and process data by running or executing software programs and/or modules stored in the memory 502, and invoking data stored in the memory 502. Optionally, processor 501 may include one or more processing cores; preferably, the processor 501 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 501.
The memory 502 may be used to store software programs and modules, and the processor 501 executes various functional applications and data processing by executing the software programs and modules stored in the memory 502. The memory 502 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data created according to the use of the computer device, etc. In addition, memory 502 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 502 may also include a memory controller to provide access to the memory 502 by the processor 501.
The computer device further includes a power supply 503 for powering the various components, and preferably the power supply 503 may be logically coupled to the processor 501 via a power management system such that functions such as charge, discharge, and power consumption management are performed by the power management system. The power supply 503 may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The computer device may also include an input unit 504, which input unit 504 may be used to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the computer device may further include a display unit or the like, which is not described herein. In particular, in the embodiment of the present application, the processor 501 in the computer device loads executable files corresponding to the processes of one or more application programs into the memory 502 according to the following instructions, and the processor 501 executes the application programs stored in the memory 502, so as to implement various functions, as follows:
acquiring business logic data of a target account in a target application; classifying the service logic data to obtain classified service type data; reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority to the server, and the signature certificate contains the data signature authority of the target account at the local terminal; signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information; and uploading the target logic data to a server for storage.
The specific implementation of each operation may be referred to the previous embodiments, and will not be described herein.
Therefore, the scheme can acquire the service logic data generated by the target application in operation and classify the service logic data to determine the service type of the service logic data; and then, the classified service type data is signed according to the data signing authority in the signing certificate of the target account, so that the processing strategy of the service type data is determined according to the signing condition, for example, the data uploading is executed after the signing is successful, and the safety and the efficiency of the data processing are improved. Therefore, the business data can be processed according to the wish of the target object so as to pertinently manage the data generated by the application program, so that the application business data used subsequently accords with the requirement of the target object, and the user experience is improved.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present application provides a computer readable storage medium having stored therein a plurality of instructions capable of being loaded by a processor to perform the steps of any of the data processing methods provided by the embodiments of the present application. For example, the instructions may perform the steps of:
acquiring business logic data of a target account in a target application; classifying the service logic data to obtain classified service type data; reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority to the server, and the signature certificate contains the data signature authority of the target account at the local terminal; signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information; and uploading the target logic data to a server for storage.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the computer-readable storage medium may comprise: read Only Memory (ROM), random access Memory (RAM, random Access Memory), magnetic or optical disk, and the like.
Because the instructions stored in the computer readable storage medium may execute the steps in any data processing method provided by the embodiments of the present application, the beneficial effects that any data processing method provided by the embodiments of the present application can be achieved, which are detailed in the previous embodiments and are not described herein.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the methods provided in the various alternative implementations provided in the above embodiments.
The foregoing has described in detail a data processing method, apparatus and computer readable storage medium according to embodiments of the present application, and specific examples have been provided herein to illustrate the principles and embodiments of the present application, and the above description of the embodiments is only for aiding in the understanding of the method and core idea of the present application; meanwhile, as those skilled in the art will vary in the specific embodiments and application scope according to the ideas of the present application, the present description should not be construed as limiting the present application in summary.

Claims (14)

1. A method of data processing, comprising:
acquiring business logic data of a target account in a target application;
classifying the service logic data to obtain classified service type data;
reading a signature certificate of the target account, wherein the signature certificate is obtained after a local terminal registers data signature authority to a server, and the signature certificate contains the data signature authority of the target account at the local terminal;
signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information;
and uploading the target logic data to the server for storage.
2. The method of claim 1, wherein the classifying the service logic data to obtain classified service type data comprises:
creating abstract data corresponding to the business logic data;
extracting a target field corresponding to the business logic data from the abstract data, and assigning a value to the target field according to the business logic data to obtain a target field value;
And classifying the service logic data according to the target field value to obtain classified service type data.
3. The method according to claim 1, wherein signing the service type data according to the data signing authority in the signing certificate obtains target logic data carrying target signing information, and the method comprises:
determining a signature authority list according to the data signature authority in the signature certificate, wherein the signature authority list comprises an association relationship between a preset service type and the signature authority;
determining a target service type corresponding to the service type data, and matching the target service type in the signature authority list;
and if the service type is matched with the preset service type corresponding to the target service type, signing the service type data according to the signature authority associated with the preset service type to obtain target logic data carrying target signature information.
4. The method of claim 3, wherein said matching said target traffic type in said signature authority list further comprises:
if the service type is not matched with the preset service type corresponding to the target service type, stopping signing the service type data, and determining the service type data stopping signing as unsigned data;
Intercepting the unsigned data uploaded to the server, and deleting the intercepted unsigned data.
5. The method of claim 1, wherein prior to reading the signed certificate of the target account, further comprising:
identifying a target account registered in the target application;
requesting the server to register the data signature authority corresponding to the target account;
and if the signature certificate corresponding to the data signature authority is received and returned by the server, storing the signature certificate into a storage space associated with the target account in the local terminal.
6. The method of claim 5, wherein requesting registration of the data signature authority corresponding to the target account from the server comprises:
requesting to acquire a data signature strategy from the server;
acquiring historical business logic data selected for the target account in the target application, and signing the historical business logic data according to the data signing policy to obtain signature information;
and sending the signature information to the server, so that the server registers the data signature authority of the target account according to the signature information.
7. The method of claim 6, wherein signing the historical business logic data according to the data signing policy results in signature information, comprising:
generating an account key corresponding to the target account according to the data signature strategy;
and signing the historical business logic data according to the account key to obtain signature information.
8. The method of claim 6, wherein the signing the historical business logic data according to the data signing policy further comprises, after obtaining signature information:
identifying the device authority type of the local terminal;
if the device authority type of the local terminal is detected to be the main device authority, a preset auxiliary device authority list is obtained, and when the auxiliary device authority list is identified to contain an auxiliary device identifier, the authority relation of the signature information is updated according to the auxiliary device identifier, so that updated signature information is obtained;
said sending said signature information to said server comprises: and sending the updated signature information to the server.
9. The method of claim 1, wherein the uploading the target logical data to the server for storage further comprises:
Acquiring a data transmission queue corresponding to the target application in the local terminal;
identifying the number of data tasks to be executed in the data transmission queue;
the uploading the target logic data to the server for storage includes:
and if the number of the data tasks is identified to be smaller than a preset task number threshold, uploading the target logic data to the server for storage.
10. The method of claim 1, wherein prior to obtaining business logic data of a target account in the target application, further comprising:
detecting a business operation process of the target application;
determining the current service operation logic time point of the target application according to the service operation process;
the obtaining the business logic data of the target account in the target application includes:
and if the service operation logic time point is detected to reach the preset data uploading time point, acquiring service logic data of a target account in the target application.
11. The method of claim 1, wherein after uploading the target logical data to the server for storage, further comprising:
if the starting request of the target application is detected, starting the target application, and identifying the running process of the started target application;
If the running process is identified to reach the preset running process time point, acquiring an attribution field value in real-time business logic data corresponding to the running process, and requesting the server to acquire historical business logic data corresponding to the attribution field value;
and if the service types between the historical service logic data and the real-time service logic data are detected to be consistent, merging the historical service logic data and the real-time service logic data, and displaying the merged target service logic data.
12. The method of claim 1, wherein after uploading the target logical data to the server for storage, further comprising:
if the starting request of the target application is detected, a service prompt request carrying the target account is sent to the server, so that the server determines logic data to be pushed based on the data uploading record of the local terminal aiming at the target account;
and if logic data to be pushed returned by the server is received, starting the target application, and displaying a service prompt tag corresponding to the logic data to be pushed in a target application interface after starting.
13. A data processing apparatus, comprising:
the acquisition unit is used for acquiring service logic data of a target account in the target application;
the classification unit is used for classifying the service logic data to obtain classified service type data;
the reading unit is used for reading a signature certificate of the target account, wherein the signature certificate is obtained after the local terminal registers data signature authority with the server, and the signature certificate contains the data signature authority of the target account at the local terminal;
the signature unit is used for signing the business type data according to the data signing authority in the signing certificate to obtain target logic data carrying target signing information;
and the processing unit is used for uploading the target logic data to the server for storage.
14. A computer readable storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor for performing the steps in the data processing method according to any of claims 1 to 12.
CN202210541642.7A 2022-05-17 2022-05-17 Data processing method, device and computer readable storage medium Pending CN117118625A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210541642.7A CN117118625A (en) 2022-05-17 2022-05-17 Data processing method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210541642.7A CN117118625A (en) 2022-05-17 2022-05-17 Data processing method, device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN117118625A true CN117118625A (en) 2023-11-24

Family

ID=88800777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210541642.7A Pending CN117118625A (en) 2022-05-17 2022-05-17 Data processing method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN117118625A (en)

Similar Documents

Publication Publication Date Title
US11232080B2 (en) Systems and methods for providing access to a data file stored at a data storage system
US10313354B2 (en) Systems and methods for efficient and secure temporary anonymous access to media content
EP3467692B1 (en) Message permission management method and device, and storage medium
CN105530175B (en) Message processing method, device and system
US10326715B2 (en) System and method for updating information in an instant messaging application
WO2019105189A1 (en) Model training system and method, and storage medium
US8464066B1 (en) Method and system for sharing segments of multimedia data
US9805209B2 (en) Systems and methodologies for managing document access permissions
WO2017084290A1 (en) Public account two-dimensional code generation method and server, and public account following method, server and terminal
US11553196B2 (en) Media storage
CN108289098B (en) Authority management method and device of distributed file system, server and medium
US9374244B1 (en) Remote browsing session management
US9971901B2 (en) Content management apparatus and content management method
CN111355986B (en) Message processing method and device in live broadcast room and storage medium
WO2014176896A1 (en) System and method for updating information in an instant messaging application
CN111147496B (en) Data processing method and device
KR20220034787A (en) Media source authentication through soft watermarking
CN117118625A (en) Data processing method, device and computer readable storage medium
US11991286B2 (en) Systems and methods for using a non-fungible digital asset to facilitate accessing an access-restricted resource
CN109948082A (en) Live information processing method and processing device, electronic equipment, storage medium
US20140373133A1 (en) Method and System to Capture and Find Information and Relationships
CN111814063B (en) Media information processing method, device, equipment and medium based on block chain
CN114866337B (en) Shared data auditing method and device, equipment, storage medium and program product thereof
CN114091107A (en) Information processing method, device, equipment, storage medium and product
CN114398116A (en) Multi-party interactive remote message-prompting method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination