CN116579749B - Method and device for running auditing flow based on RPA robot - Google Patents

Method and device for running auditing flow based on RPA robot Download PDF

Info

Publication number
CN116579749B
CN116579749B CN202310857723.2A CN202310857723A CN116579749B CN 116579749 B CN116579749 B CN 116579749B CN 202310857723 A CN202310857723 A CN 202310857723A CN 116579749 B CN116579749 B CN 116579749B
Authority
CN
China
Prior art keywords
approval
information
auditor
processed
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310857723.2A
Other languages
Chinese (zh)
Other versions
CN116579749A (en
Inventor
汪志君
吴毓林
吴刚
赵文鹏
张福佳
傅和平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Baorong Technology Co ltd
Original Assignee
Zhejiang Baorong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Baorong Technology Co ltd filed Critical Zhejiang Baorong Technology Co ltd
Priority to CN202310857723.2A priority Critical patent/CN116579749B/en
Publication of CN116579749A publication Critical patent/CN116579749A/en
Application granted granted Critical
Publication of CN116579749B publication Critical patent/CN116579749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an operation method and device of an auditing flow based on an RPA robot, which are applied to the RPA robot and comprise the following steps: acquiring application information, and taking the application information related to secret information as a task block to be processed; determining a corresponding auditor based on the confidential area of the task block to be processed; acquiring a corresponding approval path based on approval node information and approval time information of a task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area; according to the identity characteristic information of the auditor, carrying out fuzzification processing on the secret related area corresponding to the task block to be processed, and sending the task block to be processed after the fuzzification processing to the corresponding auditor for defuzzification processing; and generating an audit report after auditors involved in the audit path pass the audit. By blurring the confidential areas according to the identity characteristic information, different confidential areas are isolated, and the security of application information is improved.

Description

Method and device for running auditing flow based on RPA robot
Technical Field
The specification relates to the technical field of RPA robot process automation, in particular to an operation method and device of an auditing process based on an RPA robot.
Background
The RPA (Robotic process automation, robot process automation) can simulate the behavior of a human operation computer, and can automatically operate repeated tasks or processes, replace high-frequency and low-efficiency manual operation, reduce the labor cost and avoid the risk of manual operation errors.
Along with the gradual improvement of informatization degree of each industry, the application scene and the field of the RPA robot are gradually deepened, higher requirements are put forward on the safety aspect of the data processing of the RPA robot, and particularly in some application scenes related to user sensitive information and secret data, the application triggering operation mode of the RPA robot is required to be subjected to authority control, and the secret related application can only be operated on a specific RPA robot after the authorization of related personnel is obtained.
In the prior art, the following authorization methods are generally used: firstly, off-line authorization, and an RPA manager performs approval through an enterprise internal approval process; secondly, integrating an approval process of the confidential application with an online OA (Office Automation ) system, and realizing approval of the confidential application according to the OA system; thirdly, the RPA robot directly acquires an approval application and a company organization framework, and sends the approval application to an immediate leader for auditing according to the company organization framework.
However, the conventional approval method has problems of low processing efficiency and high implementation cost, and has weak protection measures for the privacy and security of data information.
Disclosure of Invention
The invention overcomes the defect of poor protective measures for the safety of data information in the prior art, provides an operation method and a device for an auditing flow based on an RPA robot, divides application information according to a secret-related area, implements a fine authority auditing flow based on the divided application information, sends different secret-related areas to different auditors for auditing, realizes the control of access authority for the application information, realizes the fine auditing for the application information, and improves the auditing efficiency and accuracy for the application information. By blurring the confidential areas, different confidential areas are isolated, and auditors can only check the confidential areas with corresponding authorities, so that the data security of application information is effectively protected. The secret-related area is subjected to fuzzy processing according to the identity characteristic information of the auditor, so that different fuzzy processing methods are used for different auditors, and the auditor is facilitated to rapidly locate the secret-related area to be processed; meanwhile, fine authority control on application information is realized based on the identity characteristic information of auditors, auditors corresponding to each secret-related area are conveniently traced, and the safety of data in the application information is improved.
In order to solve the technical problems, the technical scheme of the invention is as follows:
the invention provides an operation method of an auditing flow based on an RPA robot, which is applied to the RPA robot and comprises the following steps:
s01, acquiring application information, and taking the application information related to secret information as a task block to be processed;
s02, determining corresponding auditors based on the confidential areas of the task blocks to be processed;
s03, acquiring a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area;
s04, carrying out blurring processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and sending the task block to be processed after blurring processing to the corresponding auditor for defuzzification processing;
s05, generating an audit report after auditors involved in the approval path pass the audit.
The application information is divided according to the confidential areas, and a refined authority approval process is implemented based on the divided application information, different confidential areas are sent to different auditors for auditing, so that the control of access authorities to the application information is realized, the refined auditing to the application information is realized, and the auditing efficiency and accuracy to the application information are improved. By blurring the confidential areas, different confidential areas are isolated, and auditors can only check the confidential areas with corresponding authorities, so that the data security of application information is effectively protected. The secret-related area is subjected to fuzzy processing according to the identity characteristic information of the auditor, so that different fuzzy processing methods are used for different auditors, and the auditor is facilitated to rapidly locate the secret-related area to be processed; meanwhile, fine authority control on application information is realized based on the identity characteristic information of auditors, auditors corresponding to each secret-related area are conveniently traced, and the safety of data in the application information is improved.
Preferably, the blurring processing is performed on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, including:
s401, acquiring the identity characteristic information of the auditor, and converting the identity characteristic information of the auditor into binary values;
s402, acquiring a blurring template, and determining an identification area of the blurring template based on the identity characteristic information of an auditor;
s403, converting the binary value into an identification pixel value, filling the identification region, and filling a preset pixel value into a non-identification region of the blurring template;
s404, adjusting the position of the blurring template to completely cover the corresponding secret-related area, and combining the blurring template and the corresponding secret-related area;
s405, generating a key based on the identity characteristic information and sending the key to a corresponding auditor;
s406, repeating S401-S405 until each secret related area in the task block to be processed is subjected to blurring processing.
The fuzzy processing is carried out on the task blocks to be processed according to the identity characteristic information of the auditor, different fuzzy processing strategies are used for different secret-related areas in the task blocks to be processed, and when the auditor receives the task blocks to be processed, the auditor is facilitated to more intuitively determine the secret-related areas to be processed, so that the personalized permission distribution and management based on the identity are facilitated. Meanwhile, the secret key is set based on the identity characteristic information and is correspondingly sent to a specific auditor, so that confidentiality of application information is enhanced, and work efficiency is improved.
Preferably, the method includes the steps of sending the task blocks to be processed after the blurring processing to corresponding auditors for the defuzzification processing, including:
receiving a task block to be processed after the blurring processing;
inputting a secret key by an auditor for verification, and splitting the fuzzy template and the corresponding secret-related area when the verification is passed;
and deleting the blurring template to finish the defuzzification processing.
The secret key is generated according to the identity characteristic information of the auditor, and is directly sent to the corresponding auditor after the fuzzy operation of the secret-related area is completed, so that only the auditor knows the secret key, other unauthorized persons are difficult to decrypt, the information security of the application information is ensured, and the confidentiality of the application information is improved. Meanwhile, different auditors have different keys for unlocking different secret-related areas, so that the scope of the secret-related areas which can be decrypted and accessed by the appointed auditors is realized, the detailed authority management based on the keys is realized, the auditing mode of special processing by special persons is realized, and the confidentiality of secret-related information is enhanced.
Preferably, the method for acquiring the corresponding approval path based on the approval node information and the approval time information of the task block to be processed includes:
Acquiring approval node information of a task block to be processed and approval time information corresponding to the approval node information;
ordering approval node information based on approval time information, and constructing an approval node list;
and constructing an approval path based on the approval node list, and acquiring an approval time threshold of the approval path.
By constructing the approval path according to the approval node information and the approval time information corresponding to the approval node information, the approval circulation process of the task block to be processed can be clearly presented, so that the approval process is smoother, meanwhile, the approval process can be optimized according to the monitoring of the approval time threshold, the approval time is controlled, and the approval efficiency is improved.
Preferably, the method further comprises:
monitoring approval time and transmission time in an approval time threshold in real time;
when the approval time exceeds a corresponding preset approval threshold, sending a fault prompt message to a corresponding auditor; and when the transmission time length exceeds the corresponding preset transmission threshold value, sending a fault prompt message to an administrator.
By monitoring the examination and approval duration and the transmission duration in real time, when fault conditions such as flow blockage and the like occur in the examination and approval process, the fault causes can be located in time, corresponding auditors or administrators are notified, the auditors or administrators are prompted to process tasks in time, the examination and approval of application information is completed in time, and the working efficiency is improved.
Preferably, the method for dividing the confidential area comprises the following steps:
obtaining a division identifier in application information;
dividing the application information into a plurality of component parts according to the division identification;
and judging whether the secret-related information of the two adjacent components belongs to the same field in sequence, and if so, dividing the two adjacent components into a secret-related area.
The application information is divided into smaller unit components, the field of each component is determined, and then the components belonging to the same field are divided into the same secret-related area, so that the accuracy of the secret-related area and the matching result of the field is improved.
Preferably, the division identifier includes: paragraph identification.
The invention provides an operation device of an auditing flow based on an RPA robot, which is applied to the RPA robot and comprises:
the acquisition module is used for acquiring application information and taking the application information related to the secret information as a task block to be processed;
the first determining module is used for determining corresponding auditors based on the confidential areas of the task blocks to be processed;
the second determining module is used for acquiring a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area;
The data processing module is used for carrying out blurring processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and sending the task block to be processed after blurring processing to the corresponding auditor for carrying out defuzzification processing;
and the result generation module is used for generating an audit report after the auditors involved in the approval path pass the audit.
The application information is divided according to the confidential areas, and a refined authority approval process is implemented based on the divided application information, different confidential areas are sent to different auditors for auditing, so that hierarchical control of access authorities to the application information is realized, refined auditing to the application information is realized, and auditing efficiency and accuracy to the application information are improved. Meanwhile, the fuzzy processing is carried out on the confidential areas, so that different confidential areas are isolated, and an auditor can only check the confidential areas with corresponding authorities, thereby effectively protecting the data security of application information and effectively improving the confidentiality and security of data.
The present invention provides an electronic device including: the system comprises a memory and a processor, wherein the memory is used for storing executable codes, and the processor is used for realizing the steps in the running method of the RPA robot-based auditing flow when the executable codes are executed.
The invention provides a computer storage medium, wherein a computer program is stored on the computer storage medium, and when the computer program is executed by a processor, the steps in the running method based on the auditing flow of the RPA robot are realized.
Compared with the prior art, the beneficial effect that above-mentioned technical scheme that this specification adopted can reach includes at least:
the application information is divided according to the confidential areas, and a refined authority approval process is implemented based on the divided application information, different confidential areas are sent to different auditors for auditing, so that the control of access authorities to the application information is realized, the refined auditing to the application information is realized, and the auditing efficiency and accuracy to the application information are improved. By blurring the confidential areas, different confidential areas are isolated, and auditors can only check the confidential areas with corresponding authorities, so that the data security of application information is effectively protected. The secret-related area is subjected to fuzzy processing according to the identity characteristic information of the auditor, so that different fuzzy processing methods are used for different auditors, and the auditor is facilitated to rapidly locate the secret-related area to be processed; meanwhile, fine authority control on application information is realized based on the identity characteristic information of auditors, auditors corresponding to each secret-related area are conveniently traced, and the safety of content information in the application information is improved.
Further, the task blocks to be processed are subjected to fuzzy processing according to the identity characteristic information of the auditor, different fuzzy processing strategies are used for different secret-related areas in the task blocks to be processed, and when the auditor receives the task blocks to be processed, the auditor is facilitated to determine the secret-related areas to be processed more intuitively, so that the personalized permission distribution and management based on the identity are facilitated. Meanwhile, the secret key is set based on the identity characteristic information and is correspondingly sent to a specific auditor, so that confidentiality of application information is enhanced, and work efficiency is improved.
Further, the secret key is generated according to the identity characteristic information of the auditor, and is directly sent to the corresponding auditor after the fuzzy operation of the secret-related area is completed, so that only the auditor knows the secret key, other unauthorized persons are difficult to decrypt, information security of application information is guaranteed, and confidentiality of the application information is improved. Meanwhile, different auditors have different keys for unlocking different secret-related areas, so that the scope of the secret-related areas which can be decrypted and accessed by the appointed auditors is realized, the detailed authority management based on the keys is realized, the auditing mode of special processing by special persons is realized, and the confidentiality of secret-related information is enhanced.
The foregoing summary is merely an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the present invention may be better understood, and in order that the present invention may be more fully understood, its features and advantages may be more fully understood.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures.
FIG. 1 is a flow diagram of an operation method of an auditing flow based on an RPA robot;
fig. 2 is a schematic structural diagram of an operation device based on an auditing process of an RPA robot;
fig. 3 is a schematic structural diagram of an electronic device according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and examples, it being understood that the detailed description herein is merely a preferred embodiment of the present invention, which is intended to illustrate the present invention, and not to limit the scope of the invention, as all other embodiments obtained by those skilled in the art without making any inventive effort fall within the scope of the present invention.
Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations (or steps) can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures; the processes may correspond to methods, functions, procedures, subroutines, and the like.
In order that the invention may be more readily understood, a more particular description thereof will be rendered by reference to specific embodiments that are illustrated in the appended drawings.
Examples: as shown in fig. 1, an embodiment of the present disclosure provides an operation method of an audit procedure based on an RPA robot, which is applied to the RPA robot, including:
s01, acquiring application information, and taking the application information related to secret information as a task block to be processed;
s02, determining corresponding auditors based on the confidential areas of the task blocks to be processed;
s03, acquiring a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area;
S04, carrying out blurring processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and sending the task block to be processed after blurring processing to the corresponding auditor for defuzzification processing;
s05, generating an audit report after auditors involved in the approval path pass the audit.
In practice, the applicant initiates application information through the intelligent terminal, specifically, the application information includes, but is not limited to: applicant information, application type, content information; intelligent terminals include, but are not limited to: computer, mobile phone, PAD.
In implementation, after application information is acquired, the application information related to secret-related information is used as a task block to be processed, the task block to be processed is divided into a plurality of secret-related areas, and corresponding auditors are determined based on the secret-related areas. Specifically, content information included in the application information is retrieved, and the application information related to the secret-related information is used as a task block to be processed.
In the implementation, a preset search library exists, and the search library comprises search keywords corresponding to the secret-related fields to which secret-related information belongs one by one; analyzing the content information in the application information, extracting the phrase or keyword in the application information, and carrying out search comparison with the search keyword included in the search library, if the phrase or keyword included in the application information is the search keyword, judging as secret-related information.
In a specific embodiment, the task block to be processed is divided by taking a paragraph as a unit, whether the phrase or the keyword included in each paragraph is a search keyword is searched, whether the percentage of the phrase or the keyword which is calculated as the search keyword and occupies all phrases or keywords in the paragraph reaches a preset threshold value is calculated, if yes, the paragraph is judged to be confidential information, and the paragraph is taken as a confidential area of the task block to be processed.
It should be noted that the preset threshold may be set according to practical situations, and is not limited herein.
Preferably, the content information without secret related information is divided into a whole non-auditing task block, and the non-auditing task block comprises identification information such as applicant information, application type and the like and is used for identifying applicant information initiating application information without auditing.
In the implementation, the confidential area is determined according to the confidential area corresponding to the search keyword, and in a specific implementation, the confidential area with the search keyword with the highest specific gravity is taken as the confidential area of the confidential area, and the auditor corresponding to the confidential area is determined according to the confidential area. Preferably, each confidential area defines an auditor.
In the implementation, if the auditor cannot be determined according to the confidential area, the determination failure information is sent to the administrator, and the administrator adds the auditor to the confidential area in a manual mode.
In implementation, corresponding approval paths are obtained based on approval node information and approval time information of the task blocks to be processed, the approval node information comprises an confidential area and identity characteristic information of auditors corresponding to the confidential area, the approval time information comprises time information of the corresponding approval nodes receiving the task blocks to be processed, and the approval node information is ordered according to time sequence of the approval time information to generate the approval paths.
In the implementation, the blurring processing is carried out on the corresponding secret-related area in the task block to be processed according to the identity characteristic information of the auditor. Preferably, specific blurring processing is performed on the secret-related areas according to the identity characteristic information of the auditors, for example, a pattern corresponding to the identity characteristic information of the auditors is generated, the pattern corresponding to each secret-related area is displayed above each secret-related area, and a secret key is generated and sent to the corresponding auditors in the blurring processing process.
In the implementation, the task blocks to be processed after the blurring processing are sent to corresponding auditors, the auditors decrypt the confidential area after the blurring processing according to the correct secret key, the defuzzification processing is achieved, and when the auditors involved in the approval path all audit and pass, audit reports are generated, and audit results of application information are sent to the intelligent terminal of the applicant.
The application information is divided according to the confidential areas, and a refined authority approval process is implemented based on the divided application information, different confidential areas are sent to different auditors for auditing, so that the control of access authorities to the application information is realized, the refined auditing to the application information is realized, and the auditing efficiency and accuracy to the application information are improved. By blurring the confidential areas, different confidential areas are isolated, and auditors can only check the confidential areas with corresponding authorities, so that the data security of application information is effectively protected. The secret-related area is subjected to fuzzy processing according to the identity characteristic information of the auditor, so that different fuzzy processing methods are used for different auditors, and the auditor is facilitated to rapidly locate the secret-related area to be processed; meanwhile, fine authority control on application information is realized based on the identity characteristic information of auditors, auditors corresponding to each secret-related area are conveniently traced, the safety of data in the application information is improved, and the steps executed by the auditors are completed by the terminal used by the auditors.
In some embodiments, the blurring processing is performed on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, including:
S401, acquiring the identity characteristic information of the auditor, and converting the identity characteristic information of the auditor into binary values;
s402, acquiring a blurring template, and determining an identification area of the blurring template based on the identity characteristic information of an auditor;
s403, converting the binary value into an identification pixel value, filling the identification region, and filling a preset pixel value into a non-identification region of the blurring template;
s404, adjusting the position of the blurring template to completely cover the corresponding secret-related area, and combining the blurring template and the corresponding secret-related area;
s405, generating a key based on the identity characteristic information and sending the key to a corresponding auditor;
s406, repeating S401-S405 until each secret related area in the task block to be processed is subjected to blurring processing.
In practice, the identity information of the auditor is a unique identifier of the auditor, preferably, the identity information includes, but is not limited to: the system comprises an identity card number, an employee work number and a serial number, wherein the serial number is generated by a time stamp and a random number.
In a specific embodiment, the job number of the auditor is selected as the identity feature information of the auditor, and the job number is converted into a binary value.
In implementation, a blurring template is obtained, wherein the size of the blurring template is equal to the size of the confidential area to be covered.
In implementations, the obfuscation templates include an identified region and a non-identified region. The identification areas are generated according to the identity characteristic information of the auditors, and the identification areas and the identity characteristic information of the auditors are in one-to-one correspondence. In particular, the identification area may be displayed as a job number pattern for an auditor, or a specific pattern may be set by the auditor itself. Preferably, the pattern of identification areas is a number. The non-identified regions are other regions of the obfuscated template that remove the identified regions.
In the implementation, the identification area of the blurring template is determined based on the identity characteristic information of the auditor, and meanwhile, binary values generated by the identity characteristic information are converted into identification pixel values and filled into the identification area; and filling the preset pixel value into a non-identification area of the blurring template to generate a blurring template corresponding to the secret-related area.
It should be noted that the preset pixel value may be set according to practical situations, and is not limited herein.
In practice, when the color mode is an RGB color mode, the binary values are divided equally into three values, which in turn are the pixel intensities of R, G, B. When the binary number is a multiple of non-three, a plurality of digital zeros are added from the initial end of the binary number to ensure that the binary number can be equally divided into three. The three divided values are converted into decimal values respectively to form pixel values of RGB colors, and the pixel values are marked as identification pixel values.
In a specific embodiment, the job number of the auditor is 2767, converted into a binary number of 101011001111, and when the color mode is an RGB color mode, the binary number is divided into three values, namely 1010, 1100, 1111, and converted into decimal numbers of 10, 12, 15 respectively, so as to obtain the identification pixel value of RGB (10, 12, 15), the RGB (10, 12, 15) is filled into the identification area, and the preset pixel value R (0, 0) is filled into the non-identification area, so as to generate the blurring template.
In practice, when the color mode is a printing four-Color Mode (CMYK), the binary values are divided equally into four values, which in turn are the pixel intensities of C, M, Y, K. When the binary number is a multiple of non-four, a plurality of digital zeros are added from the beginning of the binary number to ensure that the binary number can be equally divided into four terms. The divided four values are converted into decimal values respectively to form pixel values of CMYK colors, and the pixel values are recorded as identification pixel values.
In the implementation, the position of the blurring template is continuously adjusted, so that the blurring template is completely covered above the corresponding secret-related area, and the blurring template and the corresponding secret-related area are combined to realize blurring of the secret-related area.
In practice, a key is generated based on the identity information and sent to the corresponding auditor. Preferably, the key settings consist of identity information and random values.
In the implementation, the whole task block to be processed is traversed to ensure that a corresponding blurring template covers the upper part of each secret-related area in the task block to be processed, and the blurring processing is completed.
The fuzzy processing is carried out on the task blocks to be processed according to the identity characteristic information of the auditor, different fuzzy processing strategies are used for different secret-related areas in the task blocks to be processed, and when the auditor receives the task blocks to be processed, the auditor is facilitated to more intuitively determine the secret-related areas to be processed, so that the personalized permission distribution and management based on the identity are facilitated. Meanwhile, the secret key is set based on the identity characteristic information and is correspondingly sent to a specific auditor, so that confidentiality of application information is enhanced, and work efficiency is improved.
In some embodiments, sending the task blocks to be processed after the blurring process to a corresponding auditor for the defuzzification process includes:
receiving a task block to be processed after the blurring processing;
inputting a secret key by an auditor for verification, and splitting the fuzzy template and the corresponding secret-related area when the verification is passed;
And deleting the blurring template to finish the defuzzification processing.
In the implementation, a task block to be processed after the blurring processing is received, wherein the task block to be processed after the blurring processing comprises a secret-related area and a blurring template covered above the secret-related area.
In implementation, according to different identification areas displayed by the blurring template, a confidential area to be processed is determined. Specifically, the auditor clicks above the fuzzification template, pops up an input window, and inputs the secret key. If the key verification is not passed, prompting that the key input is wrong and needs to be input again, and automatically locking if the key is wrong for a plurality of times. If the key verification is passed, splitting the fuzzy template and the corresponding secret-related area, namely separating the fuzzy template and the corresponding secret-related area into different layers. And the auditor performs the process of auditing the content information displayed in the confidential area by deleting the blurring template to finish the debluring process.
The secret key is generated according to the identity characteristic information of the auditor, and is directly sent to the corresponding auditor after the fuzzy operation of the secret-related area is completed, so that only the auditor knows the secret key, other unauthorized persons are difficult to decrypt, the information security of the application information is ensured, and the confidentiality of the application information is improved. Meanwhile, different auditors have different secret keys for unlocking different secret-related areas, so that the scope of the secret-related areas which can be decrypted and accessed by the appointed auditors is realized, the fine authority management based on the secret keys is realized, the auditing mode of special processing by special persons is realized, the confidentiality of secret-related information is enhanced, and the working efficiency is also improved.
In some embodiments, obtaining a corresponding approval path based on approval node information and approval time information of a task block to be processed includes:
acquiring approval node information of a task block to be processed and approval time information corresponding to the approval node information;
ordering approval node information based on approval time information, and constructing an approval node list;
and constructing an approval path based on the approval node list, and acquiring an approval time threshold of the approval path.
In implementation, when the task block to be processed includes a plurality of secret related areas, the task block needs to be checked by auditors corresponding to each secret related area in sequence, and each auditor corresponds to one check node.
Specifically, the approval node information includes identity characteristic information of auditors corresponding to the confidential area. The approval time information is the time information of the task block to be processed received by the auditor of the corresponding approval node. And ordering the approval node information according to the predicted approval time information, constructing an approval node list, aggregating all the approval node lists together to generate an approval path, and acquiring an approval time threshold of the approval path. The approval time threshold is the time length from the initiation of application information to the completion of approval of the application information.
By constructing the approval path according to the approval node information and the approval time information corresponding to the approval node information, the approval circulation process of the task block to be processed can be clearly presented, so that the approval process is smoother, meanwhile, the approval process can be optimized according to the monitoring of the approval time threshold, the approval time is controlled, and the approval efficiency is improved.
In some embodiments, further comprising:
monitoring approval time and transmission time in an approval time threshold in real time;
when the approval time exceeds a corresponding preset approval threshold, sending a fault prompt message to a corresponding auditor; and when the transmission time length exceeds the corresponding preset transmission threshold value, sending a fault prompt message to an administrator.
In implementation, the approval duration and the transmission duration in the approval time threshold are acquired. Specifically, the approval duration is the duration from the time when the auditor receives the task block to be processed to the time when the approval is completed; the transmission time length is the time length used for transmitting the task block to be processed from one approval node to the next approval node.
In a specific embodiment, the application information includes two secret-related areas, the two secret-related areas need to be checked by an auditor a and an auditor B, the transmission time period from when the applicant submits the application information to when the auditor a receives the application information is marked as T1, the approval time period from when the auditor a receives the application information to when the auditor a finishes approval is marked as H1, the transmission time period from when the auditor a finishes approval to when the auditor B receives the application information is marked as T2, the approval time period from when the auditor B receives the application information to when the auditor B finishes approval is marked as H2, and the transmission time period from when the auditor B finishes approval to when the approval results return to the applicant is marked as T3, and the approval time threshold s=t1+h1+t2+h2+t3.
In the implementation, each examination and approval time length and each transmission time length are sequentially compared with a corresponding preset time length threshold, specifically, when the examination and approval time length H1 exceeds the preset time length threshold corresponding to H1, a fault prompt message is sent to an auditor A, and the auditor A is prompted to process the message in time; when the transmission time length T2 exceeds a preset time length threshold corresponding to T2, a fault prompt message is sent to an administrator so as to check network faults and ensure normal transmission of application information; when the approval time length H2 exceeds a preset time length threshold corresponding to H2, a fault prompt message is sent to an auditor B, and the auditor B is prompted to process the message in time.
It should be noted that, the preset time threshold may be set with reference to the historical audit time threshold, or a specific time length value may be set manually, and the specific value of the preset time threshold may be set according to the actual situation, which is not limited herein.
It should be noted that, the preset time thresholds corresponding to different examination and approval time periods and different transmission time periods may be set to the same threshold or may be set to different thresholds, and the specific preset time threshold needs to be set according to the actual situation, which is not limited herein.
By monitoring the examination and approval duration and the transmission duration in real time, when fault conditions such as flow blockage and the like occur in the examination and approval process, the fault causes can be located in time, corresponding auditors or administrators are notified, the auditors or administrators are prompted to process tasks in time, the examination and approval of application information is completed in time, and the working efficiency is improved.
In some embodiments, a method for partitioning a secret-related region includes:
obtaining a division identifier in application information;
dividing the application information into a plurality of component parts according to the division identification;
and judging whether the secret-related information of the two adjacent components belongs to the same field in sequence, and if so, dividing the two adjacent components into a secret-related area.
In some implementations, the partition identification includes: paragraph identification.
In the implementation, the application information is analyzed, the division mark included in the application information is identified, and the application information is divided into a plurality of component parts by taking the division mark as a demarcation point.
Preferably, the partition identity is a paragraph identity. Specifically, each text line included in the application information is obtained, the text line is traversed, whether the text line includes a paragraph identifier is judged, and when the text line includes the paragraph identifier, the application information is subjected to segmentation processing according to the paragraph identifier, namely, the application information is divided into a plurality of component parts by taking paragraphs as units. Preferably, the paragraph identification includes: first line indentation, line feed, and line space width.
In a specific embodiment, each text line is obtained according to the text typesetting of the application information. Traversing the text lines from top to bottom in sequence, and when the line spacing width of two adjacent text lines is equal to the preset paragraph line spacing, judging that the two adjacent text lines belong to the same paragraph, and dividing the two adjacent text lines into the same component part.
It should be noted that, unlike the paragraph post-line spacing and the paragraph pre-line spacing, the preset paragraph line spacing is the paragraph intra-line spacing, and the specific value of the preset paragraph line spacing may be set according to the actual application scenario, which is not limited herein.
In implementation, judge whether secret-related information of every component part belongs to same field in proper order, include: and extracting sensitive words included in the component parts, and comparing the sensitive words with a sensitive word stock. And classifying and storing the sensitive words in different fields in the sensitive word stock, and marking secret-related marks. And judging the secret related field corresponding to each component according to the field to which the sensitive word belongs and the occurrence times of the sensitive word. If the secret related areas corresponding to the two adjacent components are the same, dividing the two adjacent components into a secret related area.
In a specific embodiment, determining the secret-related domain of each component includes: splitting the component into a plurality of phrases, matching the phrases with the sensitive words in the sensitive word library, obtaining the number of occurrences and the number of occurrences of the sensitive words in the component, carrying out weighted calculation on the number of occurrences and the number of occurrences of the sensitive words, obtaining a comprehensive index, and determining the field of the component according to the comprehensive index.
It should be noted that the sensitive word stock is set according to the historical data or according to the actual application scenario, and is not limited herein.
The application information is divided into smaller unit components, the field of each component is determined, and then the components belonging to the same field are divided into the same secret-related area, so that the accuracy of the secret-related area and the matching result of the field is improved.
Examples: as shown in fig. 2, the embodiment of the present disclosure provides an operation device based on an audit procedure of an RPA robot, which is applied to the RPA robot, and includes:
the acquisition module is used for acquiring application information and taking the application information related to the secret information as a task block to be processed;
the first determining module is used for determining corresponding auditors based on the confidential areas of the task blocks to be processed;
the second determining module is used for acquiring a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area;
the data processing module is used for carrying out blurring processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and sending the task block to be processed after blurring processing to the corresponding auditor for carrying out defuzzification processing;
And the result generation module is used for generating an audit report after the auditors involved in the approval path pass the audit.
In practice, the acquisition module receives application information initiated by the applicant, specifically, the application information includes, but is not limited to: applicant information, application type, content information. After the acquisition module acquires the application information, the application information related to the secret-related information is used as a task block to be processed, and the task block to be processed is divided into a plurality of secret-related areas.
In the implementation, a preset search library exists, and the search library comprises search keywords corresponding to the secret-related fields to which secret-related information belongs one by one; analyzing the content information in the application information, extracting the phrase or keyword in the application information, and carrying out search comparison with the search keyword included in the search library, if the phrase or keyword included in the application information is the search keyword, judging as secret-related information.
In implementations, the first determination module determines a corresponding auditor based on the secret-related region. The second determining module obtains a corresponding approval path based on approval node information and approval time information of the task block to be processed, so that the task block to be processed sequentially passes through approval nodes in the approval path to be approved by corresponding auditors. Specifically, the approval node information comprises an approval area and identity characteristic information of an auditor corresponding to the approval area, the approval time information comprises time information of a task block to be processed received by a corresponding approval node, and the approval node information is ordered according to the time sequence of the approval time information to generate an approval path.
In implementation, if the first determining module cannot determine the auditor according to the confidential area, the determining failure information is sent to the administrator, and the administrator adds the auditor to the confidential area manually.
In the implementation, the data processing module performs fuzzy processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor. Preferably, specific blurring processing is performed on the secret-related areas according to the identity characteristic information of the auditors, for example, a pattern corresponding to the identity characteristic information of the auditors is generated, the pattern corresponding to each secret-related area is displayed above each secret-related area, and a secret key is generated and sent to the corresponding auditors in the blurring processing process.
In the implementation, after the data processing module finishes the blurring process on the task block to be processed, the task block to be processed after the blurring process is sent to a corresponding auditor, and the auditor decrypts the secret-related area after the blurring process according to the correct secret key to realize the defuzzification process;
in implementation, after auditors involved in the approval path pass the audit, an audit report is generated through a result generation module.
The application information is divided according to the confidential areas, and a refined authority approval process is implemented based on the divided application information, different confidential areas are sent to different auditors for auditing, so that hierarchical control of access authorities to the application information is realized, refined auditing to the application information is realized, and auditing efficiency and accuracy to the application information are improved. Meanwhile, the fuzzy processing is carried out on the confidential areas, so that different confidential areas are isolated, and an auditor can only check the confidential areas with corresponding authorities, thereby effectively protecting the data security of application information and effectively improving the confidentiality and security of data.
Examples: as shown in fig. 3, an embodiment of the present disclosure provides an electronic device, including: the system comprises a memory and a processor, wherein the memory is used for storing executable codes, and the processor is used for realizing the steps in the running method of the auditing flow based on the RPA robot according to any one of the embodiments of the present specification when the executable codes are executed, and can achieve the same technical effects as the running method of the auditing flow based on the RPA robot, and for avoiding repetition, the description is omitted.
It should be noted that, as will be understood by those skilled in the art, the electronic device herein is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a Programmable gate array (FPGA), a digital processor (Digital Signal Processor, DSP), an embedded device, and the like. The electronic device may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, and the like. The electronic equipment can perform man-machine interaction in a mode of a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
It should be noted that, in some embodiments, the memory may be an internal storage unit of the electronic device, for example, a hard disk or a memory of the electronic device. In some embodiments, the memory may be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, or a Flash Card (Flash Card) equipped on the electronic device. In some embodiments, the memory may include both an internal storage unit of the electronic device and an external storage device of the electronic device.
In practice, the memory is used for storing an operating system installed in the electronic device and various application software, such as program codes of an operation method based on the auditing procedure of the RPA robot.
Examples: the embodiment of the present disclosure provides a computer storage medium on which a computer program is stored, where the computer program when executed by a processor implements the steps in the method for operating an auditing flow based on an RPA robot described in any one of the embodiments of the present disclosure, and may achieve the same technical effects as the method for operating an auditing flow based on an RPA robot, so that repetition is avoided and redundant description is omitted here.
The computer storage medium includes flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like.
Those of ordinary skill in the art will appreciate that implementing all or part of the above-described embodiment methods may be implemented by a computer program giving instructions to related hardware, where the computer program is stored in a computer storage medium, and when executed, implements the steps in the method for implementing the RPA robot-based audit flow described in any of the embodiments of the present specification.
The above embodiments are preferred embodiments of the method and apparatus for operating an RPA robot-based auditing process according to the present invention, and are not intended to limit the scope of the present invention, which includes but is not limited to the present embodiments, and all equivalent changes in shape and structure according to the present invention are within the scope of the present invention.

Claims (4)

1. The running method of the auditing flow based on the RPA robot is applied to the RPA robot and is characterized by comprising the following steps:
s01, acquiring application information, and taking the application information related to secret information as a task block to be processed;
s02, determining corresponding auditors based on the confidential areas of the task blocks to be processed;
s03, acquiring a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area;
s04, carrying out blurring processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and sending the task block to be processed after blurring processing to the corresponding auditor for defuzzification processing;
s05, generating an audit report after auditors involved in the approval path pass the audit;
blurring processing is carried out on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and the blurring processing comprises the following steps:
s401, acquiring the identity characteristic information of the auditor, and converting the identity characteristic information of the auditor into binary values;
s402, acquiring a blurring template, and determining an identification area of the blurring template based on the identity characteristic information of an auditor;
S403, converting the binary value into an identification pixel value, filling the identification region, and filling a preset pixel value into a non-identification region of the blurring template;
s404, adjusting the position of the blurring template to completely cover the corresponding secret-related area, and combining the blurring template and the corresponding secret-related area;
s405, generating a key based on the identity characteristic information and sending the key to a corresponding auditor;
s406, repeating the steps S401-S405 until each secret-related area in the task block to be processed is subjected to blurring processing;
sending the task blocks to be processed after the blurring processing to corresponding auditors for the defuzzification processing, wherein the defuzzification processing comprises the following steps:
receiving a task block to be processed after the blurring processing;
inputting a secret key by an auditor for verification, and splitting the fuzzy template and the corresponding secret-related area when the verification is passed;
deleting the blurring template to finish the defuzzification;
obtaining a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the method comprises the following steps:
acquiring approval node information of a task block to be processed and approval time information corresponding to the approval node information;
ordering approval node information based on approval time information, and constructing an approval node list;
Constructing an approval path based on the approval node list, and acquiring an approval time threshold of the approval path;
further comprises:
monitoring approval time and transmission time in an approval time threshold in real time;
when the approval time exceeds a corresponding preset approval threshold, sending a fault prompt message to a corresponding auditor; when the transmission time length exceeds a corresponding preset transmission threshold value, sending a fault prompt message to an administrator;
the method for dividing the confidential area comprises the following steps:
obtaining a division identifier in application information;
dividing the application information into a plurality of component parts according to the division identification;
sequentially judging whether the secret-related information of two adjacent components belongs to the same field, if so, dividing the two adjacent components into a secret-related area;
the division mark comprises: paragraph identification.
2. An apparatus for operating an auditing procedure based on an RPA robot, applied to the RPA robot, for executing the method for operating the auditing procedure based on the RPA robot according to claim 1, comprising:
the acquisition module is used for acquiring application information and taking the application information related to the secret information as a task block to be processed;
the first determining module is used for determining corresponding auditors based on the confidential areas of the task blocks to be processed;
The second determining module is used for acquiring a corresponding approval path based on approval node information and approval time information of the task block to be processed, wherein the approval node information comprises an confidential area and identity characteristic information of an auditor corresponding to the confidential area;
the data processing module is used for carrying out blurring processing on the confidential area corresponding to the task block to be processed according to the identity characteristic information of the auditor, and sending the task block to be processed after blurring processing to the corresponding auditor for carrying out defuzzification processing;
and the result generation module is used for generating an audit report after the auditors involved in the approval path pass the audit.
3. An electronic device, comprising: a memory for storing executable code and a processor for implementing the steps in the method of operation of the RPA robot-based auditing procedure as defined in claim 1 when the executable code is executed.
4. A computer storage medium, wherein a computer program is stored on the computer storage medium, and the computer program when executed by a processor implements the steps in the method for operating an RPA robot-based auditing procedure as described in claim 1.
CN202310857723.2A 2023-07-13 2023-07-13 Method and device for running auditing flow based on RPA robot Active CN116579749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310857723.2A CN116579749B (en) 2023-07-13 2023-07-13 Method and device for running auditing flow based on RPA robot

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310857723.2A CN116579749B (en) 2023-07-13 2023-07-13 Method and device for running auditing flow based on RPA robot

Publications (2)

Publication Number Publication Date
CN116579749A CN116579749A (en) 2023-08-11
CN116579749B true CN116579749B (en) 2023-11-14

Family

ID=87538252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310857723.2A Active CN116579749B (en) 2023-07-13 2023-07-13 Method and device for running auditing flow based on RPA robot

Country Status (1)

Country Link
CN (1) CN116579749B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183841A (en) * 1995-02-13 1998-06-03 英特特拉斯特技术公司 System and method for secure transaction management and electronic rights protection
CN105825132A (en) * 2015-01-07 2016-08-03 中国移动通信集团江苏有限公司 Data processing and query method and related devices
CN108830360A (en) * 2018-09-07 2018-11-16 天津光电通信技术有限公司 Concerning security matters management method and system based on RFID
CN108959950A (en) * 2017-05-19 2018-12-07 南京骏腾信息技术有限公司 Private data guard method based on dynamic analog pasting technique
CN110264288A (en) * 2019-05-20 2019-09-20 深圳壹账通智能科技有限公司 Data processing method and relevant apparatus based on information discriminating technology
CN112379993A (en) * 2020-12-08 2021-02-19 中国建设银行股份有限公司 Robot process automation processing system, method and device
CN114118959A (en) * 2021-11-24 2022-03-01 京东方科技集团股份有限公司 Method and device for examining and approving target object, computer storage medium and electronic equipment
CN114299350A (en) * 2021-12-15 2022-04-08 四川新网银行股份有限公司 Artificial credit auditing information recommendation method and system based on machine learning
WO2022073354A1 (en) * 2020-10-10 2022-04-14 百度(中国)有限公司 Service auditing notification method, gateway, electronic device, and readable medium
CN114493552A (en) * 2022-04-01 2022-05-13 浙江保融科技股份有限公司 RPA (remote procedure Access) automatic approval method and system for public payment based on double time axes
CN115099792A (en) * 2022-08-24 2022-09-23 中科科界(北京)科技有限公司 Method, device and equipment for auditing project declaration form and storage medium
CN115423619A (en) * 2022-10-13 2022-12-02 建信金融科技有限责任公司 Data processing method, device, system, storage medium and program product
CN115526607A (en) * 2022-10-27 2022-12-27 中国建设银行股份有限公司大连市分行 Automatic approval method and system based on flow robot and storage medium
CN115758413A (en) * 2022-11-22 2023-03-07 北京鼎普科技股份有限公司 Method and system for transferring confidential files in designated range

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11762973B2 (en) * 2021-11-16 2023-09-19 International Business Machines Corporation Auditing of multi-factor authentication

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183841A (en) * 1995-02-13 1998-06-03 英特特拉斯特技术公司 System and method for secure transaction management and electronic rights protection
CN105825132A (en) * 2015-01-07 2016-08-03 中国移动通信集团江苏有限公司 Data processing and query method and related devices
CN108959950A (en) * 2017-05-19 2018-12-07 南京骏腾信息技术有限公司 Private data guard method based on dynamic analog pasting technique
CN108830360A (en) * 2018-09-07 2018-11-16 天津光电通信技术有限公司 Concerning security matters management method and system based on RFID
CN110264288A (en) * 2019-05-20 2019-09-20 深圳壹账通智能科技有限公司 Data processing method and relevant apparatus based on information discriminating technology
WO2022073354A1 (en) * 2020-10-10 2022-04-14 百度(中国)有限公司 Service auditing notification method, gateway, electronic device, and readable medium
CN112379993A (en) * 2020-12-08 2021-02-19 中国建设银行股份有限公司 Robot process automation processing system, method and device
CN114118959A (en) * 2021-11-24 2022-03-01 京东方科技集团股份有限公司 Method and device for examining and approving target object, computer storage medium and electronic equipment
CN114299350A (en) * 2021-12-15 2022-04-08 四川新网银行股份有限公司 Artificial credit auditing information recommendation method and system based on machine learning
CN114493552A (en) * 2022-04-01 2022-05-13 浙江保融科技股份有限公司 RPA (remote procedure Access) automatic approval method and system for public payment based on double time axes
CN115099792A (en) * 2022-08-24 2022-09-23 中科科界(北京)科技有限公司 Method, device and equipment for auditing project declaration form and storage medium
CN115423619A (en) * 2022-10-13 2022-12-02 建信金融科技有限责任公司 Data processing method, device, system, storage medium and program product
CN115526607A (en) * 2022-10-27 2022-12-27 中国建设银行股份有限公司大连市分行 Automatic approval method and system based on flow robot and storage medium
CN115758413A (en) * 2022-11-22 2023-03-07 北京鼎普科技股份有限公司 Method and system for transferring confidential files in designated range

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
涉密科研项目保密审批流程优化设计;高峰;;科技资讯(第12期);全文 *

Also Published As

Publication number Publication date
CN116579749A (en) 2023-08-11

Similar Documents

Publication Publication Date Title
US7891003B2 (en) Enterprise threat modeling
US20080271157A1 (en) Evaluating removal of access permissions
CN111625809B (en) Data authorization method and device, electronic equipment and storage medium
CN105791255A (en) Method and system for identifying computer risks based on account clustering
CN112184177B (en) Project supervision method, equipment and storage medium
US11630924B2 (en) Sharing data with a particular audience
CN114372098A (en) Platform and method for protecting and mining power data middling station private data based on privileged account management
CN116579749B (en) Method and device for running auditing flow based on RPA robot
DE102019209349A1 (en) Investigate web threats using advanced web crawling
JP5232710B2 (en) Document protection system log display method
CN109670339B (en) Ontology-based privacy protection-oriented access control method and device
Zegzhda et al. Automatic security management of computer systems
JP2009146198A (en) Information management system
CN114915453A (en) Access response method and device
JP2007004610A (en) Complex access approval method and device
Prabhu et al. Towards data-driven cyber attack damage and vulnerability estimation for manufacturing enterprises
JP7008893B2 (en) Information processing equipment and programs
EP2667564A1 (en) Method and system for enabling multi-level policies enforcement
Bin et al. Research of fine grit access control based on time in cloud computing
CN117216809B (en) Secret-related mapping result offline distribution approval authorization system and method
CN109583907A (en) A kind of checking method of electronic invoice, device, medium and electronic equipment
CN117675284A (en) Override detection method, device, processor and machine-readable storage medium
CN115795497A (en) Data security processing method for big data
Termin et al. Physical security risk analysis for mobile access systems including uncertainty impact
CN115033852A (en) Credential processing method, device and equipment for realizing IA (IA) related to RPA (resilient packet Access) and AI (Artificial Intelligence architecture) processes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant