CN117237124B - Digital asset management method and device based on multi-terminal interaction - Google Patents

Digital asset management method and device based on multi-terminal interaction Download PDF

Info

Publication number
CN117237124B
CN117237124B CN202311522417.XA CN202311522417A CN117237124B CN 117237124 B CN117237124 B CN 117237124B CN 202311522417 A CN202311522417 A CN 202311522417A CN 117237124 B CN117237124 B CN 117237124B
Authority
CN
China
Prior art keywords
auditing
asset
authorization
demand
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311522417.XA
Other languages
Chinese (zh)
Other versions
CN117237124A (en
Inventor
李若澄
杨玲
沈华强
罗哲珺
陈佳璐
肖吉东
王钟
赵学海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Zhejiang University ZJU
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU, State Grid Zhejiang Electric Power Co Ltd filed Critical Zhejiang University ZJU
Priority to CN202311522417.XA priority Critical patent/CN117237124B/en
Publication of CN117237124A publication Critical patent/CN117237124A/en
Application granted granted Critical
Publication of CN117237124B publication Critical patent/CN117237124B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention provides a digital asset management method and device based on multi-terminal interaction, which are used for obtaining a plurality of asset sets according to classification information of digital assets by a management terminal and generating an asset auditing structure of the digital assets based on configuration information and configuration modes of each asset set; splitting the asset auditing structure based on the requirement type and the requirement set to obtain a requirement structure; obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end, and then obtaining a transmission template to be audited and sending the transmission template to the auditing end; and receiving an authorization template after the transmission template is authorized by the auditing end based on the template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on the key data channel, analyzing the authorization template according to the authorization key, obtaining authorization data and updating the digital asset.

Description

Digital asset management method and device based on multi-terminal interaction
Technical Field
The present invention relates to data processing technology, and in particular, to a method and apparatus for managing digital assets based on multi-terminal interaction.
Background
Digital assets refer to any form of value or equity stored and represented in digital form. These digital assets may include various data types, such as documents, images, audio, video, and other forms of data, with the primary purpose of digital asset management being to effectively manage, protect, optimize, and realize the maximum value of the digital asset.
In the prior art, users all manage digital assets through a single account, and because of huge digital asset quantity of part of users, such as companies, groups and the like, the management of the users becomes difficult, the efficiency is low, the same account cannot be cooperatively managed through multi-terminal interaction, and a management flow corresponding to the requirements cannot be customized according to the requirements among the users.
Therefore, how to realize the collaborative management of multi-terminal interaction on the digital assets of the user and customize the generation management flow according to the requirements, thereby improving the management efficiency of the digital assets, and becoming a problem to be solved urgently.
Disclosure of Invention
The embodiment of the invention provides a digital asset management method and device based on multi-terminal interaction, which can realize the collaborative management of multi-terminal interaction on digital assets of users, and customize and generate a management flow according to requirements, thereby improving the management efficiency of the digital assets, generating a dynamic key corresponding to managed data, and further ensuring the safety of the data.
In a first aspect of an embodiment of the present invention, a digital asset management method based on multi-terminal interaction is provided, including:
obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating an asset auditing structure corresponding to the digital asset based on configuration information and configuration modes of each asset set, wherein the configuration information comprises auditing ends and auditing sequences corresponding to the auditing ends;
receiving a processing demand of a demand end, obtaining a demand type and a demand set corresponding to a demand target according to the processing demand, and splitting the asset auditing structure based on the demand type and the demand set to obtain a demand structure corresponding to the demand target;
obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end to obtain a transmission template, and sending the transmission template to the auditing end;
and receiving an authorization template after the auditing end authorizes the transmission template based on a template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on a key data channel, analyzing the authorization template according to the authorization key to obtain authorization data, and updating the digital asset according to the authorization data.
Optionally, in one possible implementation manner of the first aspect, the obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating an asset auditing structure corresponding to the digital asset based on the configuration information and the configuration mode of each asset set includes:
obtaining a plurality of asset sets according to the classification information of the digital assets by the management end, and obtaining the processing types of all the asset sets and target users, wherein the processing types comprise a transfer type and a lease type;
automatically processing the target user, the processing type and the asset set based on an automatic construction strategy to generate a primary auditing structure;
performing custom processing on configuration information and configuration modes of each asset set based on a custom construction strategy, and generating a secondary audit structure corresponding to each asset set, wherein the configuration modes comprise a parallel mode and a serial mode;
and connecting the secondary audit structure with the primary audit structure according to the asset set to generate an asset audit structure corresponding to the digital asset.
Optionally, in a possible implementation manner of the first aspect, the automatically processing the target user, the processing type and the asset set based on the automatic construction policy, to generate a primary audit structure includes:
Constructing user nodes corresponding to the target users, constructing type nodes according to the processing types, and connecting all the type nodes with the user nodes;
and constructing asset nodes corresponding to the asset set, and respectively connecting all the asset nodes with the type nodes to generate a primary auditing structure.
Optionally, in one possible implementation manner of the first aspect, the customizing the configuration information and the configuration mode of each asset set based on the customizing building policy generates a second-level audit structure corresponding to each asset set, including:
determining that the configuration mode is a parallel mode, and constructing auditing nodes corresponding to the corresponding asset sets according to the auditing ends in the configuration information to obtain a synchronous auditing structure;
determining that the configuration mode is a serial mode, and sorting the auditing terminals based on the auditing order in the configuration information to obtain an auditing sequence;
and sequentially constructing auditing nodes based on the auditing ends in the auditing sequence and connecting the auditing nodes to obtain a continuous auditing structure, wherein the secondary auditing structure comprises a synchronous auditing structure and a continuous auditing structure.
Optionally, in a possible implementation manner of the first aspect, the connecting the second level audit structure with the first level audit structure according to the asset set, generating an asset audit structure corresponding to the digital asset includes:
and determining an asset node corresponding to the second-level auditing structure to serve as a connecting node, connecting the second-level auditing structure with the corresponding connecting node in the first-level auditing structure, and generating an asset auditing structure corresponding to the digital asset.
Optionally, in one possible implementation manner of the first aspect, the receiving the processing requirement of the requirement end, obtaining, according to the processing requirement, a requirement type and a requirement set corresponding to a requirement target, splitting the asset audit structure based on the requirement type and the requirement set, and obtaining a requirement structure corresponding to the requirement target includes:
receiving a processing demand of a demand end, and obtaining a demand type and a demand set corresponding to a demand target according to the processing demand;
determining a corresponding type node as a demand type node based on the demand type, determining a corresponding asset node as a demand asset node according to the demand set, and determining a secondary audit structure connected with the demand asset node as a secondary split structure;
And splitting the asset audit structure based on the user node, the requirement type node, the requirement asset node and the secondary splitting structure to obtain a requirement structure corresponding to the requirement target.
Optionally, in one possible implementation manner of the first aspect, the method further includes:
and acquiring a display picture corresponding to the demand target, and carrying out display updating on all nodes in the demand structure based on the display picture.
Optionally, in one possible implementation manner of the first aspect, the obtaining, according to the requirement structure, data to be audited corresponding to each auditing end, and updating, based on the data to be audited, a preset auditing template of the corresponding auditing end to obtain the template to be audited includes:
a preset auditing template is constructed, wherein the preset auditing template comprises a transfer auditing zone and a lease auditing zone, a transfer title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the transfer auditing zone, and a lease title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the lease auditing zone;
obtaining a demand target corresponding to each auditing end as data to be audited according to the demand structure, and determining a processing type of a type node in the demand structure corresponding to the data to be audited;
Classifying the data to be checked based on the processing types to obtain a set to be checked corresponding to each processing type;
updating the corresponding transfer audit area and/or the waiting area in the lease audit area in the preset audit template of the corresponding audit terminal based on the set to be verified to obtain a template to be verified.
Optionally, in one possible implementation manner of the first aspect, before receiving, based on a key data channel, an authorization key generated by the auditing end according to the authorization template, the method further includes:
the auditing end obtains the transfer mark of the transfer title area, the pre-lease mark of the lease title area, the authorization mark of the authorization area and the rejection mark of the rejection area in the authorization template;
sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the authorization area to obtain a transfer authorization set, and sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the reject area to obtain a transfer reject set;
sequentially counting the numbers of the data to be audited in the authorization zone corresponding to the lease audit zone to obtain a lease authorization set, and sequentially counting the numbers of the data to be audited in the revetment zone corresponding to the lease audit zone to obtain a lease refute set;
Combining the transfer mark, the authorization mark, the transfer authorization set, the transfer rejection mark and the transfer rejection set in sequence to obtain a transfer key;
sequentially combining the lease marks, the authorization marks, the lease authorization sets, the reject marks and the lease reject sets to obtain lease keys;
and combining the transfer key and the lease key to obtain an authorization key corresponding to the authorization template.
Optionally, in one possible implementation manner of the first aspect, the method further includes:
and reducing and updating the same continuous auditing structure in the asset auditing structure based on the structure reducing strategy to obtain an updated asset auditing structure.
Optionally, in one possible implementation manner of the first aspect, the reducing updating, based on the structure reducing policy, the same continuous audit structure in the asset audit structure to obtain an updated asset audit structure includes:
determining that the same continuous auditing structure exists in the asset auditing structure, taking the same continuous auditing structure as a first structure, and determining an asset node connected with the first structure as a first node;
Deleting the repeated first structures in the asset auditing structure, and connecting all the first nodes with the rest of the first structures to obtain updated asset auditing structures.
In a second aspect of an embodiment of the present invention, there is provided a digital asset management device based on multi-terminal interaction, including:
the generation module is used for obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating an asset auditing structure corresponding to the digital asset based on the configuration information and the configuration mode of each asset set, wherein the configuration information comprises auditing ends and auditing orders corresponding to the auditing ends;
the splitting module is used for receiving the processing requirement of the requirement end, obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement, and splitting the asset auditing structure based on the requirement type and the requirement set to obtain a requirement structure corresponding to the requirement target;
the updating module is used for obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end to obtain a transmission template, and sending the transmission template to the auditing end;
The analysis module is used for receiving an authorization template after the auditing end authorizes the transmission template based on the template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on the key data channel, analyzing the authorization template according to the authorization key to obtain authorization data, and updating the digital asset according to the authorization data.
In a third aspect of an embodiment of the present invention, there is provided an electronic device including: a memory, a processor and a computer program stored in the memory, the processor running the computer program to perform the first aspect of the invention and the methods that the first aspect may relate to.
In a fourth aspect of embodiments of the present invention, there is provided a storage medium having stored therein a computer program for implementing the method of the first aspect and the various possible aspects of the first aspect when executed by a processor.
The beneficial effects of the invention are as follows:
1. the invention can cooperatively manage the digital assets through multi-terminal interaction, and customize the demand structure according to the demands among users, thereby facilitating the subsequent multi-terminal automatic management, and simultaneously, the auditing terminal can generate a dynamic authorization key according to the authorization operation of the data to be audited. According to the method and the device, the asset auditing structures corresponding to the digital assets of the user are generated according to the asset sets and the corresponding configuration information and configuration modes, so that the auditing structure corresponding to each asset set is obtained, and the asset auditing structures are convenient to split according to the requirements. The invention can carry out customized splitting on the asset auditing structure according to the processing requirements among users, thereby obtaining the requirement structure corresponding to the processing requirements and facilitating the follow-up automatic auditing according to the requirement structure. The invention encrypts the template to be audited and the authorization template respectively, encrypts the template to be audited through the fixed key which is set by the audit, dynamically generates the corresponding authorization key through the authorization template authorized by the audit end, decrypts based on the authorization key, and transmits the authorization key through 2 different channels in the transmission process, thereby ensuring the security of the authorization template and improving the privacy security of transactions among users.
2. According to the invention, the asset auditing structure is customized and split through processing requirements among users, so that a requirement structure corresponding to the requirements is obtained, automatic auditing management is convenient to carry out subsequently on an auditing end, and auditing is carried out through the requirement structure, so that the auditing result of the subsequent digital asset has traceability, and meanwhile, all nodes in the requirement structure can be updated according to the display picture of the requirement target, so that the follow-up user can conveniently check and trace. According to the method and the system, corresponding primary audit structures are automatically built according to the processing types of the digital assets and a plurality of asset sets obtained by classifying the asset sets by a user, a secondary audit structure is built in a customized mode according to the configuration information and the configuration mode of the asset sets configured by a management end, and the secondary audit structure is connected with corresponding asset nodes in the primary audit structure, so that an asset audit structure is obtained, audit management flows corresponding to the asset sets are reflected, and automatic management is facilitated according to the asset audit structure. According to the method and the system for verifying the demand structure, the demand structure in the asset verification structure is positioned according to the processing demand, the demand structure is split, the display picture corresponding to the demand target is determined later, each node of the display picture in the corresponding demand structure is updated, and the user is displayed, so that the automatic verification of the demand target can be completed later according to the demand structure, the demand target for verification is displayed at the same time, and the user can conveniently view the demand structure.
3. The invention encrypts the content displayed in the transfer audit zone and the lease audit zone in the audit template respectively by the fixed keys of the corresponding audit terminals and sends the encrypted content to the corresponding audit terminals, thereby ensuring the security of audit data, generating the corresponding authorization key according to the authorization template after the authorization of the audit terminals, wherein the authorization key has randomness, is related to the operation of the audit terminals and is transmitted through 2 different channels, thereby ensuring the security in the data transmission process. The invention can generate the corresponding authorization key according to the region where the data to be audited in the authorization template is located after authorization and the self number, so that the authorization key has randomness, thereby improving the security of the data.
4. The invention can simplify the repeated continuous auditing structure in the asset auditing structure according to the structure reduction strategy, so that the structure in the asset auditing structure is clearer, and the burden of data management is reduced by deleting the repeated structure, thereby facilitating the subsequent management and maintenance. The invention deletes the repeated continuous auditing structure, only the first structure is reserved, and the reserved first structure is connected with all the first nodes, so that the structure is clearer, and the data management burden is reduced by deleting the repeated structure.
Drawings
FIG. 1 is a flow chart of a digital asset management method based on multi-terminal interaction provided by the present invention;
FIG. 2 is a schematic diagram of an asset audit architecture provided by the present invention;
FIG. 3 is a schematic diagram of a reduced updated asset audit architecture according to the present invention;
FIG. 4 is a schematic diagram of a digital asset management device based on multi-terminal interaction according to the present invention;
fig. 5 is a schematic diagram of a hardware structure of an electronic device according to the present invention.
Detailed Description
The technical scheme of the invention is described in detail below by specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
The invention provides a digital asset management method based on multi-terminal interaction, as shown in figure 1, comprising the following steps of S1-S4:
s1, obtaining a plurality of asset sets according to classification information of a management end on digital assets, and generating an asset auditing structure corresponding to the digital assets based on configuration information and configuration modes of each asset set, wherein the configuration information comprises auditing ends and auditing sequences corresponding to the auditing ends.
It should be noted that, at present, users all implement management of digital assets through a single account, and because the digital assets of some users have huge amounts, such as users of companies, groups, etc., the users have a large amount of digital assets, and different digital assets may need to be transferred and leased through different auditing flows, so that management efficiency through one account is low and management is inconvenient.
Therefore, the server may obtain a plurality of asset sets according to the classification information of the digital asset by the management end, where the classification information is information for classifying the digital asset into a plurality of asset sets, for example, the digital asset with the same label has the same auditing process (configuration information and configuration mode) by classifying the digital asset with the same label, so as to obtain a plurality of asset sets by classifying the digital asset with the same label. Digital assets of the same configuration information and configuration schema may also be categorized in other ways to yield multiple asset collections.
Further, an asset auditing structure corresponding to the digital asset is generated through configuration information and a configuration mode of each asset set, wherein the configuration information comprises auditing terminals and auditing orders corresponding to the auditing terminals, the auditing terminals are processing terminals for auditing the demand targets, and the auditing orders are auditing orders of the auditing terminals.
In some embodiments, the "obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating the asset audit structure corresponding to the digital asset based on the configuration information and the configuration mode of each asset set" in step S1 includes S11-S14:
s11, obtaining a plurality of asset sets according to the classification information of the digital assets by the management end, and obtaining the processing types of all the asset sets and the target user, wherein the processing types comprise a transfer type and a lease type.
It can be understood that the server may obtain a plurality of asset sets according to the classification information of the digital assets by the management end, for example, the digital assets having the same configuration information and configuration mode may be classified by classifying the tags of the digital assets, so as to obtain a plurality of asset sets.
Further, the processing types corresponding to all the asset sets are obtained, the processing types comprise a transfer type and a lease type, and target users corresponding to all the asset sets, such as companies and groups, are obtained. It should be understood that there are generally 2 ways of handling digital assets, respectively transferring and renting corresponding digital assets.
And S12, automatically processing the target user, the processing type and the asset set based on an automatic construction strategy to generate a primary auditing structure.
It will be appreciated that the server will automatically process the target user, the process type, and the set of assets based on an automatic build policy, generating a primary audit structure.
It will be appreciated that the present invention may automatically construct a primary audit structure based on information inherent in the digital asset, such as the type of processing of the target user, e.g., a first company, itself, e.g., transfer and lease, and the categorized collection of assets, corresponding to all digital assets.
In some embodiments, "automatically processing the target user, the process type, and the asset collection based on an automatic build policy, generating a primary audit structure" in step S12, includes S121-S122:
s121, constructing a user node corresponding to the target user, constructing a type node according to the processing type, and connecting all the type nodes with the user node.
It will be appreciated that the user node corresponding to the target user is constructed, for example, the user node corresponding to the A company is constructed.
Further, a type node is constructed according to the processing type, all the type nodes are connected with the user node, for example, a transfer node and a lease node are respectively constructed according to the transfer type and the lease type, and the transfer node and the lease node are simultaneously connected with the user node.
S122, constructing asset nodes corresponding to the asset collection, and respectively connecting all the asset nodes with the type nodes to generate a primary auditing structure.
It can be appreciated that the server may construct asset nodes corresponding to each asset set, for example, construct 3 corresponding asset nodes according to 3 asset sets, and connect all the asset nodes with each type node respectively, so as to generate a primary audit structure.
It will be appreciated that all digital assets correspond to both transfer and lease processing types, and that all asset nodes are therefore connected to each of the type nodes, respectively, to thereby provide a primary audit structure.
S13, customizing configuration information and configuration modes of the asset sets based on a customization construction strategy to generate a secondary audit structure corresponding to the asset sets, wherein the configuration modes comprise a parallel mode and a serial mode.
It can be appreciated that the server may customize the configuration information and the configuration mode of each asset set by using the customized construction policy to generate a secondary audit structure corresponding to each asset set, where the configuration mode includes a parallel mode and a serial mode.
It is easy to understand that the invention can customize to generate the secondary auditing structure corresponding to each asset set according to the configuration information and the configuration mode configured by the management end for the asset set, that is, each asset set has a corresponding auditing flow, so that the primary auditing structure and the secondary auditing structure can be conveniently connected according to the asset set, and the multi-terminal interactive collaborative management can be carried out according to the asset auditing structure.
In some embodiments, "custom-processing the configuration information and configuration pattern of each of the asset sets based on the custom-build policy in step S13, generating a secondary audit structure corresponding to each of the asset sets" includes S131-S133:
s131, determining that the configuration mode is a parallel mode, and constructing auditing nodes corresponding to the corresponding asset sets according to the auditing ends in the configuration information to obtain a synchronous auditing structure.
It can be understood that if the server determines that the configuration mode is the parallel mode, an audit node corresponding to the corresponding asset set is constructed according to the audit terminal in the configuration information, so as to obtain a synchronous audit structure. It is to be understood that the parallel mode is a synchronous auditing mode, that is, a plurality of auditing terminals audit simultaneously.
For example, if the configuration mode of the asset collection 1 is determined to be a parallel mode, the node a and the node B are constructed according to the auditing end a and the auditing end B in the corresponding configuration information, so as to obtain a synchronous auditing structure, wherein the auditing orders corresponding to the auditing ends in the parallel mode are the same, and are in the same order, for example, 1 and 1 respectively, so that consideration is not needed.
S132, determining that the configuration mode is a serial mode, and sorting the auditing ends based on the auditing order in the configuration information to obtain an auditing sequence.
It can be understood that if the server determines that the configuration mode is a serial mode, the auditing ends are ordered based on the auditing order in the configuration information, so as to obtain an auditing sequence.
For example, if the configuration mode of the asset set 2 is determined to be a serial mode, according to the auditing order of each auditing end, the auditing order of the auditing end C is 1, and the auditing order of the auditing end D is 2, the auditing ends C and D are ordered based on the auditing order to obtain an auditing sequence { C, D }.
S133, sequentially constructing auditing nodes based on the auditing ends in the auditing sequence and connecting the auditing nodes to obtain a continuous auditing structure, wherein the secondary auditing structure comprises a synchronous auditing structure and a continuous auditing structure.
It can be appreciated that the server may sequentially construct audit nodes based on the audit terminals in the audit sequence and connect with each other, so as to obtain a continuous audit structure, where the secondary audit structure includes a synchronous audit structure and a continuous audit structure.
For example, nodes C, D will be constructed in sequence according to the audit sequence { C, D } and interconnected to provide a continuous audit structure.
And S14, connecting the secondary auditing structure with the primary auditing structure according to the asset collection, and generating an asset auditing structure corresponding to the digital asset.
It can be appreciated that the server connects the secondary audit structure with the primary audit structure according to the asset collection to generate an asset audit structure corresponding to the digital asset.
It is to be appreciated that the second level audit structure corresponding to the asset collection has an asset node corresponding to the asset collection in the first level audit structure, and the second level audit structure can be subsequently connected with the asset node in the first level audit structure according to the asset collection, thereby generating an asset audit structure corresponding to the digital asset.
In some embodiments, "connect the secondary audit structure with the primary audit structure according to the asset set to generate an asset audit structure corresponding to the digital asset" in step S14 includes S141:
S141, determining an asset node corresponding to the asset set with the secondary audit structure as a connecting node, connecting the secondary audit structure with the corresponding connecting node in the primary audit structure, and generating an asset audit structure corresponding to the digital asset.
It can be appreciated that the server may determine an asset node corresponding to the asset set with the secondary audit structure as a connection node, and connect the secondary audit structure with the corresponding connection node in the primary audit structure, so as to generate an asset audit structure corresponding to the digital asset.
For example, as shown in fig. 2, a corresponding user node a is constructed according to an a company, corresponding transfer nodes and lease nodes are generated to be connected with the node a, and at the same time, asset nodes corresponding to 3 asset sets, namely, an asset node 1, an asset node 2 and an asset node 3, are generated, the asset node 1 is connected with a node a and a node B corresponding to the asset node 1, the asset node 2 is sequentially connected with a node C and a node D, and the asset node 3 is sequentially connected with the node C and the node D, so as to obtain an asset auditing structure corresponding to a digital asset of the a company, and different asset sets correspond to different configuration information and configuration modes.
It should be understood that the same continuous audit structure may exist in the asset audit structure, and the repeated continuous audit structure may be simplified, for example, the connection audit structure of the corresponding connection between the asset node 2 and the asset node 3 in fig. 2 is the same.
On the basis of the above embodiment, A1:
a1, reducing and updating the same continuous auditing structure in the asset auditing structure based on a structure reducing strategy to obtain an updated asset auditing structure.
It can be appreciated that the server may invoke the structure reduction policy and perform reduction update on the same continuous audit structure in the asset audit structure based on the structure reduction policy to obtain an updated asset audit structure.
On the basis of some embodiments, the "reducing and updating the same continuous audit structure in the asset audit structure based on the structure reducing policy" in the step A1 to obtain an updated asset audit structure "includes a11-a12:
a11, determining that the same continuous auditing structure exists in the asset auditing structure, taking the same continuous auditing structure as a first structure, and determining an asset node connected with the first structure as a first node.
It will be appreciated that the server will determine that the same continuous audit structure exists in the asset audit structure and will take the same continuous audit structure as the first structure and determine the asset node connected to the first structure as the first node.
And A12, deleting the repeated first structures in the asset auditing structure, and connecting all the first nodes with the rest of the first structures to obtain updated asset auditing structures.
It can be appreciated that the server may delete the repeated first structures in the asset audit structure, so that only one first structure is reserved, and all the first nodes are connected with the remaining first structures to obtain an updated asset audit structure.
As shown in fig. 3, the repeated continuous audit structure of the node C and the node D, which are correspondingly connected to the asset node 2 and the asset node 3, is deleted, only one is reserved, and all the asset nodes 2 and 3 are connected to the reserved node C and node D, thereby obtaining an updated asset audit structure.
Through the embodiment, the repeated structure is deleted, so that the updated asset auditing structure is clearer, and meanwhile, the repeated structure is deleted, so that the data management burden is reduced.
S2, receiving a processing demand of a demand end, obtaining a demand type and a demand set corresponding to a demand target according to the processing demand, and splitting the asset auditing structure based on the demand type and the demand set to obtain a demand structure corresponding to the demand target.
It will be appreciated that the server receives a processing demand from the demand end, where the processing demand is a demand type and a demand set corresponding to a demand target, and the demand type may be a transfer demand type or a lease demand type. The demand set is an asset set corresponding to the demand target.
Further, the asset auditing structure is split based on the requirement type corresponding to the requirement target and the requirement set, and a requirement structure corresponding to the requirement target is obtained.
In some embodiments, the step S2 of "receiving a processing requirement of a requirement end, obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement, splitting the asset audit structure based on the requirement type and the requirement set, and obtaining a requirement structure corresponding to the requirement target" includes steps S21-S23:
s21, receiving a processing requirement of a requirement end, and obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement.
It can be understood that the server receives the processing requirement of the requirement end, and analyzes the processing requirement to obtain a requirement type and a requirement set corresponding to the requirement target, for example, the requirement type of the requirement end to the requirement target is a transfer requirement type, and determines that the requirement target is in the asset set 1, and the requirement set is the asset set 1.
S22, determining a corresponding type node as a demand type node based on the demand type, determining a corresponding asset node as a demand asset node according to the demand set, and determining a secondary audit structure connected with the demand asset node as a secondary split structure.
It can be appreciated that the server can determine the corresponding type node as a demand type node based on the type of the request, determine the corresponding asset node as a demand asset node according to the demand set, and further determine a secondary audit structure connected with the demand asset node as a secondary split structure.
S23, splitting the asset audit structure based on the user node, the requirement type node, the requirement asset node and the secondary splitting structure to obtain a requirement structure corresponding to the requirement target.
It can be appreciated that the asset audit structure is split based on the structure formed by the connection of the user node, the requirement type node, the requirement asset node and the secondary split structure, so as to obtain the requirement structure corresponding to the requirement end.
It will be appreciated that the demand type node, the demand asset node, and the user node and the secondary split structure connected with the demand type node, the demand asset node in the asset audit structure are located according to the demand type and the demand set, thereby locating the demand structure corresponding to the demand target.
Through the embodiment, the requirement target is conveniently and directly checked by the checking terminal and the configuration mode in the requirement structure.
On the basis of the above embodiment, B1:
and B1, acquiring a display picture corresponding to the demand target, and carrying out display updating on all nodes in the demand structure based on the display picture.
It can be understood that the server may obtain a display picture corresponding to the demand target, for example, a display picture corresponding to a picture, a video or an audio in the digital asset, and each digital asset has a display picture corresponding to the display picture, which may be manually preset, and it is to be noted that the invention only processes the digital asset such as the video, the picture, and the like.
Further, the server updates the display picture to all nodes in the demand structure and displays the display picture, so that the follow-up auditing and checking by management staff are facilitated.
S3, obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end to obtain a transmission template, and sending the transmission template to the auditing end.
It can be understood that the server can obtain the data to be audited corresponding to each auditing end according to the demand structure, and it is easy to understand that the demand structure corresponds to the demand target, and the demand target corresponding to each auditing end in the demand structure is counted, so that the data to be audited corresponding to each auditing end is obtained.
Further, updating the preset auditing templates of the corresponding auditing terminals based on the data to be audited to obtain templates to be audited, encrypting the templates to be audited according to the fixed keys of the corresponding auditing terminals to obtain transmission templates, and sending the transmission templates to the auditing terminals.
It should be noted that, the auditing end may preset 2 fixed keys, and then encrypt the transfer auditing area and the lease auditing area in the to-be-audited template respectively, for example, the fixed key 1:123, fixed key 2:321, encrypting the transfer audit area and the lease audit area using 123 and 321, respectively.
In some embodiments, in step S3, "obtaining data to be audited corresponding to each auditing end according to the requirement structure, and updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited", including S31-S34:
s31, constructing a preset auditing template, wherein the preset auditing template comprises a transfer auditing zone and a lease auditing zone, a transfer title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the transfer auditing zone, and a lease title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the lease auditing zone.
It can be appreciated that the server may construct a preset audit template, where the preset audit template includes a transfer audit area and a lease audit area, and constructs a transfer header area, an authorization area, a waiting area, and a refute area in the transfer audit area, and constructs a lease header area, an authorization area, a waiting area, and a refute area in the lease audit area.
For example, 2 areas are constructed, the 2 areas are respectively a transfer audit area and a lease audit area, the transfer audit area is partitioned, the left side is a transfer title area, the transfer title area displays transfer titles, the right side is from top to bottom, an authorization area, a waiting area and a reject area are sequentially constructed, the lease audit area is partitioned, the left side is a lease title area, the lease title area displays leased titles, and the right side is from top to bottom, and the authorization area, the waiting area and the reject area are sequentially constructed.
S32, obtaining a demand target corresponding to each auditing end according to the demand structure as data to be audited, and determining the processing type of the type node in the demand structure corresponding to the data to be audited.
It can be understood that the requirement targets corresponding to the auditing ends are obtained as the data to be audited according to the requirement structure, i.e. the requirement targets corresponding to the auditing ends are obtained as the data to be audited.
Further, determining the processing type of the type node in the requirement structure corresponding to the data to be checked.
S33, classifying the to-be-checked data based on the processing types to obtain to-be-checked sets corresponding to the processing types.
It can be understood that the data to be checked is classified according to the processing types, so as to obtain a set to be checked corresponding to each processing type, and the set to be checked has a plurality of data to be checked.
Through the embodiment, the data to be audited is classified by the processing type, so that the subsequent classification is conveniently filled into the corresponding transfer audit area or the lease audit area.
S34, updating the corresponding transfer audit area and/or the waiting area in the lease audit area in the preset audit templates of the corresponding audit terminals based on the to-be-verified set to obtain to-be-verified templates.
It can be understood that the server performs filling update on the corresponding transfer audit area and/or the waiting area in the lease audit area in the preset audit templates of the corresponding audit terminals based on the to-be-verified set, so as to obtain the to-be-verified templates of the corresponding audit terminals.
It is easy to understand that the to-be-checked data of each checking terminal is classified to obtain a to-be-checked set with a corresponding processing type, and the to-be-checked set is filled into a corresponding transfer checking area in a preset checking template and/or a waiting area in the leasing checking area, so that the movement of the subsequent checking terminal in the waiting area is facilitated, and the movement is carried out to an authorization area or a revering area.
S4, receiving an authorization template after the auditing end authorizes the transmission template based on the template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on the key data channel, analyzing the authorization template according to the authorization key to obtain authorization data, and updating the digital asset according to the authorization data.
It can be understood that the server receives the authorization template after the auditing end authorizes the transmission template based on the template data channel, and it is easy to understand that the auditing end decrypts the transmission template by using 2 fixed keys, and then performs mobile operation on the data to be audited in the template to be audited based on the operation data of the auditing end, and moves to the authorization area or the rejection area, so as to obtain the authorization template after the auditing end audits.
Further, the authorization key generated by the auditing end according to the authorization template is received according to the key data channel, the authorization template is analyzed according to the authorization key, authorization data is obtained, and the digital asset is updated according to the authorization data.
The template data channel is a channel for receiving an authorization template, the key data channel is a channel for receiving an authorization key, the template data channel can be a channel for transmitting through a network, such as a wide area network, etc., the key data channel can be a channel for transmitting locally, and the security is improved, such as a local area network, even a mobile hard disk, bluetooth, etc., can be adopted for transmitting.
Before receiving the authorization key generated by the auditing end according to the authorization template based on the key data channel, the method further comprises C1-C6:
and C1, the auditing end acquires the transfer mark of the transfer title area, the pre-leasing mark of the leasing title area, the authorization mark of the authorization area and the rejection mark of the rejection area in the authorization template.
It can be understood that the auditing end obtains the transfer mark of the transfer title area, the pre-lease mark of the lease title area, the authorization mark of the authorization area and the rejection mark of the rejection area in the authorization template.
For example, the transfer of the transfer title area is marked as T, the pre-rental of the rental title area is marked as L, the authorization of the authorization area is marked as Y, and the rejection of the rejection area is marked as N.
And C2, sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the authorization area to obtain a transfer authorization set, and sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the reject area to obtain a transfer reject set.
It can be understood that the server sequentially counts the numbers of the data to be audited in the authorization area corresponding to the transfer audit area, and counts the numbers of the data to be audited in the reject area corresponding to the transfer audit area at the same time, so as to obtain a transfer reject set, wherein each data to be audited has the corresponding number.
For example, the transfer auditing area corresponds to the authorization area and has 2 data to be audited, the numbers of the 2 data to be audited are 11 and 13, the transfer auditing area corresponds to the reject area and has 1 data to be audited, and the number of the 1 data to be audited is 12.
And C3, sequentially counting the numbers of the data to be audited in the lease audit area corresponding to the authorization area to obtain a lease authorization set, and sequentially counting the numbers of the data to be audited in the lease audit area corresponding to the reject area to obtain a lease reject set.
It can be understood that the server accounts for the numbers of the data to be audited in the authorization zone corresponding to the lease audit zone to obtain a lease authorization set, and sequentially counts the numbers of the data to be audited in the reject zone corresponding to the lease audit zone to obtain a lease reject set.
For example, the lease audit zone corresponds to the authorization zone and has 2 data to be audited, the numbers of the 2 data to be audited are 21 and 23, the lease audit zone corresponds to the reject zone and has 1 data to be audited, and the number of the 1 data to be audited is 22.
And C4, sequentially combining the transfer mark, the authorization mark, the transfer authorization set, the transfer rejection mark and the transfer rejection set to obtain a transfer key.
It will be appreciated that the server combines the transfer tag, the authorization tag, the transfer authorization set, the transfer tag, and the transfer reject set in order to obtain a transfer key.
For example, transfer key T-Y-11-13-N-12 is obtained by combining transfer flag T, authorization flag Y, transfer authorization sets 11,13, transfer rejection flag N, and transfer rejection set 12.
And C5, sequentially combining the lease marks, the authorization marks, the lease authorization sets, the reject marks and the lease reject sets to obtain lease keys.
It is understood that the server combines the lease token, the authorization token, the lease authorization set, the reject token, and the lease reject set in order to obtain a lease key.
For example, lease indicia L, authorization indicia Y, lease authorization sets 21,23, refute indicia N, and lease refute set 22 are combined to obtain lease key L-Y-21-23-N-22.
And C6, based on the transfer key and the lease key, combining to obtain an authorization key corresponding to the authorization template.
It will be appreciated that the server combines the transfer key and the lease key to obtain an authorization key corresponding to the rights template, and encrypts the authorization template using the authorization key.
For example, transfer key T-Y-11-13-N-12 and lease key L-Y-21-23-N-22 are combined to obtain authorization key T-Y-11-13-N-12-L-Y-21-23-N-22.
According to the embodiment, the data to be checked by the checking terminal is random, and the corresponding operation is random, so that a random authorization key is generated, the authorization key is used for encryption, different channels are used for transmission, and subsequent decryption is used for updating the digital asset, so that the safety of the data is improved.
In order to better implement the digital asset management method based on multi-terminal interaction provided by the invention, the invention also provides a digital asset management device based on multi-terminal interaction, as shown in fig. 4, comprising:
the generation module is used for obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating an asset auditing structure corresponding to the digital asset based on the configuration information and the configuration mode of each asset set, wherein the configuration information comprises auditing ends and auditing orders corresponding to the auditing ends;
the splitting module is used for receiving the processing requirement of the requirement end, obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement, and splitting the asset auditing structure based on the requirement type and the requirement set to obtain a requirement structure corresponding to the requirement target;
the updating module is used for obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end to obtain a transmission template, and sending the transmission template to the auditing end;
The analysis module is used for receiving an authorization template after the auditing end authorizes the transmission template based on the template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on the key data channel, analyzing the authorization template according to the authorization key to obtain authorization data, and updating the digital asset according to the authorization data.
Referring to fig. 5, a schematic hardware structure of an electronic device according to an embodiment of the present invention is shown, where the electronic device 50 includes: a processor 51, a memory 52 and a computer program; wherein the method comprises the steps of
A memory 52 for storing the computer program, which memory may also be a flash memory (flash). Such as application programs, functional modules, etc. implementing the methods described above.
A processor 51 for executing the computer program stored in the memory to implement the steps executed by the apparatus in the above method. Reference may be made in particular to the description of the embodiments of the method described above.
Alternatively, the memory 52 may be separate or integrated with the processor 51.
When the memory 52 is a device separate from the processor 51, the apparatus may further include:
A bus 53 for connecting the memory 52 and the processor 51.
The present invention also provides a readable storage medium having stored therein a computer program for implementing the methods provided by the various embodiments described above when executed by a processor.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media can be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. In the alternative, the readable storage medium may be integral to the processor. The processor and the readable storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC for short). In addition, the ASIC may reside in a user device. The processor and the readable storage medium may reside as discrete components in a communication device. The readable storage medium may be read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tape, floppy disk, optical data storage device, etc.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, the execution instructions being executed by the at least one processor to cause the device to implement the methods provided by the various embodiments described above.
In the above embodiment of the apparatus, it should be understood that the processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (english: digital Signal Processor, abbreviated as DSP), application specific integrated circuits (english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (8)

1. A digital asset management method based on multi-terminal interaction, comprising:
obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating an asset auditing structure corresponding to the digital asset based on configuration information and configuration modes of each asset set, wherein the configuration information comprises auditing ends and auditing sequences corresponding to the auditing ends;
receiving a processing demand of a demand end, obtaining a demand type and a demand set corresponding to a demand target according to the processing demand, and splitting the asset auditing structure based on the demand type and the demand set to obtain a demand structure corresponding to the demand target;
obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end to obtain a transmission template, and sending the transmission template to the auditing end;
receiving an authorization template after the auditing end authorizes the transmission template based on a template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on a key data channel, analyzing the authorization template according to the authorization key to obtain authorization data, and updating the digital asset according to the authorization data;
The method for generating the asset auditing structure corresponding to the digital asset comprises the steps of:
obtaining a plurality of asset sets according to the classification information of the digital assets by the management end, and obtaining the processing types of all the asset sets and target users, wherein the processing types comprise a transfer type and a lease type;
automatically processing the target user, the processing type and the asset set based on an automatic construction strategy to generate a primary auditing structure;
performing custom processing on configuration information and configuration modes of each asset set based on a custom construction strategy, and generating a secondary audit structure corresponding to each asset set, wherein the configuration modes comprise a parallel mode and a serial mode;
connecting the secondary auditing structure with the primary auditing structure according to the asset collection to generate an asset auditing structure corresponding to the digital asset;
the automatic construction strategy-based automatic processing is performed on the target user, the processing type and the asset collection, and a primary auditing structure is generated, and the method comprises the following steps:
Constructing user nodes corresponding to the target users, constructing type nodes according to the processing types, and connecting all the type nodes with the user nodes;
constructing asset nodes corresponding to the asset collection, and respectively connecting all the asset nodes with each type node to generate a primary auditing structure;
the customizing-building-policy-based customizing processing is performed on the configuration information and the configuration mode of each asset set, and a secondary auditing structure corresponding to each asset set is generated, including:
determining that the configuration mode is a parallel mode, and constructing auditing nodes corresponding to the corresponding asset sets according to the auditing ends in the configuration information to obtain a synchronous auditing structure;
determining that the configuration mode is a serial mode, and sorting the auditing terminals based on the auditing order in the configuration information to obtain an auditing sequence;
sequentially constructing auditing nodes based on the auditing ends in the auditing sequence and connecting the auditing nodes to obtain a continuous auditing structure, wherein the secondary auditing structure comprises a synchronous auditing structure and a continuous auditing structure;
the receiving the processing requirement of the requirement end, obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement, splitting the asset audit structure based on the requirement type and the requirement set to obtain a requirement structure corresponding to the requirement target, including:
Receiving a processing demand of a demand end, and obtaining a demand type and a demand set corresponding to a demand target according to the processing demand;
determining a corresponding type node as a demand type node based on the demand type, determining a corresponding asset node as a demand asset node according to the demand set, and determining a secondary audit structure connected with the demand asset node as a secondary split structure;
splitting the asset audit structure based on the user node, the requirement type node, the requirement asset node and the secondary splitting structure to obtain a requirement structure corresponding to the requirement target;
obtaining data to be audited corresponding to each auditing end according to the demand structure, and updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, wherein the method comprises the following steps:
a preset auditing template is constructed, wherein the preset auditing template comprises a transfer auditing zone and a lease auditing zone, a transfer title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the transfer auditing zone, and a lease title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the lease auditing zone;
Obtaining a demand target corresponding to each auditing end as data to be audited according to the demand structure, and determining a processing type of a type node in the demand structure corresponding to the data to be audited;
classifying the data to be checked based on the processing types to obtain a set to be checked corresponding to each processing type;
updating the corresponding transfer audit zone and/or the waiting zone in the lease audit zone in the preset audit templates of the corresponding audit terminal based on the set to be audited to obtain a template to be audited;
before receiving the authorization key generated by the auditing end according to the authorization template based on the key data channel, the method further comprises the following steps:
the auditing end obtains the transfer mark of the transfer title area, the pre-lease mark of the lease title area, the authorization mark of the authorization area and the rejection mark of the rejection area in the authorization template;
sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the authorization area to obtain a transfer authorization set, and sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the reject area to obtain a transfer reject set;
sequentially counting the numbers of the data to be audited in the authorization zone corresponding to the lease audit zone to obtain a lease authorization set, and sequentially counting the numbers of the data to be audited in the revetment zone corresponding to the lease audit zone to obtain a lease refute set;
Combining the transfer mark, the authorization mark, the transfer authorization set, the transfer rejection mark and the transfer rejection set in sequence to obtain a transfer key;
sequentially combining the lease marks, the authorization marks, the lease authorization sets, the reject marks and the lease reject sets to obtain lease keys;
and combining the transfer key and the lease key to obtain an authorization key corresponding to the authorization template.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the step of connecting the secondary audit structure with the primary audit structure according to the asset set to generate an asset audit structure corresponding to the digital asset, comprising the following steps:
and determining an asset node corresponding to the second-level auditing structure to serve as a connecting node, connecting the second-level auditing structure with the corresponding connecting node in the first-level auditing structure, and generating an asset auditing structure corresponding to the digital asset.
3. The method as recited in claim 1, further comprising:
and acquiring a display picture corresponding to the demand target, and carrying out display updating on all nodes in the demand structure based on the display picture.
4. The method as recited in claim 1, further comprising:
and reducing and updating the same continuous auditing structure in the asset auditing structure based on the structure reducing strategy to obtain an updated asset auditing structure.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
the structure reduction policy-based reduction updating the same continuous audit structure in the asset audit structure to obtain an updated asset audit structure, comprising:
determining that the same continuous auditing structure exists in the asset auditing structure, taking the same continuous auditing structure as a first structure, and determining an asset node connected with the first structure as a first node;
deleting the repeated first structures in the asset auditing structure, and connecting all the first nodes with the rest of the first structures to obtain updated asset auditing structures.
6. A digital asset management device based on multi-terminal interaction, comprising:
the generation module is used for obtaining a plurality of asset sets according to the classification information of the digital asset by the management end, and generating an asset auditing structure corresponding to the digital asset based on the configuration information and the configuration mode of each asset set, wherein the configuration information comprises auditing ends and auditing orders corresponding to the auditing ends;
The splitting module is used for receiving the processing requirement of the requirement end, obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement, and splitting the asset auditing structure based on the requirement type and the requirement set to obtain a requirement structure corresponding to the requirement target;
the updating module is used for obtaining data to be audited corresponding to each auditing end according to the demand structure, updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, encrypting the template to be audited according to a fixed key of the corresponding auditing end to obtain a transmission template, and sending the transmission template to the auditing end;
the analysis module is used for receiving an authorization template after the auditing end authorizes the transmission template based on the template data channel, receiving an authorization key generated by the auditing end according to the authorization template based on the key data channel, analyzing the authorization template according to the authorization key to obtain authorization data, and updating the digital asset according to the authorization data;
the method for generating the asset auditing structure corresponding to the digital asset comprises the steps of:
Obtaining a plurality of asset sets according to the classification information of the digital assets by the management end, and obtaining the processing types of all the asset sets and target users, wherein the processing types comprise a transfer type and a lease type;
automatically processing the target user, the processing type and the asset set based on an automatic construction strategy to generate a primary auditing structure;
performing custom processing on configuration information and configuration modes of each asset set based on a custom construction strategy, and generating a secondary audit structure corresponding to each asset set, wherein the configuration modes comprise a parallel mode and a serial mode;
connecting the secondary auditing structure with the primary auditing structure according to the asset collection to generate an asset auditing structure corresponding to the digital asset;
the automatic construction strategy-based automatic processing is performed on the target user, the processing type and the asset collection, and a primary auditing structure is generated, and the method comprises the following steps:
constructing user nodes corresponding to the target users, constructing type nodes according to the processing types, and connecting all the type nodes with the user nodes;
constructing asset nodes corresponding to the asset collection, and respectively connecting all the asset nodes with each type node to generate a primary auditing structure;
The customizing-building-policy-based customizing processing is performed on the configuration information and the configuration mode of each asset set, and a secondary auditing structure corresponding to each asset set is generated, including:
determining that the configuration mode is a parallel mode, and constructing auditing nodes corresponding to the corresponding asset sets according to the auditing ends in the configuration information to obtain a synchronous auditing structure;
determining that the configuration mode is a serial mode, and sorting the auditing terminals based on the auditing order in the configuration information to obtain an auditing sequence;
sequentially constructing auditing nodes based on the auditing ends in the auditing sequence and connecting the auditing nodes to obtain a continuous auditing structure, wherein the secondary auditing structure comprises a synchronous auditing structure and a continuous auditing structure;
the receiving the processing requirement of the requirement end, obtaining a requirement type and a requirement set corresponding to a requirement target according to the processing requirement, splitting the asset audit structure based on the requirement type and the requirement set to obtain a requirement structure corresponding to the requirement target, including:
receiving a processing demand of a demand end, and obtaining a demand type and a demand set corresponding to a demand target according to the processing demand;
Determining a corresponding type node as a demand type node based on the demand type, determining a corresponding asset node as a demand asset node according to the demand set, and determining a secondary audit structure connected with the demand asset node as a secondary split structure;
splitting the asset audit structure based on the user node, the requirement type node, the requirement asset node and the secondary splitting structure to obtain a requirement structure corresponding to the requirement target;
obtaining data to be audited corresponding to each auditing end according to the demand structure, and updating a preset auditing template of the corresponding auditing end based on the data to be audited to obtain a template to be audited, wherein the method comprises the following steps:
a preset auditing template is constructed, wherein the preset auditing template comprises a transfer auditing zone and a lease auditing zone, a transfer title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the transfer auditing zone, and a lease title zone, an authorization zone, a waiting zone and a reveover zone are constructed in the lease auditing zone;
obtaining a demand target corresponding to each auditing end as data to be audited according to the demand structure, and determining a processing type of a type node in the demand structure corresponding to the data to be audited;
Classifying the data to be checked based on the processing types to obtain a set to be checked corresponding to each processing type;
updating the corresponding transfer audit zone and/or the waiting zone in the lease audit zone in the preset audit templates of the corresponding audit terminal based on the set to be audited to obtain a template to be audited;
before receiving the authorization key generated by the auditing end according to the authorization template based on the key data channel, the method further comprises the following steps:
the auditing end obtains the transfer mark of the transfer title area, the pre-lease mark of the lease title area, the authorization mark of the authorization area and the rejection mark of the rejection area in the authorization template;
sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the authorization area to obtain a transfer authorization set, and sequentially counting the numbers of the data to be audited in the transfer audit area corresponding to the reject area to obtain a transfer reject set;
sequentially counting the numbers of the data to be audited in the authorization zone corresponding to the lease audit zone to obtain a lease authorization set, and sequentially counting the numbers of the data to be audited in the revetment zone corresponding to the lease audit zone to obtain a lease refute set;
Combining the transfer mark, the authorization mark, the transfer authorization set, the transfer rejection mark and the transfer rejection set in sequence to obtain a transfer key;
sequentially combining the lease marks, the authorization marks, the lease authorization sets, the reject marks and the lease reject sets to obtain lease keys;
and combining the transfer key and the lease key to obtain an authorization key corresponding to the authorization template.
7. An electronic device, comprising: a memory, a processor and a computer program stored in the memory, the processor running the computer program to perform the method of any one of claims 1 to 5.
8. A storage medium having stored therein a computer program for implementing the method of any of claims 1 to 5 when executed by a processor.
CN202311522417.XA 2023-11-15 2023-11-15 Digital asset management method and device based on multi-terminal interaction Active CN117237124B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311522417.XA CN117237124B (en) 2023-11-15 2023-11-15 Digital asset management method and device based on multi-terminal interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311522417.XA CN117237124B (en) 2023-11-15 2023-11-15 Digital asset management method and device based on multi-terminal interaction

Publications (2)

Publication Number Publication Date
CN117237124A CN117237124A (en) 2023-12-15
CN117237124B true CN117237124B (en) 2024-02-02

Family

ID=89088475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311522417.XA Active CN117237124B (en) 2023-11-15 2023-11-15 Digital asset management method and device based on multi-terminal interaction

Country Status (1)

Country Link
CN (1) CN117237124B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110192212A (en) * 2016-07-14 2019-08-30 数字资产控股公司 Digital asset platform
CN110457946A (en) * 2018-12-05 2019-11-15 腾讯科技(深圳)有限公司 Digital asset generation method, device, electronic equipment and storage medium
KR102069326B1 (en) * 2019-07-25 2020-01-22 한화시스템(주) System and method for providing maritime cyber security compliance service
CN112465498A (en) * 2020-12-04 2021-03-09 中国建设银行股份有限公司 Data processing method and device for application blockchain enterprise wallet
WO2021204273A1 (en) * 2020-04-10 2021-10-14 支付宝(杭州)信息技术有限公司 Asset type registration and transaction record verification
CN114663231A (en) * 2022-03-21 2022-06-24 江苏数一科技服务有限公司 Block chain-based industrial chain digital asset open platform and trading method thereof
CN115514578A (en) * 2022-11-01 2022-12-23 中国信息通信研究院 Block chain based data authorization method and device, electronic equipment and storage medium
CN115964695A (en) * 2022-11-10 2023-04-14 浙江嘉兴数字城市实验室有限公司 Public data resource authorization system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110192212A (en) * 2016-07-14 2019-08-30 数字资产控股公司 Digital asset platform
CN110457946A (en) * 2018-12-05 2019-11-15 腾讯科技(深圳)有限公司 Digital asset generation method, device, electronic equipment and storage medium
KR102069326B1 (en) * 2019-07-25 2020-01-22 한화시스템(주) System and method for providing maritime cyber security compliance service
WO2021204273A1 (en) * 2020-04-10 2021-10-14 支付宝(杭州)信息技术有限公司 Asset type registration and transaction record verification
CN112465498A (en) * 2020-12-04 2021-03-09 中国建设银行股份有限公司 Data processing method and device for application blockchain enterprise wallet
CN114663231A (en) * 2022-03-21 2022-06-24 江苏数一科技服务有限公司 Block chain-based industrial chain digital asset open platform and trading method thereof
CN115514578A (en) * 2022-11-01 2022-12-23 中国信息通信研究院 Block chain based data authorization method and device, electronic equipment and storage medium
CN115964695A (en) * 2022-11-10 2023-04-14 浙江嘉兴数字城市实验室有限公司 Public data resource authorization system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
电子数据全方位保护――江苏华御密盾数据防泄漏系统;孙楠楠;赵志远;季莹;章继刚;许录泉;;网络安全和信息化(第01期);全文 *

Also Published As

Publication number Publication date
CN117237124A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US11050690B2 (en) Method for providing recording and verification service for data received and transmitted by messenger service, and server using method
CN109360077B (en) Information processing method, device, gateway server and medium in invoice reimbursement
CN107968709A (en) Business data processing method, identity management method and operating audit method
CN109214883A (en) Service lease method, apparatus, system and electronic equipment based on block chain
Tovanich et al. Visualization of blockchain data: a systematic review
KR20190028517A (en) Distributing digital assets by transactional devices
US20050182933A1 (en) Method and system for document transmission
US20230274373A1 (en) Decentralized will management apparatus, systems and related methods of use
CN107729924A (en) Picture review probability interval generation method and picture review decision method
AU739693B2 (en) Trusted and secure techniques for item delivery and execution
CN117237124B (en) Digital asset management method and device based on multi-terminal interaction
US20050180574A1 (en) Method and system for document transmission
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN107403107B (en) Data security management method and system based on multipoint cooperation mechanism
US8700429B2 (en) System and method for managing pedigree information
CN107516251A (en) The method and system of interactive operation based on electronic bill
US20230252462A1 (en) Systems and methods for improved indexing of non-standardized, custom smart contracts
CN114301912A (en) Information interaction method and device based on block chain
CN114066277A (en) Business decision method, decision platform, readable medium and electronic device
CN116414875A (en) Data processing apparatus and data processing method
CN110471932A (en) Invoice management method and system based on block chain
WO2006036699A2 (en) Concept based message security system
JP2007249690A (en) Member management system, service providing terminal and its method
CN114004456B (en) Data tag calculation method, device, computer equipment and storage medium
US20240127228A1 (en) Method, Apparatus, and System for Exporting and Recharging Digital Currency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant